| apache2 | CVE-2021-44790 | CRITICAL | 2.4.51-1~deb11u1 | 2.4.52-1~deb11u2 | Expand...http://httpd.apache.org/security/vulnerabilities_24.htmlhttp://www.openwall.com/lists/oss-security/2021/12/20/4
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://linux.oracle.com/cve/CVE-2021-44790.html
 https://linux.oracle.com/errata/ELSA-2022-0258.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20211224-0001/
 https://ubuntu.com/security/notices/USN-5212-1
 https://ubuntu.com/security/notices/USN-5212-2
 https://www.debian.org/security/2022/dsa-5035
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.tenable.com/security/tns-2022-01
 https://www.tenable.com/security/tns-2022-03
 
 | 
  | apache2 | CVE-2022-22720 | CRITICAL | 2.4.51-1~deb11u1 | 2.4.53-1~deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/03/14/3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720
 https://linux.oracle.com/cve/CVE-2022-22720.html
 https://linux.oracle.com/errata/ELSA-2022-1049.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20220321-0001/
 https://ubuntu.com/security/notices/USN-5333-1
 https://ubuntu.com/security/notices/USN-5333-2
 
 | 
  | apache2 | CVE-2022-22721 | CRITICAL | 2.4.51-1~deb11u1 | 2.4.53-1~deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/03/14/2https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721
 https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20220321-0001/
 https://ubuntu.com/security/notices/USN-5333-1
 https://ubuntu.com/security/notices/USN-5333-2
 
 | 
  | apache2 | CVE-2022-23943 | CRITICAL | 2.4.51-1~deb11u1 | 2.4.53-1~deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/03/14/1https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943
 https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20220321-0001/
 https://ubuntu.com/security/notices/USN-5333-1
 https://ubuntu.com/security/notices/USN-5333-2
 
 | 
  | apache2 | CVE-2021-44224 | HIGH | 2.4.51-1~deb11u1 | 2.4.52-1~deb11u2 | Expand...http://httpd.apache.org/security/vulnerabilities_24.htmlhttp://www.openwall.com/lists/oss-security/2021/12/20/3
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20211224-0001/
 https://ubuntu.com/security/notices/USN-5212-1
 https://ubuntu.com/security/notices/USN-5212-2
 https://www.debian.org/security/2022/dsa-5035
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.tenable.com/security/tns-2022-01
 https://www.tenable.com/security/tns-2022-03
 
 | 
  | apache2 | CVE-2022-22719 | HIGH | 2.4.51-1~deb11u1 | 2.4.53-1~deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/03/14/4https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719
 https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20220321-0001/
 https://ubuntu.com/security/notices/USN-5333-1
 https://ubuntu.com/security/notices/USN-5333-2
 
 | 
  | apache2 | CVE-2001-1534 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.htmlhttp://www.iss.net/security_center/static/7494.php
 http://www.securityfocus.com/bid/3521
 
 | 
  | apache2 | CVE-2003-1307 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://bugs.php.net/38915http://hackerdom.ru/~dimmo/phpexpl.c
 http://www.securityfocus.com/archive/1/348368
 http://www.securityfocus.com/archive/1/449234/100/0/threaded
 http://www.securityfocus.com/archive/1/449298/100/0/threaded
 http://www.securityfocus.com/bid/9302
 
 | 
  | apache2 | CVE-2003-1580 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://www.securityfocus.com/archive/1/313867
 | 
  | apache2 | CVE-2003-1581 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://www.securityfocus.com/archive/1/313867
 | 
  | apache2 | CVE-2007-0086 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://osvdb.org/33456http://www.securityfocus.com/archive/1/455833/100/0/threaded
 http://www.securityfocus.com/archive/1/455879/100/0/threaded
 http://www.securityfocus.com/archive/1/455882/100/0/threaded
 http://www.securityfocus.com/archive/1/455920/100/0/threaded
 
 | 
  | apache2 | CVE-2007-1743 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
 http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
 http://www.securitytracker.com/id?1017904
 
 | 
  | apache2 | CVE-2007-3303 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://osvdb.org/37050http://security.psnc.pl/files/apache_report.pdf
 http://securityreason.com/securityalert/2814
 http://www.securityfocus.com/archive/1/469899/100/0/threaded
 http://www.securityfocus.com/archive/1/471832/100/0/threaded
 http://www.securityfocus.com/bid/24215
 
 | 
  | apache2 | CVE-2008-0456 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0130.html
 http://secunia.com/advisories/29348
 http://secunia.com/advisories/35074
 http://security.gentoo.org/glsa/glsa-200803-19.xml
 http://securityreason.com/securityalert/3575
 http://securitytracker.com/id?1019256
 http://support.apple.com/kb/HT3549
 http://www.mindedsecurity.com/MSA01150108.html
 http://www.securityfocus.com/archive/1/486847/100/0/threaded
 http://www.securityfocus.com/bid/27409
 http://www.us-cert.gov/cas/techalerts/TA09-133A.html
 http://www.vupen.com/english/advisories/2009/1297
 https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
 https://linux.oracle.com/cve/CVE-2008-0456.html
 https://linux.oracle.com/errata/ELSA-2013-0130.html
 https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
 
 | 
  | apache2-bin | CVE-2021-44790 | CRITICAL | 2.4.51-1~deb11u1 | 2.4.52-1~deb11u2 | Expand...http://httpd.apache.org/security/vulnerabilities_24.htmlhttp://www.openwall.com/lists/oss-security/2021/12/20/4
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://linux.oracle.com/cve/CVE-2021-44790.html
 https://linux.oracle.com/errata/ELSA-2022-0258.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20211224-0001/
 https://ubuntu.com/security/notices/USN-5212-1
 https://ubuntu.com/security/notices/USN-5212-2
 https://www.debian.org/security/2022/dsa-5035
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.tenable.com/security/tns-2022-01
 https://www.tenable.com/security/tns-2022-03
 
 | 
  | apache2-bin | CVE-2022-22720 | CRITICAL | 2.4.51-1~deb11u1 | 2.4.53-1~deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/03/14/3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720
 https://linux.oracle.com/cve/CVE-2022-22720.html
 https://linux.oracle.com/errata/ELSA-2022-1049.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20220321-0001/
 https://ubuntu.com/security/notices/USN-5333-1
 https://ubuntu.com/security/notices/USN-5333-2
 
 | 
  | apache2-bin | CVE-2022-22721 | CRITICAL | 2.4.51-1~deb11u1 | 2.4.53-1~deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/03/14/2https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721
 https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20220321-0001/
 https://ubuntu.com/security/notices/USN-5333-1
 https://ubuntu.com/security/notices/USN-5333-2
 
 | 
  | apache2-bin | CVE-2022-23943 | CRITICAL | 2.4.51-1~deb11u1 | 2.4.53-1~deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/03/14/1https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943
 https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20220321-0001/
 https://ubuntu.com/security/notices/USN-5333-1
 https://ubuntu.com/security/notices/USN-5333-2
 
 | 
  | apache2-bin | CVE-2021-44224 | HIGH | 2.4.51-1~deb11u1 | 2.4.52-1~deb11u2 | Expand...http://httpd.apache.org/security/vulnerabilities_24.htmlhttp://www.openwall.com/lists/oss-security/2021/12/20/3
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20211224-0001/
 https://ubuntu.com/security/notices/USN-5212-1
 https://ubuntu.com/security/notices/USN-5212-2
 https://www.debian.org/security/2022/dsa-5035
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.tenable.com/security/tns-2022-01
 https://www.tenable.com/security/tns-2022-03
 
 | 
  | apache2-bin | CVE-2022-22719 | HIGH | 2.4.51-1~deb11u1 | 2.4.53-1~deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/03/14/4https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719
 https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20220321-0001/
 https://ubuntu.com/security/notices/USN-5333-1
 https://ubuntu.com/security/notices/USN-5333-2
 
 | 
  | apache2-bin | CVE-2001-1534 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.htmlhttp://www.iss.net/security_center/static/7494.php
 http://www.securityfocus.com/bid/3521
 
 | 
  | apache2-bin | CVE-2003-1307 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://bugs.php.net/38915http://hackerdom.ru/~dimmo/phpexpl.c
 http://www.securityfocus.com/archive/1/348368
 http://www.securityfocus.com/archive/1/449234/100/0/threaded
 http://www.securityfocus.com/archive/1/449298/100/0/threaded
 http://www.securityfocus.com/bid/9302
 
 | 
  | apache2-bin | CVE-2003-1580 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://www.securityfocus.com/archive/1/313867
 | 
  | apache2-bin | CVE-2003-1581 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://www.securityfocus.com/archive/1/313867
 | 
  | apache2-bin | CVE-2007-0086 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://osvdb.org/33456http://www.securityfocus.com/archive/1/455833/100/0/threaded
 http://www.securityfocus.com/archive/1/455879/100/0/threaded
 http://www.securityfocus.com/archive/1/455882/100/0/threaded
 http://www.securityfocus.com/archive/1/455920/100/0/threaded
 
 | 
  | apache2-bin | CVE-2007-1743 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
 http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
 http://www.securitytracker.com/id?1017904
 
 | 
  | apache2-bin | CVE-2007-3303 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://osvdb.org/37050http://security.psnc.pl/files/apache_report.pdf
 http://securityreason.com/securityalert/2814
 http://www.securityfocus.com/archive/1/469899/100/0/threaded
 http://www.securityfocus.com/archive/1/471832/100/0/threaded
 http://www.securityfocus.com/bid/24215
 
 | 
  | apache2-bin | CVE-2008-0456 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0130.html
 http://secunia.com/advisories/29348
 http://secunia.com/advisories/35074
 http://security.gentoo.org/glsa/glsa-200803-19.xml
 http://securityreason.com/securityalert/3575
 http://securitytracker.com/id?1019256
 http://support.apple.com/kb/HT3549
 http://www.mindedsecurity.com/MSA01150108.html
 http://www.securityfocus.com/archive/1/486847/100/0/threaded
 http://www.securityfocus.com/bid/27409
 http://www.us-cert.gov/cas/techalerts/TA09-133A.html
 http://www.vupen.com/english/advisories/2009/1297
 https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
 https://linux.oracle.com/cve/CVE-2008-0456.html
 https://linux.oracle.com/errata/ELSA-2013-0130.html
 https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
 
 | 
  | apache2-data | CVE-2021-44790 | CRITICAL | 2.4.51-1~deb11u1 | 2.4.52-1~deb11u2 | Expand...http://httpd.apache.org/security/vulnerabilities_24.htmlhttp://www.openwall.com/lists/oss-security/2021/12/20/4
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://linux.oracle.com/cve/CVE-2021-44790.html
 https://linux.oracle.com/errata/ELSA-2022-0258.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20211224-0001/
 https://ubuntu.com/security/notices/USN-5212-1
 https://ubuntu.com/security/notices/USN-5212-2
 https://www.debian.org/security/2022/dsa-5035
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.tenable.com/security/tns-2022-01
 https://www.tenable.com/security/tns-2022-03
 
 | 
  | apache2-data | CVE-2022-22720 | CRITICAL | 2.4.51-1~deb11u1 | 2.4.53-1~deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/03/14/3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720
 https://linux.oracle.com/cve/CVE-2022-22720.html
 https://linux.oracle.com/errata/ELSA-2022-1049.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20220321-0001/
 https://ubuntu.com/security/notices/USN-5333-1
 https://ubuntu.com/security/notices/USN-5333-2
 
 | 
  | apache2-data | CVE-2022-22721 | CRITICAL | 2.4.51-1~deb11u1 | 2.4.53-1~deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/03/14/2https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721
 https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20220321-0001/
 https://ubuntu.com/security/notices/USN-5333-1
 https://ubuntu.com/security/notices/USN-5333-2
 
 | 
  | apache2-data | CVE-2022-23943 | CRITICAL | 2.4.51-1~deb11u1 | 2.4.53-1~deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/03/14/1https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943
 https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20220321-0001/
 https://ubuntu.com/security/notices/USN-5333-1
 https://ubuntu.com/security/notices/USN-5333-2
 
 | 
  | apache2-data | CVE-2021-44224 | HIGH | 2.4.51-1~deb11u1 | 2.4.52-1~deb11u2 | Expand...http://httpd.apache.org/security/vulnerabilities_24.htmlhttp://www.openwall.com/lists/oss-security/2021/12/20/3
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20211224-0001/
 https://ubuntu.com/security/notices/USN-5212-1
 https://ubuntu.com/security/notices/USN-5212-2
 https://www.debian.org/security/2022/dsa-5035
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.tenable.com/security/tns-2022-01
 https://www.tenable.com/security/tns-2022-03
 
 | 
  | apache2-data | CVE-2022-22719 | HIGH | 2.4.51-1~deb11u1 | 2.4.53-1~deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/03/14/4https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719
 https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20220321-0001/
 https://ubuntu.com/security/notices/USN-5333-1
 https://ubuntu.com/security/notices/USN-5333-2
 
 | 
  | apache2-data | CVE-2001-1534 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.htmlhttp://www.iss.net/security_center/static/7494.php
 http://www.securityfocus.com/bid/3521
 
 | 
  | apache2-data | CVE-2003-1307 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://bugs.php.net/38915http://hackerdom.ru/~dimmo/phpexpl.c
 http://www.securityfocus.com/archive/1/348368
 http://www.securityfocus.com/archive/1/449234/100/0/threaded
 http://www.securityfocus.com/archive/1/449298/100/0/threaded
 http://www.securityfocus.com/bid/9302
 
 | 
  | apache2-data | CVE-2003-1580 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://www.securityfocus.com/archive/1/313867
 | 
  | apache2-data | CVE-2003-1581 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://www.securityfocus.com/archive/1/313867
 | 
  | apache2-data | CVE-2007-0086 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://osvdb.org/33456http://www.securityfocus.com/archive/1/455833/100/0/threaded
 http://www.securityfocus.com/archive/1/455879/100/0/threaded
 http://www.securityfocus.com/archive/1/455882/100/0/threaded
 http://www.securityfocus.com/archive/1/455920/100/0/threaded
 
 | 
  | apache2-data | CVE-2007-1743 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
 http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
 http://www.securitytracker.com/id?1017904
 
 | 
  | apache2-data | CVE-2007-3303 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://osvdb.org/37050http://security.psnc.pl/files/apache_report.pdf
 http://securityreason.com/securityalert/2814
 http://www.securityfocus.com/archive/1/469899/100/0/threaded
 http://www.securityfocus.com/archive/1/471832/100/0/threaded
 http://www.securityfocus.com/bid/24215
 
 | 
  | apache2-data | CVE-2008-0456 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0130.html
 http://secunia.com/advisories/29348
 http://secunia.com/advisories/35074
 http://security.gentoo.org/glsa/glsa-200803-19.xml
 http://securityreason.com/securityalert/3575
 http://securitytracker.com/id?1019256
 http://support.apple.com/kb/HT3549
 http://www.mindedsecurity.com/MSA01150108.html
 http://www.securityfocus.com/archive/1/486847/100/0/threaded
 http://www.securityfocus.com/bid/27409
 http://www.us-cert.gov/cas/techalerts/TA09-133A.html
 http://www.vupen.com/english/advisories/2009/1297
 https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
 https://linux.oracle.com/cve/CVE-2008-0456.html
 https://linux.oracle.com/errata/ELSA-2013-0130.html
 https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
 
 | 
  | apache2-utils | CVE-2021-44790 | CRITICAL | 2.4.51-1~deb11u1 | 2.4.52-1~deb11u2 | Expand...http://httpd.apache.org/security/vulnerabilities_24.htmlhttp://www.openwall.com/lists/oss-security/2021/12/20/4
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://linux.oracle.com/cve/CVE-2021-44790.html
 https://linux.oracle.com/errata/ELSA-2022-0258.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20211224-0001/
 https://ubuntu.com/security/notices/USN-5212-1
 https://ubuntu.com/security/notices/USN-5212-2
 https://www.debian.org/security/2022/dsa-5035
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.tenable.com/security/tns-2022-01
 https://www.tenable.com/security/tns-2022-03
 
 | 
  | apache2-utils | CVE-2022-22720 | CRITICAL | 2.4.51-1~deb11u1 | 2.4.53-1~deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/03/14/3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720
 https://linux.oracle.com/cve/CVE-2022-22720.html
 https://linux.oracle.com/errata/ELSA-2022-1049.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20220321-0001/
 https://ubuntu.com/security/notices/USN-5333-1
 https://ubuntu.com/security/notices/USN-5333-2
 
 | 
  | apache2-utils | CVE-2022-22721 | CRITICAL | 2.4.51-1~deb11u1 | 2.4.53-1~deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/03/14/2https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721
 https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20220321-0001/
 https://ubuntu.com/security/notices/USN-5333-1
 https://ubuntu.com/security/notices/USN-5333-2
 
 | 
  | apache2-utils | CVE-2022-23943 | CRITICAL | 2.4.51-1~deb11u1 | 2.4.53-1~deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/03/14/1https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943
 https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20220321-0001/
 https://ubuntu.com/security/notices/USN-5333-1
 https://ubuntu.com/security/notices/USN-5333-2
 
 | 
  | apache2-utils | CVE-2021-44224 | HIGH | 2.4.51-1~deb11u1 | 2.4.52-1~deb11u2 | Expand...http://httpd.apache.org/security/vulnerabilities_24.htmlhttp://www.openwall.com/lists/oss-security/2021/12/20/3
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20211224-0001/
 https://ubuntu.com/security/notices/USN-5212-1
 https://ubuntu.com/security/notices/USN-5212-2
 https://www.debian.org/security/2022/dsa-5035
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.tenable.com/security/tns-2022-01
 https://www.tenable.com/security/tns-2022-03
 
 | 
  | apache2-utils | CVE-2022-22719 | HIGH | 2.4.51-1~deb11u1 | 2.4.53-1~deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/03/14/4https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719
 https://httpd.apache.org/security/vulnerabilities_24.html
 https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719
 https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
 https://security.netapp.com/advisory/ntap-20220321-0001/
 https://ubuntu.com/security/notices/USN-5333-1
 https://ubuntu.com/security/notices/USN-5333-2
 
 | 
  | apache2-utils | CVE-2001-1534 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.htmlhttp://www.iss.net/security_center/static/7494.php
 http://www.securityfocus.com/bid/3521
 
 | 
  | apache2-utils | CVE-2003-1307 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://bugs.php.net/38915http://hackerdom.ru/~dimmo/phpexpl.c
 http://www.securityfocus.com/archive/1/348368
 http://www.securityfocus.com/archive/1/449234/100/0/threaded
 http://www.securityfocus.com/archive/1/449298/100/0/threaded
 http://www.securityfocus.com/bid/9302
 
 | 
  | apache2-utils | CVE-2003-1580 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://www.securityfocus.com/archive/1/313867
 | 
  | apache2-utils | CVE-2003-1581 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://www.securityfocus.com/archive/1/313867
 | 
  | apache2-utils | CVE-2007-0086 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://osvdb.org/33456http://www.securityfocus.com/archive/1/455833/100/0/threaded
 http://www.securityfocus.com/archive/1/455879/100/0/threaded
 http://www.securityfocus.com/archive/1/455882/100/0/threaded
 http://www.securityfocus.com/archive/1/455920/100/0/threaded
 
 | 
  | apache2-utils | CVE-2007-1743 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2
 http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2
 http://www.securitytracker.com/id?1017904
 
 | 
  | apache2-utils | CVE-2007-3303 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://osvdb.org/37050http://security.psnc.pl/files/apache_report.pdf
 http://securityreason.com/securityalert/2814
 http://www.securityfocus.com/archive/1/469899/100/0/threaded
 http://www.securityfocus.com/archive/1/471832/100/0/threaded
 http://www.securityfocus.com/bid/24215
 
 | 
  | apache2-utils | CVE-2008-0456 | LOW | 2.4.51-1~deb11u1 |  | Expand...http://lists.apple.com/archives/security-announce/2009/May/msg00002.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0130.html
 http://secunia.com/advisories/29348
 http://secunia.com/advisories/35074
 http://security.gentoo.org/glsa/glsa-200803-19.xml
 http://securityreason.com/securityalert/3575
 http://securitytracker.com/id?1019256
 http://support.apple.com/kb/HT3549
 http://www.mindedsecurity.com/MSA01150108.html
 http://www.securityfocus.com/archive/1/486847/100/0/threaded
 http://www.securityfocus.com/bid/27409
 http://www.us-cert.gov/cas/techalerts/TA09-133A.html
 http://www.vupen.com/english/advisories/2009/1297
 https://exchange.xforce.ibmcloud.com/vulnerabilities/39893
 https://linux.oracle.com/cve/CVE-2008-0456.html
 https://linux.oracle.com/errata/ELSA-2013-0130.html
 https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
 https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
 
 | 
  | apt | CVE-2011-3374 | LOW | 2.2.4 |  | Expand...https://access.redhat.com/security/cve/cve-2011-3374https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
 https://seclists.org/fulldisclosure/2011/Sep/221
 https://security-tracker.debian.org/tracker/CVE-2011-3374
 https://snyk.io/vuln/SNYK-LINUX-APT-116518
 https://ubuntu.com/security/CVE-2011-3374
 
 | 
  | binutils | CVE-2017-13716 | LOW | 2.35.2-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716https://sourceware.org/bugzilla/show_bug.cgi?id=22009
 
 | 
  | binutils | CVE-2018-12934 | LOW | 2.35.2-2 |  | Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
 https://sourceware.org/bugzilla/show_bug.cgi?id=23059
 https://ubuntu.com/security/notices/USN-4326-1
 https://ubuntu.com/security/notices/USN-4336-1
 https://ubuntu.com/security/notices/USN-4336-2
 https://usn.ubuntu.com/4326-1/
 https://usn.ubuntu.com/4336-1/
 
 | 
  | binutils | CVE-2018-18483 | LOW | 2.35.2-2 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
 http://www.securityfocus.com/bid/105689
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
 https://sourceware.org/bugzilla/show_bug.cgi?id=23767
 https://ubuntu.com/security/notices/USN-4326-1
 https://ubuntu.com/security/notices/USN-4336-1
 https://ubuntu.com/security/notices/USN-4336-2
 https://usn.ubuntu.com/4326-1/
 https://usn.ubuntu.com/4336-1/
 
 | 
  | binutils | CVE-2018-20623 | LOW | 2.35.2-2 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
 http://www.securityfocus.com/bid/106370
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
 https://sourceware.org/bugzilla/show_bug.cgi?id=24049
 https://support.f5.com/csp/article/K38336243
 https://ubuntu.com/security/notices/USN-4336-1
 https://ubuntu.com/security/notices/USN-4336-2
 https://usn.ubuntu.com/4336-1/
 
 | 
  | binutils | CVE-2018-20673 | LOW | 2.35.2-2 |  | Expand...http://www.securityfocus.com/bid/106454https://linux.oracle.com/cve/CVE-2018-20673.html
 https://linux.oracle.com/errata/ELSA-2021-4386.html
 https://sourceware.org/bugzilla/show_bug.cgi?id=24039
 
 | 
  | binutils | CVE-2018-20712 | LOW | 2.35.2-2 |  | Expand...http://www.securityfocus.com/bid/106563https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
 https://sourceware.org/bugzilla/show_bug.cgi?id=24043
 https://support.f5.com/csp/article/K38336243
 
 | 
  | binutils | CVE-2018-9996 | LOW | 2.35.2-2 |  | Expand...http://www.securityfocus.com/bid/103733https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
 
 | 
  | binutils | CVE-2019-1010204 | LOW | 2.35.2-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204https://linux.oracle.com/cve/CVE-2019-1010204.html
 https://linux.oracle.com/errata/ELSA-2020-1797.html
 https://security.netapp.com/advisory/ntap-20190822-0001/
 https://sourceware.org/bugzilla/show_bug.cgi?id=23765
 https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS
 
 | 
  | binutils | CVE-2020-35448 | LOW | 2.35.2-2 |  | Expand...https://linux.oracle.com/cve/CVE-2020-35448.htmlhttps://linux.oracle.com/errata/ELSA-2021-4364.html
 https://security.netapp.com/advisory/ntap-20210129-0008/
 https://sourceware.org/bugzilla/show_bug.cgi?id=26574
 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
 
 | 
  | binutils | CVE-2021-20197 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743https://linux.oracle.com/cve/CVE-2021-20197.html
 https://linux.oracle.com/errata/ELSA-2021-4364.html
 https://security.netapp.com/advisory/ntap-20210528-0009/
 https://sourceware.org/bugzilla/show_bug.cgi?id=26945
 
 | 
  | binutils | CVE-2021-20284 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784https://linux.oracle.com/cve/CVE-2021-20284.html
 https://linux.oracle.com/errata/ELSA-2021-4364.html
 https://security.netapp.com/advisory/ntap-20210521-0010/
 https://sourceware.org/bugzilla/show_bug.cgi?id=26931
 
 | 
  | binutils | CVE-2021-3487 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
 https://linux.oracle.com/cve/CVE-2021-3487.html
 https://linux.oracle.com/errata/ELSA-2021-4364.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
 https://ubuntu.com/security/notices/USN-5124-1
 https://ubuntu.com/security/notices/USN-5341-1
 
 | 
  | binutils | CVE-2021-3530 | LOW | 2.35.2-2 |  | Expand...https://access.redhat.com/security/cve/CVE-2021-3530https://bugzilla.redhat.com/show_bug.cgi?id=1956423
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
 https://security.netapp.com/advisory/ntap-20210716-0006/
 https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
 
 | 
  | binutils | CVE-2021-3549 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
 
 | 
  | binutils | CVE-2021-45078 | LOW | 2.35.2-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
 https://security.netapp.com/advisory/ntap-20220107-0002/
 https://sourceware.org/bugzilla/show_bug.cgi?id=28694
 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
 https://ubuntu.com/security/notices/USN-5341-1
 
 | 
  | binutils | CVE-2021-46195 | LOW | 2.35.2-2 |  | Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
 | 
  | binutils-common | CVE-2017-13716 | LOW | 2.35.2-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716https://sourceware.org/bugzilla/show_bug.cgi?id=22009
 
 | 
  | binutils-common | CVE-2018-12934 | LOW | 2.35.2-2 |  | Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
 https://sourceware.org/bugzilla/show_bug.cgi?id=23059
 https://ubuntu.com/security/notices/USN-4326-1
 https://ubuntu.com/security/notices/USN-4336-1
 https://ubuntu.com/security/notices/USN-4336-2
 https://usn.ubuntu.com/4326-1/
 https://usn.ubuntu.com/4336-1/
 
 | 
  | binutils-common | CVE-2018-18483 | LOW | 2.35.2-2 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
 http://www.securityfocus.com/bid/105689
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
 https://sourceware.org/bugzilla/show_bug.cgi?id=23767
 https://ubuntu.com/security/notices/USN-4326-1
 https://ubuntu.com/security/notices/USN-4336-1
 https://ubuntu.com/security/notices/USN-4336-2
 https://usn.ubuntu.com/4326-1/
 https://usn.ubuntu.com/4336-1/
 
 | 
  | binutils-common | CVE-2018-20623 | LOW | 2.35.2-2 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
 http://www.securityfocus.com/bid/106370
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
 https://sourceware.org/bugzilla/show_bug.cgi?id=24049
 https://support.f5.com/csp/article/K38336243
 https://ubuntu.com/security/notices/USN-4336-1
 https://ubuntu.com/security/notices/USN-4336-2
 https://usn.ubuntu.com/4336-1/
 
 | 
  | binutils-common | CVE-2018-20673 | LOW | 2.35.2-2 |  | Expand...http://www.securityfocus.com/bid/106454https://linux.oracle.com/cve/CVE-2018-20673.html
 https://linux.oracle.com/errata/ELSA-2021-4386.html
 https://sourceware.org/bugzilla/show_bug.cgi?id=24039
 
 | 
  | binutils-common | CVE-2018-20712 | LOW | 2.35.2-2 |  | Expand...http://www.securityfocus.com/bid/106563https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
 https://sourceware.org/bugzilla/show_bug.cgi?id=24043
 https://support.f5.com/csp/article/K38336243
 
 | 
  | binutils-common | CVE-2018-9996 | LOW | 2.35.2-2 |  | Expand...http://www.securityfocus.com/bid/103733https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
 
 | 
  | binutils-common | CVE-2019-1010204 | LOW | 2.35.2-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204https://linux.oracle.com/cve/CVE-2019-1010204.html
 https://linux.oracle.com/errata/ELSA-2020-1797.html
 https://security.netapp.com/advisory/ntap-20190822-0001/
 https://sourceware.org/bugzilla/show_bug.cgi?id=23765
 https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS
 
 | 
  | binutils-common | CVE-2020-35448 | LOW | 2.35.2-2 |  | Expand...https://linux.oracle.com/cve/CVE-2020-35448.htmlhttps://linux.oracle.com/errata/ELSA-2021-4364.html
 https://security.netapp.com/advisory/ntap-20210129-0008/
 https://sourceware.org/bugzilla/show_bug.cgi?id=26574
 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
 
 | 
  | binutils-common | CVE-2021-20197 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743https://linux.oracle.com/cve/CVE-2021-20197.html
 https://linux.oracle.com/errata/ELSA-2021-4364.html
 https://security.netapp.com/advisory/ntap-20210528-0009/
 https://sourceware.org/bugzilla/show_bug.cgi?id=26945
 
 | 
  | binutils-common | CVE-2021-20284 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784https://linux.oracle.com/cve/CVE-2021-20284.html
 https://linux.oracle.com/errata/ELSA-2021-4364.html
 https://security.netapp.com/advisory/ntap-20210521-0010/
 https://sourceware.org/bugzilla/show_bug.cgi?id=26931
 
 | 
  | binutils-common | CVE-2021-3487 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
 https://linux.oracle.com/cve/CVE-2021-3487.html
 https://linux.oracle.com/errata/ELSA-2021-4364.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
 https://ubuntu.com/security/notices/USN-5124-1
 https://ubuntu.com/security/notices/USN-5341-1
 
 | 
  | binutils-common | CVE-2021-3530 | LOW | 2.35.2-2 |  | Expand...https://access.redhat.com/security/cve/CVE-2021-3530https://bugzilla.redhat.com/show_bug.cgi?id=1956423
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
 https://security.netapp.com/advisory/ntap-20210716-0006/
 https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
 
 | 
  | binutils-common | CVE-2021-3549 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
 
 | 
  | binutils-common | CVE-2021-45078 | LOW | 2.35.2-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
 https://security.netapp.com/advisory/ntap-20220107-0002/
 https://sourceware.org/bugzilla/show_bug.cgi?id=28694
 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
 https://ubuntu.com/security/notices/USN-5341-1
 
 | 
  | binutils-common | CVE-2021-46195 | LOW | 2.35.2-2 |  | Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
 | 
  | binutils-x86-64-linux-gnu | CVE-2017-13716 | LOW | 2.35.2-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716https://sourceware.org/bugzilla/show_bug.cgi?id=22009
 
 | 
  | binutils-x86-64-linux-gnu | CVE-2018-12934 | LOW | 2.35.2-2 |  | Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
 https://sourceware.org/bugzilla/show_bug.cgi?id=23059
 https://ubuntu.com/security/notices/USN-4326-1
 https://ubuntu.com/security/notices/USN-4336-1
 https://ubuntu.com/security/notices/USN-4336-2
 https://usn.ubuntu.com/4326-1/
 https://usn.ubuntu.com/4336-1/
 
 | 
  | binutils-x86-64-linux-gnu | CVE-2018-18483 | LOW | 2.35.2-2 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
 http://www.securityfocus.com/bid/105689
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
 https://sourceware.org/bugzilla/show_bug.cgi?id=23767
 https://ubuntu.com/security/notices/USN-4326-1
 https://ubuntu.com/security/notices/USN-4336-1
 https://ubuntu.com/security/notices/USN-4336-2
 https://usn.ubuntu.com/4326-1/
 https://usn.ubuntu.com/4336-1/
 
 | 
  | binutils-x86-64-linux-gnu | CVE-2018-20623 | LOW | 2.35.2-2 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
 http://www.securityfocus.com/bid/106370
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
 https://sourceware.org/bugzilla/show_bug.cgi?id=24049
 https://support.f5.com/csp/article/K38336243
 https://ubuntu.com/security/notices/USN-4336-1
 https://ubuntu.com/security/notices/USN-4336-2
 https://usn.ubuntu.com/4336-1/
 
 | 
  | binutils-x86-64-linux-gnu | CVE-2018-20673 | LOW | 2.35.2-2 |  | Expand...http://www.securityfocus.com/bid/106454https://linux.oracle.com/cve/CVE-2018-20673.html
 https://linux.oracle.com/errata/ELSA-2021-4386.html
 https://sourceware.org/bugzilla/show_bug.cgi?id=24039
 
 | 
  | binutils-x86-64-linux-gnu | CVE-2018-20712 | LOW | 2.35.2-2 |  | Expand...http://www.securityfocus.com/bid/106563https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
 https://sourceware.org/bugzilla/show_bug.cgi?id=24043
 https://support.f5.com/csp/article/K38336243
 
 | 
  | binutils-x86-64-linux-gnu | CVE-2018-9996 | LOW | 2.35.2-2 |  | Expand...http://www.securityfocus.com/bid/103733https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
 
 | 
  | binutils-x86-64-linux-gnu | CVE-2019-1010204 | LOW | 2.35.2-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204https://linux.oracle.com/cve/CVE-2019-1010204.html
 https://linux.oracle.com/errata/ELSA-2020-1797.html
 https://security.netapp.com/advisory/ntap-20190822-0001/
 https://sourceware.org/bugzilla/show_bug.cgi?id=23765
 https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS
 
 | 
  | binutils-x86-64-linux-gnu | CVE-2020-35448 | LOW | 2.35.2-2 |  | Expand...https://linux.oracle.com/cve/CVE-2020-35448.htmlhttps://linux.oracle.com/errata/ELSA-2021-4364.html
 https://security.netapp.com/advisory/ntap-20210129-0008/
 https://sourceware.org/bugzilla/show_bug.cgi?id=26574
 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
 
 | 
  | binutils-x86-64-linux-gnu | CVE-2021-20197 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743https://linux.oracle.com/cve/CVE-2021-20197.html
 https://linux.oracle.com/errata/ELSA-2021-4364.html
 https://security.netapp.com/advisory/ntap-20210528-0009/
 https://sourceware.org/bugzilla/show_bug.cgi?id=26945
 
 | 
  | binutils-x86-64-linux-gnu | CVE-2021-20284 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784https://linux.oracle.com/cve/CVE-2021-20284.html
 https://linux.oracle.com/errata/ELSA-2021-4364.html
 https://security.netapp.com/advisory/ntap-20210521-0010/
 https://sourceware.org/bugzilla/show_bug.cgi?id=26931
 
 | 
  | binutils-x86-64-linux-gnu | CVE-2021-3487 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
 https://linux.oracle.com/cve/CVE-2021-3487.html
 https://linux.oracle.com/errata/ELSA-2021-4364.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
 https://ubuntu.com/security/notices/USN-5124-1
 https://ubuntu.com/security/notices/USN-5341-1
 
 | 
  | binutils-x86-64-linux-gnu | CVE-2021-3530 | LOW | 2.35.2-2 |  | Expand...https://access.redhat.com/security/cve/CVE-2021-3530https://bugzilla.redhat.com/show_bug.cgi?id=1956423
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
 https://security.netapp.com/advisory/ntap-20210716-0006/
 https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
 
 | 
  | binutils-x86-64-linux-gnu | CVE-2021-3549 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
 
 | 
  | binutils-x86-64-linux-gnu | CVE-2021-45078 | LOW | 2.35.2-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
 https://security.netapp.com/advisory/ntap-20220107-0002/
 https://sourceware.org/bugzilla/show_bug.cgi?id=28694
 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
 https://ubuntu.com/security/notices/USN-5341-1
 
 | 
  | binutils-x86-64-linux-gnu | CVE-2021-46195 | LOW | 2.35.2-2 |  | Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
 | 
  | bsdutils | CVE-2021-3995 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
 https://ubuntu.com/security/notices/USN-5279-1
 https://www.openwall.com/lists/oss-security/2022/01/24/2
 
 | 
  | bsdutils | CVE-2021-3996 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
 https://ubuntu.com/security/notices/USN-5279-1
 https://www.openwall.com/lists/oss-security/2022/01/24/2
 
 | 
  | bsdutils | CVE-2022-0563 | LOW | 2.36.1-8 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | coreutils | CVE-2016-2781 | LOW | 8.32-4 |  | Expand...http://seclists.org/oss-sec/2016/q1/452http://www.openwall.com/lists/oss-security/2016/02/28/2
 http://www.openwall.com/lists/oss-security/2016/02/28/3
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lore.kernel.org/patchwork/patch/793178/
 
 | 
  | coreutils | CVE-2017-18018 | LOW | 8.32-4 |  | Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
 | 
  | curl | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 |  | Expand...http://seclists.org/fulldisclosure/2022/Mar/29https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
 https://curl.se/docs/CVE-2021-22945.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
 https://hackerone.com/reports/1269242
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
 https://security.netapp.com/advisory/ntap-20211029-0003/
 https://support.apple.com/kb/HT213183
 https://ubuntu.com/security/notices/USN-5079-1
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | curl | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 |  | Expand...http://seclists.org/fulldisclosure/2022/Mar/29https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
 https://curl.se/docs/CVE-2021-22946.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
 https://hackerone.com/reports/1334111
 https://linux.oracle.com/cve/CVE-2021-22946.html
 https://linux.oracle.com/errata/ELSA-2021-4059.html
 https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
 https://security.netapp.com/advisory/ntap-20211029-0003/
 https://security.netapp.com/advisory/ntap-20220121-0008/
 https://support.apple.com/kb/HT213183
 https://ubuntu.com/security/notices/USN-5079-1
 https://ubuntu.com/security/notices/USN-5079-2
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | curl | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 |  | Expand...http://seclists.org/fulldisclosure/2022/Mar/29https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
 https://curl.se/docs/CVE-2021-22947.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
 https://hackerone.com/reports/1334763
 https://launchpad.net/bugs/1944120 (regression bug)
 https://linux.oracle.com/cve/CVE-2021-22947.html
 https://linux.oracle.com/errata/ELSA-2021-4059.html
 https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
 https://security.netapp.com/advisory/ntap-20211029-0003/
 https://support.apple.com/kb/HT213183
 https://ubuntu.com/security/notices/USN-5079-1
 https://ubuntu.com/security/notices/USN-5079-2
 https://ubuntu.com/security/notices/USN-5079-3
 https://ubuntu.com/security/notices/USN-5079-4
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | curl | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 |  | Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
 https://curl.se/docs/CVE-2021-22898.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
 https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
 https://hackerone.com/reports/1176461
 https://linux.oracle.com/cve/CVE-2021-22898.html
 https://linux.oracle.com/errata/ELSA-2021-4511.html
 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
 https://ubuntu.com/security/notices/USN-5021-1
 https://ubuntu.com/security/notices/USN-5021-2
 https://www.oracle.com//security-alerts/cpujul2021.html
 https://www.oracle.com/security-alerts/cpujan2022.html
 
 | 
  | curl | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 |  | Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdfhttps://curl.se/docs/CVE-2021-22922.html
 https://hackerone.com/reports/1213175
 https://linux.oracle.com/cve/CVE-2021-22922.html
 https://linux.oracle.com/errata/ELSA-2021-3582.html
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://security.netapp.com/advisory/ntap-20210902-0003/
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | curl | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 |  | Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdfhttps://curl.se/docs/CVE-2021-22923.html
 https://hackerone.com/reports/1213181
 https://linux.oracle.com/cve/CVE-2021-22923.html
 https://linux.oracle.com/errata/ELSA-2021-3582.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://security.netapp.com/advisory/ntap-20210902-0003/
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | curl | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 |  | Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdfhttps://curl.se/docs/CVE-2021-22924.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
 https://hackerone.com/reports/1223565
 https://linux.oracle.com/cve/CVE-2021-22924.html
 https://linux.oracle.com/errata/ELSA-2021-3582.html
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
 https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://security.netapp.com/advisory/ntap-20210902-0003/
 https://ubuntu.com/security/notices/USN-5021-1
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | gir1.2-gdkpixbuf-2.0 | CVE-2021-44648 | HIGH | 2.42.2+dfsg-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/
 https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/
 
 | 
  | imagemagick | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick | CVE-2021-4219 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2054611
 | 
  | imagemagick | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
 https://github.com/ImageMagick/ImageMagick/pull/3177
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | imagemagick | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
 https://github.com/ImageMagick/ImageMagick/pull/3193
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | imagemagick | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
 https://github.com/ImageMagick/ImageMagick/pull/3194
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
 https://github.com/ImageMagick/ImageMagick/issues/3176
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | imagemagick | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
 
 | 
  | imagemagick | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.htmlhttp://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
 
 | 
  | imagemagick | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.htmlhttp://secunia.com/advisories/30879
 http://secunia.com/advisories/32151
 http://sourceforge.net/forum/forum.php?forum_id=841176
 http://sourceforge.net/project/shownotes.php?release_id=610253
 http://www.securityfocus.com/bid/30055
 http://www.securitytracker.com/id?1020413
 http://www.vupen.com/english/advisories/2008/1984/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
 
 | 
  | imagemagick | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2http://www.openwall.com/lists/oss-security/2016/12/08/18
 http://www.securityfocus.com/bid/93599
 https://bugzilla.redhat.com/show_bug.cgi?id=1385694
 https://github.com/ImageMagick/ImageMagick/issues/272
 
 | 
  | imagemagick | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
 | 
  | imagemagick | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
 | 
  | imagemagick | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/97166https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
 https://github.com/ImageMagick/ImageMagick/issues/271
 
 | 
  | imagemagick | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/105137https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
 https://github.com/ImageMagick/ImageMagick/issues/1255
 https://linux.oracle.com/cve/CVE-2018-15607.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4034-1
 https://usn.ubuntu.com/4034-1/
 
 | 
  | imagemagick | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
 | 
  | imagemagick-6-common | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6-common | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6-common | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6-common | CVE-2021-4219 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2054611
 | 
  | imagemagick-6-common | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
 https://github.com/ImageMagick/ImageMagick/pull/3177
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | imagemagick-6-common | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
 https://github.com/ImageMagick/ImageMagick/pull/3193
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | imagemagick-6-common | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
 https://github.com/ImageMagick/ImageMagick/pull/3194
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6-common | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
 https://github.com/ImageMagick/ImageMagick/issues/3176
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | imagemagick-6-common | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6-common | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
 
 | 
  | imagemagick-6-common | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.htmlhttp://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
 
 | 
  | imagemagick-6-common | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.htmlhttp://secunia.com/advisories/30879
 http://secunia.com/advisories/32151
 http://sourceforge.net/forum/forum.php?forum_id=841176
 http://sourceforge.net/project/shownotes.php?release_id=610253
 http://www.securityfocus.com/bid/30055
 http://www.securitytracker.com/id?1020413
 http://www.vupen.com/english/advisories/2008/1984/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
 
 | 
  | imagemagick-6-common | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2http://www.openwall.com/lists/oss-security/2016/12/08/18
 http://www.securityfocus.com/bid/93599
 https://bugzilla.redhat.com/show_bug.cgi?id=1385694
 https://github.com/ImageMagick/ImageMagick/issues/272
 
 | 
  | imagemagick-6-common | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
 | 
  | imagemagick-6-common | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
 | 
  | imagemagick-6-common | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/97166https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
 https://github.com/ImageMagick/ImageMagick/issues/271
 
 | 
  | imagemagick-6-common | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/105137https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
 https://github.com/ImageMagick/ImageMagick/issues/1255
 https://linux.oracle.com/cve/CVE-2018-15607.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4034-1
 https://usn.ubuntu.com/4034-1/
 
 | 
  | imagemagick-6-common | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
 | 
  | imagemagick-6.q16 | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6.q16 | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6.q16 | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6.q16 | CVE-2021-4219 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2054611
 | 
  | imagemagick-6.q16 | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
 https://github.com/ImageMagick/ImageMagick/pull/3177
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | imagemagick-6.q16 | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
 https://github.com/ImageMagick/ImageMagick/pull/3193
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | imagemagick-6.q16 | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
 https://github.com/ImageMagick/ImageMagick/pull/3194
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6.q16 | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
 https://github.com/ImageMagick/ImageMagick/issues/3176
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | imagemagick-6.q16 | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | imagemagick-6.q16 | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
 
 | 
  | imagemagick-6.q16 | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.htmlhttp://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
 
 | 
  | imagemagick-6.q16 | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.htmlhttp://secunia.com/advisories/30879
 http://secunia.com/advisories/32151
 http://sourceforge.net/forum/forum.php?forum_id=841176
 http://sourceforge.net/project/shownotes.php?release_id=610253
 http://www.securityfocus.com/bid/30055
 http://www.securitytracker.com/id?1020413
 http://www.vupen.com/english/advisories/2008/1984/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
 
 | 
  | imagemagick-6.q16 | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2http://www.openwall.com/lists/oss-security/2016/12/08/18
 http://www.securityfocus.com/bid/93599
 https://bugzilla.redhat.com/show_bug.cgi?id=1385694
 https://github.com/ImageMagick/ImageMagick/issues/272
 
 | 
  | imagemagick-6.q16 | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
 | 
  | imagemagick-6.q16 | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
 | 
  | imagemagick-6.q16 | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/97166https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
 https://github.com/ImageMagick/ImageMagick/issues/271
 
 | 
  | imagemagick-6.q16 | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/105137https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
 https://github.com/ImageMagick/ImageMagick/issues/1255
 https://linux.oracle.com/cve/CVE-2018-15607.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4034-1
 https://usn.ubuntu.com/4034-1/
 
 | 
  | imagemagick-6.q16 | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
 | 
  | libaom0 | CVE-2021-30473 | CRITICAL | 1.0.0.errata1-3 |  | Expand...https://aomedia.googlesource.com/aom/+/4efe20e99dcd9b6f8eadc8de8acc825be7416578https://bugs.chromium.org/p/aomedia/issues/detail?id=2998
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXCI33HXH6YSOGC2LPE2REQLMIDH6US4/
 
 | 
  | libaom0 | CVE-2021-30474 | CRITICAL | 1.0.0.errata1-3 |  | Expand...https://aomedia.googlesource.com/aom/+/6e31957b6dc62dbc7d1bb70cd84902dd14c4bf2ehttps://bugs.chromium.org/p/aomedia/issues/detail?id=3000
 
 | 
  | libaom0 | CVE-2021-30475 | CRITICAL | 1.0.0.errata1-3 |  | Expand...https://aomedia.googlesource.com/aom/+/12adc723acf02633595a4d8da8345742729f46c0https://bugs.chromium.org/p/aomedia/issues/detail?id=2999
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXCI33HXH6YSOGC2LPE2REQLMIDH6US4/
 
 | 
  | libaom0 | CVE-2020-36131 | HIGH | 1.0.0.errata1-3 |  | Expand...https://aomedia.googlesource.com/aom/+/94bcbfe76b0fd5b8ac03645082dc23a88730c949 (v2.0.1)https://bugs.chromium.org/p/aomedia/issues/detail?id=2911&q=&can=1
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
 
 | 
  | libaom0 | CVE-2020-36133 | HIGH | 1.0.0.errata1-3 |  | Expand...https://aomedia.googlesource.com/aom/+/5c9bc4181071684d157fc47c736acf6c69a85d85 (v3.0.0)https://bugs.chromium.org/p/aomedia/issues/detail?id=2913&q=&can=1
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36133
 
 | 
  | libaom0 | CVE-2020-36130 | MEDIUM | 1.0.0.errata1-3 |  | Expand...https://aomedia.googlesource.com/aom/+/be4ee75fd762d361d0679cc892e4c74af8140093%5E%21/#F0 (v2.0.1)https://bugs.chromium.org/p/aomedia/issues/detail?id=2905&q=&can=1
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36130
 
 | 
  | libaom0 | CVE-2020-36135 | MEDIUM | 1.0.0.errata1-3 |  | Expand...https://aomedia.googlesource.com/aom/+/94bcbfe76b0fd5b8ac03645082dc23a88730c949 (v2.0.1)https://bugs.chromium.org/p/aomedia/issues/detail?id=2910&q=&can=1
 https://bugs.chromium.org/p/aomedia/issues/detail?id=2911
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36135
 
 | 
  | libapt-pkg6.0 | CVE-2011-3374 | LOW | 2.2.4 |  | Expand...https://access.redhat.com/security/cve/cve-2011-3374https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
 https://seclists.org/fulldisclosure/2011/Sep/221
 https://security-tracker.debian.org/tracker/CVE-2011-3374
 https://snyk.io/vuln/SNYK-LINUX-APT-116518
 https://ubuntu.com/security/CVE-2011-3374
 
 | 
  | libbinutils | CVE-2017-13716 | LOW | 2.35.2-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716https://sourceware.org/bugzilla/show_bug.cgi?id=22009
 
 | 
  | libbinutils | CVE-2018-12934 | LOW | 2.35.2-2 |  | Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
 https://sourceware.org/bugzilla/show_bug.cgi?id=23059
 https://ubuntu.com/security/notices/USN-4326-1
 https://ubuntu.com/security/notices/USN-4336-1
 https://ubuntu.com/security/notices/USN-4336-2
 https://usn.ubuntu.com/4326-1/
 https://usn.ubuntu.com/4336-1/
 
 | 
  | libbinutils | CVE-2018-18483 | LOW | 2.35.2-2 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
 http://www.securityfocus.com/bid/105689
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
 https://sourceware.org/bugzilla/show_bug.cgi?id=23767
 https://ubuntu.com/security/notices/USN-4326-1
 https://ubuntu.com/security/notices/USN-4336-1
 https://ubuntu.com/security/notices/USN-4336-2
 https://usn.ubuntu.com/4326-1/
 https://usn.ubuntu.com/4336-1/
 
 | 
  | libbinutils | CVE-2018-20623 | LOW | 2.35.2-2 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
 http://www.securityfocus.com/bid/106370
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
 https://sourceware.org/bugzilla/show_bug.cgi?id=24049
 https://support.f5.com/csp/article/K38336243
 https://ubuntu.com/security/notices/USN-4336-1
 https://ubuntu.com/security/notices/USN-4336-2
 https://usn.ubuntu.com/4336-1/
 
 | 
  | libbinutils | CVE-2018-20673 | LOW | 2.35.2-2 |  | Expand...http://www.securityfocus.com/bid/106454https://linux.oracle.com/cve/CVE-2018-20673.html
 https://linux.oracle.com/errata/ELSA-2021-4386.html
 https://sourceware.org/bugzilla/show_bug.cgi?id=24039
 
 | 
  | libbinutils | CVE-2018-20712 | LOW | 2.35.2-2 |  | Expand...http://www.securityfocus.com/bid/106563https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
 https://sourceware.org/bugzilla/show_bug.cgi?id=24043
 https://support.f5.com/csp/article/K38336243
 
 | 
  | libbinutils | CVE-2018-9996 | LOW | 2.35.2-2 |  | Expand...http://www.securityfocus.com/bid/103733https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
 
 | 
  | libbinutils | CVE-2019-1010204 | LOW | 2.35.2-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204https://linux.oracle.com/cve/CVE-2019-1010204.html
 https://linux.oracle.com/errata/ELSA-2020-1797.html
 https://security.netapp.com/advisory/ntap-20190822-0001/
 https://sourceware.org/bugzilla/show_bug.cgi?id=23765
 https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS
 
 | 
  | libbinutils | CVE-2020-35448 | LOW | 2.35.2-2 |  | Expand...https://linux.oracle.com/cve/CVE-2020-35448.htmlhttps://linux.oracle.com/errata/ELSA-2021-4364.html
 https://security.netapp.com/advisory/ntap-20210129-0008/
 https://sourceware.org/bugzilla/show_bug.cgi?id=26574
 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
 
 | 
  | libbinutils | CVE-2021-20197 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743https://linux.oracle.com/cve/CVE-2021-20197.html
 https://linux.oracle.com/errata/ELSA-2021-4364.html
 https://security.netapp.com/advisory/ntap-20210528-0009/
 https://sourceware.org/bugzilla/show_bug.cgi?id=26945
 
 | 
  | libbinutils | CVE-2021-20284 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784https://linux.oracle.com/cve/CVE-2021-20284.html
 https://linux.oracle.com/errata/ELSA-2021-4364.html
 https://security.netapp.com/advisory/ntap-20210521-0010/
 https://sourceware.org/bugzilla/show_bug.cgi?id=26931
 
 | 
  | libbinutils | CVE-2021-3487 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
 https://linux.oracle.com/cve/CVE-2021-3487.html
 https://linux.oracle.com/errata/ELSA-2021-4364.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
 https://ubuntu.com/security/notices/USN-5124-1
 https://ubuntu.com/security/notices/USN-5341-1
 
 | 
  | libbinutils | CVE-2021-3530 | LOW | 2.35.2-2 |  | Expand...https://access.redhat.com/security/cve/CVE-2021-3530https://bugzilla.redhat.com/show_bug.cgi?id=1956423
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
 https://security.netapp.com/advisory/ntap-20210716-0006/
 https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
 
 | 
  | libbinutils | CVE-2021-3549 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
 
 | 
  | libbinutils | CVE-2021-45078 | LOW | 2.35.2-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
 https://security.netapp.com/advisory/ntap-20220107-0002/
 https://sourceware.org/bugzilla/show_bug.cgi?id=28694
 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
 https://ubuntu.com/security/notices/USN-5341-1
 
 | 
  | libbinutils | CVE-2021-46195 | LOW | 2.35.2-2 |  | Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
 | 
  | libblkid-dev | CVE-2021-3995 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
 https://ubuntu.com/security/notices/USN-5279-1
 https://www.openwall.com/lists/oss-security/2022/01/24/2
 
 | 
  | libblkid-dev | CVE-2021-3996 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
 https://ubuntu.com/security/notices/USN-5279-1
 https://www.openwall.com/lists/oss-security/2022/01/24/2
 
 | 
  | libblkid-dev | CVE-2022-0563 | LOW | 2.36.1-8 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | libblkid1 | CVE-2021-3995 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
 https://ubuntu.com/security/notices/USN-5279-1
 https://www.openwall.com/lists/oss-security/2022/01/24/2
 
 | 
  | libblkid1 | CVE-2021-3996 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
 https://ubuntu.com/security/notices/USN-5279-1
 https://www.openwall.com/lists/oss-security/2022/01/24/2
 
 | 
  | libblkid1 | CVE-2022-0563 | LOW | 2.36.1-8 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | libc-bin | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | 2.31-13+deb11u3 | Expand...https://linux.oracle.com/cve/CVE-2021-33574.htmlhttps://linux.oracle.com/errata/ELSA-2021-9560.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
 https://security.gentoo.org/glsa/202107-07
 https://security.netapp.com/advisory/ntap-20210629-0005/
 https://sourceware.org/bugzilla/show_bug.cgi?id=27896
 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
 
 | 
  | libc-bin | CVE-2022-23218 | CRITICAL | 2.31-13+deb11u2 | 2.31-13+deb11u3 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218https://linux.oracle.com/cve/CVE-2022-23218.html
 https://linux.oracle.com/errata/ELSA-2022-9234.html
 https://sourceware.org/bugzilla/show_bug.cgi?id=28768
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 
 | 
  | libc-bin | CVE-2022-23219 | CRITICAL | 2.31-13+deb11u2 | 2.31-13+deb11u3 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219https://linux.oracle.com/cve/CVE-2022-23219.html
 https://linux.oracle.com/errata/ELSA-2022-9234.html
 https://sourceware.org/bugzilla/show_bug.cgi?id=22542
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 
 | 
  | libc-bin | CVE-2021-3999 | HIGH | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999https://linux.oracle.com/cve/CVE-2021-3999.html
 https://linux.oracle.com/errata/ELSA-2022-9234.html
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 https://www.openwall.com/lists/oss-security/2022/01/24/4
 
 | 
  | libc-bin | CVE-2021-3998 | MEDIUM | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998https://ubuntu.com/security/notices/USN-5310-1
 https://www.openwall.com/lists/oss-security/2022/01/24/4
 
 | 
  | libc-bin | CVE-2010-4756 | LOW | 2.31-13+deb11u2 |  | Expand...http://cxib.net/stuff/glob-0day.chttp://securityreason.com/achievement_securityalert/89
 http://securityreason.com/exploitalert/9223
 https://bugzilla.redhat.com/show_bug.cgi?id=681681
 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
 
 | 
  | libc-bin | CVE-2018-20796 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/107160https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
 https://security.netapp.com/advisory/ntap-20190315-0002/
 https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
 
 | 
  | libc-bin | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 |  | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022https://sourceware.org/bugzilla/show_bug.cgi?id=22850
 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
 https://ubuntu.com/security/CVE-2019-1010022
 
 | 
  | libc-bin | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/109167https://security-tracker.debian.org/tracker/CVE-2019-1010023
 https://sourceware.org/bugzilla/show_bug.cgi?id=22851
 https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010023
 
 | 
  | libc-bin | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/109162https://security-tracker.debian.org/tracker/CVE-2019-1010024
 https://sourceware.org/bugzilla/show_bug.cgi?id=22852
 https://support.f5.com/csp/article/K06046097
 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010024
 
 | 
  | libc-bin | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 |  | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025https://sourceware.org/bugzilla/show_bug.cgi?id=22853
 https://support.f5.com/csp/article/K06046097
 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010025
 
 | 
  | libc-bin | CVE-2019-9192 | LOW | 2.31-13+deb11u2 |  | Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
 
 | 
  | libc-bin | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | 2.31-13+deb11u3 | Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396https://sourceware.org/bugzilla/show_bug.cgi?id=28524
 https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
 
 | 
  | libc-dev-bin | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | 2.31-13+deb11u3 | Expand...https://linux.oracle.com/cve/CVE-2021-33574.htmlhttps://linux.oracle.com/errata/ELSA-2021-9560.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
 https://security.gentoo.org/glsa/202107-07
 https://security.netapp.com/advisory/ntap-20210629-0005/
 https://sourceware.org/bugzilla/show_bug.cgi?id=27896
 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
 
 | 
  | libc-dev-bin | CVE-2022-23218 | CRITICAL | 2.31-13+deb11u2 | 2.31-13+deb11u3 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218https://linux.oracle.com/cve/CVE-2022-23218.html
 https://linux.oracle.com/errata/ELSA-2022-9234.html
 https://sourceware.org/bugzilla/show_bug.cgi?id=28768
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 
 | 
  | libc-dev-bin | CVE-2022-23219 | CRITICAL | 2.31-13+deb11u2 | 2.31-13+deb11u3 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219https://linux.oracle.com/cve/CVE-2022-23219.html
 https://linux.oracle.com/errata/ELSA-2022-9234.html
 https://sourceware.org/bugzilla/show_bug.cgi?id=22542
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 
 | 
  | libc-dev-bin | CVE-2021-3999 | HIGH | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999https://linux.oracle.com/cve/CVE-2021-3999.html
 https://linux.oracle.com/errata/ELSA-2022-9234.html
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 https://www.openwall.com/lists/oss-security/2022/01/24/4
 
 | 
  | libc-dev-bin | CVE-2021-3998 | MEDIUM | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998https://ubuntu.com/security/notices/USN-5310-1
 https://www.openwall.com/lists/oss-security/2022/01/24/4
 
 | 
  | libc-dev-bin | CVE-2010-4756 | LOW | 2.31-13+deb11u2 |  | Expand...http://cxib.net/stuff/glob-0day.chttp://securityreason.com/achievement_securityalert/89
 http://securityreason.com/exploitalert/9223
 https://bugzilla.redhat.com/show_bug.cgi?id=681681
 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
 
 | 
  | libc-dev-bin | CVE-2018-20796 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/107160https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
 https://security.netapp.com/advisory/ntap-20190315-0002/
 https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
 
 | 
  | libc-dev-bin | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 |  | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022https://sourceware.org/bugzilla/show_bug.cgi?id=22850
 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
 https://ubuntu.com/security/CVE-2019-1010022
 
 | 
  | libc-dev-bin | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/109167https://security-tracker.debian.org/tracker/CVE-2019-1010023
 https://sourceware.org/bugzilla/show_bug.cgi?id=22851
 https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010023
 
 | 
  | libc-dev-bin | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/109162https://security-tracker.debian.org/tracker/CVE-2019-1010024
 https://sourceware.org/bugzilla/show_bug.cgi?id=22852
 https://support.f5.com/csp/article/K06046097
 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010024
 
 | 
  | libc-dev-bin | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 |  | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025https://sourceware.org/bugzilla/show_bug.cgi?id=22853
 https://support.f5.com/csp/article/K06046097
 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010025
 
 | 
  | libc-dev-bin | CVE-2019-9192 | LOW | 2.31-13+deb11u2 |  | Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
 
 | 
  | libc-dev-bin | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | 2.31-13+deb11u3 | Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396https://sourceware.org/bugzilla/show_bug.cgi?id=28524
 https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
 
 | 
  | libc6 | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | 2.31-13+deb11u3 | Expand...https://linux.oracle.com/cve/CVE-2021-33574.htmlhttps://linux.oracle.com/errata/ELSA-2021-9560.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
 https://security.gentoo.org/glsa/202107-07
 https://security.netapp.com/advisory/ntap-20210629-0005/
 https://sourceware.org/bugzilla/show_bug.cgi?id=27896
 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
 
 | 
  | libc6 | CVE-2022-23218 | CRITICAL | 2.31-13+deb11u2 | 2.31-13+deb11u3 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218https://linux.oracle.com/cve/CVE-2022-23218.html
 https://linux.oracle.com/errata/ELSA-2022-9234.html
 https://sourceware.org/bugzilla/show_bug.cgi?id=28768
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 
 | 
  | libc6 | CVE-2022-23219 | CRITICAL | 2.31-13+deb11u2 | 2.31-13+deb11u3 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219https://linux.oracle.com/cve/CVE-2022-23219.html
 https://linux.oracle.com/errata/ELSA-2022-9234.html
 https://sourceware.org/bugzilla/show_bug.cgi?id=22542
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 
 | 
  | libc6 | CVE-2021-3999 | HIGH | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999https://linux.oracle.com/cve/CVE-2021-3999.html
 https://linux.oracle.com/errata/ELSA-2022-9234.html
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 https://www.openwall.com/lists/oss-security/2022/01/24/4
 
 | 
  | libc6 | CVE-2021-3998 | MEDIUM | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998https://ubuntu.com/security/notices/USN-5310-1
 https://www.openwall.com/lists/oss-security/2022/01/24/4
 
 | 
  | libc6 | CVE-2010-4756 | LOW | 2.31-13+deb11u2 |  | Expand...http://cxib.net/stuff/glob-0day.chttp://securityreason.com/achievement_securityalert/89
 http://securityreason.com/exploitalert/9223
 https://bugzilla.redhat.com/show_bug.cgi?id=681681
 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
 
 | 
  | libc6 | CVE-2018-20796 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/107160https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
 https://security.netapp.com/advisory/ntap-20190315-0002/
 https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
 
 | 
  | libc6 | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 |  | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022https://sourceware.org/bugzilla/show_bug.cgi?id=22850
 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
 https://ubuntu.com/security/CVE-2019-1010022
 
 | 
  | libc6 | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/109167https://security-tracker.debian.org/tracker/CVE-2019-1010023
 https://sourceware.org/bugzilla/show_bug.cgi?id=22851
 https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010023
 
 | 
  | libc6 | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/109162https://security-tracker.debian.org/tracker/CVE-2019-1010024
 https://sourceware.org/bugzilla/show_bug.cgi?id=22852
 https://support.f5.com/csp/article/K06046097
 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010024
 
 | 
  | libc6 | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 |  | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025https://sourceware.org/bugzilla/show_bug.cgi?id=22853
 https://support.f5.com/csp/article/K06046097
 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010025
 
 | 
  | libc6 | CVE-2019-9192 | LOW | 2.31-13+deb11u2 |  | Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
 
 | 
  | libc6 | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | 2.31-13+deb11u3 | Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396https://sourceware.org/bugzilla/show_bug.cgi?id=28524
 https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
 
 | 
  | libc6-dev | CVE-2021-33574 | CRITICAL | 2.31-13+deb11u2 | 2.31-13+deb11u3 | Expand...https://linux.oracle.com/cve/CVE-2021-33574.htmlhttps://linux.oracle.com/errata/ELSA-2021-9560.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
 https://security.gentoo.org/glsa/202107-07
 https://security.netapp.com/advisory/ntap-20210629-0005/
 https://sourceware.org/bugzilla/show_bug.cgi?id=27896
 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
 
 | 
  | libc6-dev | CVE-2022-23218 | CRITICAL | 2.31-13+deb11u2 | 2.31-13+deb11u3 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218https://linux.oracle.com/cve/CVE-2022-23218.html
 https://linux.oracle.com/errata/ELSA-2022-9234.html
 https://sourceware.org/bugzilla/show_bug.cgi?id=28768
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 
 | 
  | libc6-dev | CVE-2022-23219 | CRITICAL | 2.31-13+deb11u2 | 2.31-13+deb11u3 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219https://linux.oracle.com/cve/CVE-2022-23219.html
 https://linux.oracle.com/errata/ELSA-2022-9234.html
 https://sourceware.org/bugzilla/show_bug.cgi?id=22542
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 
 | 
  | libc6-dev | CVE-2021-3999 | HIGH | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999https://linux.oracle.com/cve/CVE-2021-3999.html
 https://linux.oracle.com/errata/ELSA-2022-9234.html
 https://ubuntu.com/security/notices/USN-5310-1
 https://ubuntu.com/security/notices/USN-5310-2
 https://www.openwall.com/lists/oss-security/2022/01/24/4
 
 | 
  | libc6-dev | CVE-2021-3998 | MEDIUM | 2.31-13+deb11u2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998https://ubuntu.com/security/notices/USN-5310-1
 https://www.openwall.com/lists/oss-security/2022/01/24/4
 
 | 
  | libc6-dev | CVE-2010-4756 | LOW | 2.31-13+deb11u2 |  | Expand...http://cxib.net/stuff/glob-0day.chttp://securityreason.com/achievement_securityalert/89
 http://securityreason.com/exploitalert/9223
 https://bugzilla.redhat.com/show_bug.cgi?id=681681
 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
 
 | 
  | libc6-dev | CVE-2018-20796 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/107160https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
 https://security.netapp.com/advisory/ntap-20190315-0002/
 https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
 
 | 
  | libc6-dev | CVE-2019-1010022 | LOW | 2.31-13+deb11u2 |  | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010022https://sourceware.org/bugzilla/show_bug.cgi?id=22850
 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
 https://ubuntu.com/security/CVE-2019-1010022
 
 | 
  | libc6-dev | CVE-2019-1010023 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/109167https://security-tracker.debian.org/tracker/CVE-2019-1010023
 https://sourceware.org/bugzilla/show_bug.cgi?id=22851
 https://support.f5.com/csp/article/K11932200?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010023
 
 | 
  | libc6-dev | CVE-2019-1010024 | LOW | 2.31-13+deb11u2 |  | Expand...http://www.securityfocus.com/bid/109162https://security-tracker.debian.org/tracker/CVE-2019-1010024
 https://sourceware.org/bugzilla/show_bug.cgi?id=22852
 https://support.f5.com/csp/article/K06046097
 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010024
 
 | 
  | libc6-dev | CVE-2019-1010025 | LOW | 2.31-13+deb11u2 |  | Expand...https://security-tracker.debian.org/tracker/CVE-2019-1010025https://sourceware.org/bugzilla/show_bug.cgi?id=22853
 https://support.f5.com/csp/article/K06046097
 https://support.f5.com/csp/article/K06046097?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/CVE-2019-1010025
 
 | 
  | libc6-dev | CVE-2019-9192 | LOW | 2.31-13+deb11u2 |  | Expand...https://sourceware.org/bugzilla/show_bug.cgi?id=24269https://support.f5.com/csp/article/K26346590?utm_source=f5support&utm_medium=RSS
 
 | 
  | libc6-dev | CVE-2021-43396 | LOW | 2.31-13+deb11u2 | 2.31-13+deb11u3 | Expand...https://blog.tuxcare.com/vulnerability/vulnerability-in-iconv-identified-by-tuxcare-team-cve-2021-43396https://sourceware.org/bugzilla/show_bug.cgi?id=28524
 https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
 
 | 
  | libcairo-gobject2 | CVE-2017-7475 | LOW | 1.16.0-5 |  | Expand...http://seclists.org/oss-sec/2017/q2/151https://bugs.freedesktop.org/show_bug.cgi?id=100763
 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
 https://github.com/advisories/GHSA-5v3f-73gv-x7x5
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://nvd.nist.gov/vuln/detail/CVE-2017-7475
 
 | 
  | libcairo-gobject2 | CVE-2018-18064 | LOW | 1.16.0-5 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064https://gitlab.freedesktop.org/cairo/cairo/issues/341
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libcairo-gobject2 | CVE-2019-6461 | LOW | 1.16.0-5 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461https://github.com/TeamSeri0us/pocs/tree/master/gerbv
 https://gitlab.freedesktop.org/cairo/cairo/issues/352
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libcairo-gobject2 | CVE-2019-6462 | LOW | 1.16.0-5 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462https://github.com/TeamSeri0us/pocs/tree/master/gerbv
 https://gitlab.freedesktop.org/cairo/cairo/issues/353
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libcairo-script-interpreter2 | CVE-2017-7475 | LOW | 1.16.0-5 |  | Expand...http://seclists.org/oss-sec/2017/q2/151https://bugs.freedesktop.org/show_bug.cgi?id=100763
 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
 https://github.com/advisories/GHSA-5v3f-73gv-x7x5
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://nvd.nist.gov/vuln/detail/CVE-2017-7475
 
 | 
  | libcairo-script-interpreter2 | CVE-2018-18064 | LOW | 1.16.0-5 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064https://gitlab.freedesktop.org/cairo/cairo/issues/341
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libcairo-script-interpreter2 | CVE-2019-6461 | LOW | 1.16.0-5 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461https://github.com/TeamSeri0us/pocs/tree/master/gerbv
 https://gitlab.freedesktop.org/cairo/cairo/issues/352
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libcairo-script-interpreter2 | CVE-2019-6462 | LOW | 1.16.0-5 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462https://github.com/TeamSeri0us/pocs/tree/master/gerbv
 https://gitlab.freedesktop.org/cairo/cairo/issues/353
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libcairo2 | CVE-2017-7475 | LOW | 1.16.0-5 |  | Expand...http://seclists.org/oss-sec/2017/q2/151https://bugs.freedesktop.org/show_bug.cgi?id=100763
 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
 https://github.com/advisories/GHSA-5v3f-73gv-x7x5
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://nvd.nist.gov/vuln/detail/CVE-2017-7475
 
 | 
  | libcairo2 | CVE-2018-18064 | LOW | 1.16.0-5 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064https://gitlab.freedesktop.org/cairo/cairo/issues/341
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libcairo2 | CVE-2019-6461 | LOW | 1.16.0-5 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461https://github.com/TeamSeri0us/pocs/tree/master/gerbv
 https://gitlab.freedesktop.org/cairo/cairo/issues/352
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libcairo2 | CVE-2019-6462 | LOW | 1.16.0-5 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462https://github.com/TeamSeri0us/pocs/tree/master/gerbv
 https://gitlab.freedesktop.org/cairo/cairo/issues/353
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libcairo2-dev | CVE-2017-7475 | LOW | 1.16.0-5 |  | Expand...http://seclists.org/oss-sec/2017/q2/151https://bugs.freedesktop.org/show_bug.cgi?id=100763
 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475
 https://github.com/advisories/GHSA-5v3f-73gv-x7x5
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://nvd.nist.gov/vuln/detail/CVE-2017-7475
 
 | 
  | libcairo2-dev | CVE-2018-18064 | LOW | 1.16.0-5 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064https://gitlab.freedesktop.org/cairo/cairo/issues/341
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libcairo2-dev | CVE-2019-6461 | LOW | 1.16.0-5 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6461https://github.com/TeamSeri0us/pocs/tree/master/gerbv
 https://gitlab.freedesktop.org/cairo/cairo/issues/352
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libcairo2-dev | CVE-2019-6462 | LOW | 1.16.0-5 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462https://github.com/TeamSeri0us/pocs/tree/master/gerbv
 https://gitlab.freedesktop.org/cairo/cairo/issues/353
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libctf-nobfd0 | CVE-2017-13716 | LOW | 2.35.2-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716https://sourceware.org/bugzilla/show_bug.cgi?id=22009
 
 | 
  | libctf-nobfd0 | CVE-2018-12934 | LOW | 2.35.2-2 |  | Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
 https://sourceware.org/bugzilla/show_bug.cgi?id=23059
 https://ubuntu.com/security/notices/USN-4326-1
 https://ubuntu.com/security/notices/USN-4336-1
 https://ubuntu.com/security/notices/USN-4336-2
 https://usn.ubuntu.com/4326-1/
 https://usn.ubuntu.com/4336-1/
 
 | 
  | libctf-nobfd0 | CVE-2018-18483 | LOW | 2.35.2-2 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
 http://www.securityfocus.com/bid/105689
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
 https://sourceware.org/bugzilla/show_bug.cgi?id=23767
 https://ubuntu.com/security/notices/USN-4326-1
 https://ubuntu.com/security/notices/USN-4336-1
 https://ubuntu.com/security/notices/USN-4336-2
 https://usn.ubuntu.com/4326-1/
 https://usn.ubuntu.com/4336-1/
 
 | 
  | libctf-nobfd0 | CVE-2018-20623 | LOW | 2.35.2-2 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
 http://www.securityfocus.com/bid/106370
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
 https://sourceware.org/bugzilla/show_bug.cgi?id=24049
 https://support.f5.com/csp/article/K38336243
 https://ubuntu.com/security/notices/USN-4336-1
 https://ubuntu.com/security/notices/USN-4336-2
 https://usn.ubuntu.com/4336-1/
 
 | 
  | libctf-nobfd0 | CVE-2018-20673 | LOW | 2.35.2-2 |  | Expand...http://www.securityfocus.com/bid/106454https://linux.oracle.com/cve/CVE-2018-20673.html
 https://linux.oracle.com/errata/ELSA-2021-4386.html
 https://sourceware.org/bugzilla/show_bug.cgi?id=24039
 
 | 
  | libctf-nobfd0 | CVE-2018-20712 | LOW | 2.35.2-2 |  | Expand...http://www.securityfocus.com/bid/106563https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
 https://sourceware.org/bugzilla/show_bug.cgi?id=24043
 https://support.f5.com/csp/article/K38336243
 
 | 
  | libctf-nobfd0 | CVE-2018-9996 | LOW | 2.35.2-2 |  | Expand...http://www.securityfocus.com/bid/103733https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
 
 | 
  | libctf-nobfd0 | CVE-2019-1010204 | LOW | 2.35.2-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204https://linux.oracle.com/cve/CVE-2019-1010204.html
 https://linux.oracle.com/errata/ELSA-2020-1797.html
 https://security.netapp.com/advisory/ntap-20190822-0001/
 https://sourceware.org/bugzilla/show_bug.cgi?id=23765
 https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS
 
 | 
  | libctf-nobfd0 | CVE-2020-35448 | LOW | 2.35.2-2 |  | Expand...https://linux.oracle.com/cve/CVE-2020-35448.htmlhttps://linux.oracle.com/errata/ELSA-2021-4364.html
 https://security.netapp.com/advisory/ntap-20210129-0008/
 https://sourceware.org/bugzilla/show_bug.cgi?id=26574
 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
 
 | 
  | libctf-nobfd0 | CVE-2021-20197 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743https://linux.oracle.com/cve/CVE-2021-20197.html
 https://linux.oracle.com/errata/ELSA-2021-4364.html
 https://security.netapp.com/advisory/ntap-20210528-0009/
 https://sourceware.org/bugzilla/show_bug.cgi?id=26945
 
 | 
  | libctf-nobfd0 | CVE-2021-20284 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784https://linux.oracle.com/cve/CVE-2021-20284.html
 https://linux.oracle.com/errata/ELSA-2021-4364.html
 https://security.netapp.com/advisory/ntap-20210521-0010/
 https://sourceware.org/bugzilla/show_bug.cgi?id=26931
 
 | 
  | libctf-nobfd0 | CVE-2021-3487 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
 https://linux.oracle.com/cve/CVE-2021-3487.html
 https://linux.oracle.com/errata/ELSA-2021-4364.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
 https://ubuntu.com/security/notices/USN-5124-1
 https://ubuntu.com/security/notices/USN-5341-1
 
 | 
  | libctf-nobfd0 | CVE-2021-3530 | LOW | 2.35.2-2 |  | Expand...https://access.redhat.com/security/cve/CVE-2021-3530https://bugzilla.redhat.com/show_bug.cgi?id=1956423
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
 https://security.netapp.com/advisory/ntap-20210716-0006/
 https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
 
 | 
  | libctf-nobfd0 | CVE-2021-3549 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
 
 | 
  | libctf-nobfd0 | CVE-2021-45078 | LOW | 2.35.2-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
 https://security.netapp.com/advisory/ntap-20220107-0002/
 https://sourceware.org/bugzilla/show_bug.cgi?id=28694
 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
 https://ubuntu.com/security/notices/USN-5341-1
 
 | 
  | libctf-nobfd0 | CVE-2021-46195 | LOW | 2.35.2-2 |  | Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
 | 
  | libctf0 | CVE-2017-13716 | LOW | 2.35.2-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716https://sourceware.org/bugzilla/show_bug.cgi?id=22009
 
 | 
  | libctf0 | CVE-2018-12934 | LOW | 2.35.2-2 |  | Expand...https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
 https://sourceware.org/bugzilla/show_bug.cgi?id=23059
 https://ubuntu.com/security/notices/USN-4326-1
 https://ubuntu.com/security/notices/USN-4336-1
 https://ubuntu.com/security/notices/USN-4336-2
 https://usn.ubuntu.com/4326-1/
 https://usn.ubuntu.com/4336-1/
 
 | 
  | libctf0 | CVE-2018-18483 | LOW | 2.35.2-2 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
 http://www.securityfocus.com/bid/105689
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
 https://sourceware.org/bugzilla/show_bug.cgi?id=23767
 https://ubuntu.com/security/notices/USN-4326-1
 https://ubuntu.com/security/notices/USN-4336-1
 https://ubuntu.com/security/notices/USN-4336-2
 https://usn.ubuntu.com/4326-1/
 https://usn.ubuntu.com/4336-1/
 
 | 
  | libctf0 | CVE-2018-20623 | LOW | 2.35.2-2 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
 http://www.securityfocus.com/bid/106370
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623
 https://sourceware.org/bugzilla/show_bug.cgi?id=24049
 https://support.f5.com/csp/article/K38336243
 https://ubuntu.com/security/notices/USN-4336-1
 https://ubuntu.com/security/notices/USN-4336-2
 https://usn.ubuntu.com/4336-1/
 
 | 
  | libctf0 | CVE-2018-20673 | LOW | 2.35.2-2 |  | Expand...http://www.securityfocus.com/bid/106454https://linux.oracle.com/cve/CVE-2018-20673.html
 https://linux.oracle.com/errata/ELSA-2021-4386.html
 https://sourceware.org/bugzilla/show_bug.cgi?id=24039
 
 | 
  | libctf0 | CVE-2018-20712 | LOW | 2.35.2-2 |  | Expand...http://www.securityfocus.com/bid/106563https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629
 https://sourceware.org/bugzilla/show_bug.cgi?id=24043
 https://support.f5.com/csp/article/K38336243
 
 | 
  | libctf0 | CVE-2018-9996 | LOW | 2.35.2-2 |  | Expand...http://www.securityfocus.com/bid/103733https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304
 
 | 
  | libctf0 | CVE-2019-1010204 | LOW | 2.35.2-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204https://linux.oracle.com/cve/CVE-2019-1010204.html
 https://linux.oracle.com/errata/ELSA-2020-1797.html
 https://security.netapp.com/advisory/ntap-20190822-0001/
 https://sourceware.org/bugzilla/show_bug.cgi?id=23765
 https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS
 
 | 
  | libctf0 | CVE-2020-35448 | LOW | 2.35.2-2 |  | Expand...https://linux.oracle.com/cve/CVE-2020-35448.htmlhttps://linux.oracle.com/errata/ELSA-2021-4364.html
 https://security.netapp.com/advisory/ntap-20210129-0008/
 https://sourceware.org/bugzilla/show_bug.cgi?id=26574
 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
 
 | 
  | libctf0 | CVE-2021-20197 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1913743https://linux.oracle.com/cve/CVE-2021-20197.html
 https://linux.oracle.com/errata/ELSA-2021-4364.html
 https://security.netapp.com/advisory/ntap-20210528-0009/
 https://sourceware.org/bugzilla/show_bug.cgi?id=26945
 
 | 
  | libctf0 | CVE-2021-20284 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1937784https://linux.oracle.com/cve/CVE-2021-20284.html
 https://linux.oracle.com/errata/ELSA-2021-4364.html
 https://security.netapp.com/advisory/ntap-20210521-0010/
 https://sourceware.org/bugzilla/show_bug.cgi?id=26931
 
 | 
  | libctf0 | CVE-2021-3487 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947111https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487
 https://linux.oracle.com/cve/CVE-2021-3487.html
 https://linux.oracle.com/errata/ELSA-2021-4364.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
 https://ubuntu.com/security/notices/USN-5124-1
 https://ubuntu.com/security/notices/USN-5341-1
 
 | 
  | libctf0 | CVE-2021-3530 | LOW | 2.35.2-2 |  | Expand...https://access.redhat.com/security/cve/CVE-2021-3530https://bugzilla.redhat.com/show_bug.cgi?id=1956423
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3530
 https://security.netapp.com/advisory/ntap-20210716-0006/
 https://src.fedoraproject.org/rpms/binutils/blob/rawhide/f/binutils-CVE-2021-3530.patch
 
 | 
  | libctf0 | CVE-2021-3549 | LOW | 2.35.2-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1960717https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3549
 
 | 
  | libctf0 | CVE-2021-45078 | LOW | 2.35.2-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
 https://security.netapp.com/advisory/ntap-20220107-0002/
 https://sourceware.org/bugzilla/show_bug.cgi?id=28694
 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
 https://ubuntu.com/security/notices/USN-5341-1
 
 | 
  | libctf0 | CVE-2021-46195 | LOW | 2.35.2-2 |  | Expand...https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
 | 
  | libcurl4 | CVE-2021-22945 | CRITICAL | 7.74.0-1.3+deb11u1 |  | Expand...http://seclists.org/fulldisclosure/2022/Mar/29https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
 https://curl.se/docs/CVE-2021-22945.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
 https://hackerone.com/reports/1269242
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
 https://security.netapp.com/advisory/ntap-20211029-0003/
 https://support.apple.com/kb/HT213183
 https://ubuntu.com/security/notices/USN-5079-1
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libcurl4 | CVE-2021-22946 | HIGH | 7.74.0-1.3+deb11u1 |  | Expand...http://seclists.org/fulldisclosure/2022/Mar/29https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
 https://curl.se/docs/CVE-2021-22946.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
 https://hackerone.com/reports/1334111
 https://linux.oracle.com/cve/CVE-2021-22946.html
 https://linux.oracle.com/errata/ELSA-2021-4059.html
 https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
 https://security.netapp.com/advisory/ntap-20211029-0003/
 https://security.netapp.com/advisory/ntap-20220121-0008/
 https://support.apple.com/kb/HT213183
 https://ubuntu.com/security/notices/USN-5079-1
 https://ubuntu.com/security/notices/USN-5079-2
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libcurl4 | CVE-2021-22947 | MEDIUM | 7.74.0-1.3+deb11u1 |  | Expand...http://seclists.org/fulldisclosure/2022/Mar/29https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
 https://curl.se/docs/CVE-2021-22947.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
 https://hackerone.com/reports/1334763
 https://launchpad.net/bugs/1944120 (regression bug)
 https://linux.oracle.com/cve/CVE-2021-22947.html
 https://linux.oracle.com/errata/ELSA-2021-4059.html
 https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
 https://security.netapp.com/advisory/ntap-20211029-0003/
 https://support.apple.com/kb/HT213183
 https://ubuntu.com/security/notices/USN-5079-1
 https://ubuntu.com/security/notices/USN-5079-2
 https://ubuntu.com/security/notices/USN-5079-3
 https://ubuntu.com/security/notices/USN-5079-4
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libcurl4 | CVE-2021-22898 | LOW | 7.74.0-1.3+deb11u1 |  | Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
 https://curl.se/docs/CVE-2021-22898.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
 https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
 https://hackerone.com/reports/1176461
 https://linux.oracle.com/cve/CVE-2021-22898.html
 https://linux.oracle.com/errata/ELSA-2021-4511.html
 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
 https://ubuntu.com/security/notices/USN-5021-1
 https://ubuntu.com/security/notices/USN-5021-2
 https://www.oracle.com//security-alerts/cpujul2021.html
 https://www.oracle.com/security-alerts/cpujan2022.html
 
 | 
  | libcurl4 | CVE-2021-22922 | LOW | 7.74.0-1.3+deb11u1 |  | Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdfhttps://curl.se/docs/CVE-2021-22922.html
 https://hackerone.com/reports/1213175
 https://linux.oracle.com/cve/CVE-2021-22922.html
 https://linux.oracle.com/errata/ELSA-2021-3582.html
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://security.netapp.com/advisory/ntap-20210902-0003/
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libcurl4 | CVE-2021-22923 | LOW | 7.74.0-1.3+deb11u1 |  | Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdfhttps://curl.se/docs/CVE-2021-22923.html
 https://hackerone.com/reports/1213181
 https://linux.oracle.com/cve/CVE-2021-22923.html
 https://linux.oracle.com/errata/ELSA-2021-3582.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://security.netapp.com/advisory/ntap-20210902-0003/
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libcurl4 | CVE-2021-22924 | LOW | 7.74.0-1.3+deb11u1 |  | Expand...https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdfhttps://curl.se/docs/CVE-2021-22924.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
 https://hackerone.com/reports/1223565
 https://linux.oracle.com/cve/CVE-2021-22924.html
 https://linux.oracle.com/errata/ELSA-2021-3582.html
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E
 https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E
 https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
 https://security.netapp.com/advisory/ntap-20210902-0003/
 https://ubuntu.com/security/notices/USN-5021-1
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libde265-0 | CVE-2020-21598 | HIGH | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/237
 | 
  | libde265-0 | CVE-2021-36409 | HIGH | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/300
 | 
  | libde265-0 | CVE-2020-21594 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/233
 | 
  | libde265-0 | CVE-2020-21595 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/239
 | 
  | libde265-0 | CVE-2020-21596 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/236
 | 
  | libde265-0 | CVE-2020-21597 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/238
 | 
  | libde265-0 | CVE-2020-21599 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/235
 | 
  | libde265-0 | CVE-2020-21600 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/243
 | 
  | libde265-0 | CVE-2020-21601 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/241
 | 
  | libde265-0 | CVE-2020-21602 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/242
 | 
  | libde265-0 | CVE-2020-21603 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/240
 | 
  | libde265-0 | CVE-2020-21604 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/231
 | 
  | libde265-0 | CVE-2020-21605 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/234
 | 
  | libde265-0 | CVE-2020-21606 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/232
 | 
  | libde265-0 | CVE-2021-35452 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/298
 | 
  | libde265-0 | CVE-2021-36408 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/299
 | 
  | libde265-0 | CVE-2021-36410 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/301
 | 
  | libde265-0 | CVE-2021-36411 | MEDIUM | 1.0.8-1 |  | Expand...https://github.com/strukturag/libde265/issues/302
 | 
  | libexpat1 | CVE-2022-22822 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822
 https://github.com/libexpat/libexpat/pull/539
 https://linux.oracle.com/cve/CVE-2022-22822.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5073
 https://www.tenable.com/security/tns-2022-05
 
 | 
  | libexpat1 | CVE-2022-22823 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823
 https://github.com/libexpat/libexpat/pull/539
 https://linux.oracle.com/cve/CVE-2022-22823.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5073
 https://www.tenable.com/security/tns-2022-05
 
 | 
  | libexpat1 | CVE-2022-22824 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824
 https://github.com/libexpat/libexpat/pull/539
 https://linux.oracle.com/cve/CVE-2022-22824.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5073
 https://www.tenable.com/security/tns-2022-05
 
 | 
  | libexpat1 | CVE-2022-23852 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852https://github.com/libexpat/libexpat/pull/550
 https://linux.oracle.com/cve/CVE-2022-23852.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
 https://security.netapp.com/advisory/ntap-20220217-0001/
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5073
 https://www.tenable.com/security/tns-2022-05
 
 | 
  | libexpat1 | CVE-2022-23990 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990https://github.com/libexpat/libexpat/pull/551
 https://linux.oracle.com/cve/CVE-2022-23990.html
 https://linux.oracle.com/errata/ELSA-2022-9232.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5073
 https://www.tenable.com/security/tns-2022-05
 
 | 
  | libexpat1 | CVE-2022-25235 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u2 | Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1https://blog.hartwork.org/posts/expat-2-4-5-released/
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235
 https://github.com/libexpat/libexpat/pull/562
 https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)
 https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)
 https://linux.oracle.com/cve/CVE-2022-25235.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
 https://security.netapp.com/advisory/ntap-20220303-0008/
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5085
 
 | 
  | libexpat1 | CVE-2022-25236 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u2 | Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1https://blog.hartwork.org/posts/expat-2-4-5-released/
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236
 https://github.com/libexpat/libexpat/pull/561
 https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)
 https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)
 https://github.com/libexpat/libexpat/pull/577
 https://linux.oracle.com/cve/CVE-2022-25236.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
 https://security.netapp.com/advisory/ntap-20220303-0008/
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5085
 
 | 
  | libexpat1 | CVE-2022-25315 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u2 | Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1https://blog.hartwork.org/posts/expat-2-4-5-released/
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315
 https://github.com/libexpat/libexpat/pull/559
 https://linux.oracle.com/cve/CVE-2022-25315.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
 https://security.netapp.com/advisory/ntap-20220303-0008/
 https://ubuntu.com/security/notices/USN-5320-1
 https://www.debian.org/security/2022/dsa-5085
 
 | 
  | libexpat1 | CVE-2021-45960 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3https://bugzilla.mozilla.org/show_bug.cgi?id=1217609
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960
 https://github.com/libexpat/libexpat/issues/531
 https://github.com/libexpat/libexpat/pull/534
 https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea
 https://linux.oracle.com/cve/CVE-2021-45960.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://security.netapp.com/advisory/ntap-20220121-0004/
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5073
 https://www.tenable.com/security/tns-2022-05
 
 | 
  | libexpat1 | CVE-2021-46143 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143
 https://github.com/libexpat/libexpat/issues/532
 https://github.com/libexpat/libexpat/pull/538
 https://linux.oracle.com/cve/CVE-2021-46143.html
 https://linux.oracle.com/errata/ELSA-2022-9227.html
 https://security.netapp.com/advisory/ntap-20220121-0006/
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5073
 https://www.tenable.com/security/tns-2022-05
 
 | 
  | libexpat1 | CVE-2022-22825 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825
 https://github.com/libexpat/libexpat/pull/539
 https://linux.oracle.com/cve/CVE-2022-22825.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5073
 https://www.tenable.com/security/tns-2022-05
 
 | 
  | libexpat1 | CVE-2022-22826 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826
 https://github.com/libexpat/libexpat/pull/539
 https://linux.oracle.com/cve/CVE-2022-22826.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5073
 https://www.tenable.com/security/tns-2022-05
 
 | 
  | libexpat1 | CVE-2022-22827 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827
 https://github.com/libexpat/libexpat/pull/539
 https://linux.oracle.com/cve/CVE-2022-22827.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5073
 https://www.tenable.com/security/tns-2022-05
 
 | 
  | libexpat1 | CVE-2022-25314 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u2 | Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1https://blog.hartwork.org/posts/expat-2-4-5-released/
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314
 https://github.com/libexpat/libexpat/pull/560
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
 https://security.netapp.com/advisory/ntap-20220303-0008/
 https://ubuntu.com/security/notices/USN-5320-1
 https://www.debian.org/security/2022/dsa-5085
 
 | 
  | libexpat1 | CVE-2022-25313 | MEDIUM | 2.2.10-2 | 2.2.10-2+deb11u2 | Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1https://blog.hartwork.org/posts/expat-2-4-5-released/
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313
 https://github.com/libexpat/libexpat/pull/558
 https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
 https://security.netapp.com/advisory/ntap-20220303-0008/
 https://ubuntu.com/security/notices/USN-5320-1
 https://www.debian.org/security/2022/dsa-5085
 
 | 
  | libexpat1 | CVE-2013-0340 | LOW | 2.2.10-2 |  | Expand...http://openwall.com/lists/oss-security/2013/02/22/3http://seclists.org/fulldisclosure/2021/Oct/61
 http://seclists.org/fulldisclosure/2021/Oct/62
 http://seclists.org/fulldisclosure/2021/Oct/63
 http://seclists.org/fulldisclosure/2021/Sep/33
 http://seclists.org/fulldisclosure/2021/Sep/34
 http://seclists.org/fulldisclosure/2021/Sep/35
 http://seclists.org/fulldisclosure/2021/Sep/38
 http://seclists.org/fulldisclosure/2021/Sep/39
 http://seclists.org/fulldisclosure/2021/Sep/40
 http://securitytracker.com/id?1028213
 http://www.openwall.com/lists/oss-security/2013/04/12/6
 http://www.openwall.com/lists/oss-security/2021/10/07/4
 http://www.osvdb.org/90634
 http://www.securityfocus.com/bid/58233
 https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
 https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
 https://security.gentoo.org/glsa/201701-21
 https://support.apple.com/kb/HT212804
 https://support.apple.com/kb/HT212805
 https://support.apple.com/kb/HT212807
 https://support.apple.com/kb/HT212814
 https://support.apple.com/kb/HT212815
 https://support.apple.com/kb/HT212819
 
 | 
  | libexpat1 | DSA-5085-2 | UNKNOWN | 2.2.10-2 | 2.2.10-2+deb11u3 | Expand... | 
  | libexpat1-dev | CVE-2022-22822 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822
 https://github.com/libexpat/libexpat/pull/539
 https://linux.oracle.com/cve/CVE-2022-22822.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5073
 https://www.tenable.com/security/tns-2022-05
 
 | 
  | libexpat1-dev | CVE-2022-22823 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823
 https://github.com/libexpat/libexpat/pull/539
 https://linux.oracle.com/cve/CVE-2022-22823.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5073
 https://www.tenable.com/security/tns-2022-05
 
 | 
  | libexpat1-dev | CVE-2022-22824 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824
 https://github.com/libexpat/libexpat/pull/539
 https://linux.oracle.com/cve/CVE-2022-22824.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5073
 https://www.tenable.com/security/tns-2022-05
 
 | 
  | libexpat1-dev | CVE-2022-23852 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852https://github.com/libexpat/libexpat/pull/550
 https://linux.oracle.com/cve/CVE-2022-23852.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
 https://security.netapp.com/advisory/ntap-20220217-0001/
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5073
 https://www.tenable.com/security/tns-2022-05
 
 | 
  | libexpat1-dev | CVE-2022-23990 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990https://github.com/libexpat/libexpat/pull/551
 https://linux.oracle.com/cve/CVE-2022-23990.html
 https://linux.oracle.com/errata/ELSA-2022-9232.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5073
 https://www.tenable.com/security/tns-2022-05
 
 | 
  | libexpat1-dev | CVE-2022-25235 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u2 | Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1https://blog.hartwork.org/posts/expat-2-4-5-released/
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235
 https://github.com/libexpat/libexpat/pull/562
 https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)
 https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)
 https://linux.oracle.com/cve/CVE-2022-25235.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
 https://security.netapp.com/advisory/ntap-20220303-0008/
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5085
 
 | 
  | libexpat1-dev | CVE-2022-25236 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u2 | Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1https://blog.hartwork.org/posts/expat-2-4-5-released/
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236
 https://github.com/libexpat/libexpat/pull/561
 https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)
 https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)
 https://github.com/libexpat/libexpat/pull/577
 https://linux.oracle.com/cve/CVE-2022-25236.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
 https://security.netapp.com/advisory/ntap-20220303-0008/
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5085
 
 | 
  | libexpat1-dev | CVE-2022-25315 | CRITICAL | 2.2.10-2 | 2.2.10-2+deb11u2 | Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1https://blog.hartwork.org/posts/expat-2-4-5-released/
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315
 https://github.com/libexpat/libexpat/pull/559
 https://linux.oracle.com/cve/CVE-2022-25315.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
 https://security.netapp.com/advisory/ntap-20220303-0008/
 https://ubuntu.com/security/notices/USN-5320-1
 https://www.debian.org/security/2022/dsa-5085
 
 | 
  | libexpat1-dev | CVE-2021-45960 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3https://bugzilla.mozilla.org/show_bug.cgi?id=1217609
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960
 https://github.com/libexpat/libexpat/issues/531
 https://github.com/libexpat/libexpat/pull/534
 https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea
 https://linux.oracle.com/cve/CVE-2021-45960.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://security.netapp.com/advisory/ntap-20220121-0004/
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5073
 https://www.tenable.com/security/tns-2022-05
 
 | 
  | libexpat1-dev | CVE-2021-46143 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143
 https://github.com/libexpat/libexpat/issues/532
 https://github.com/libexpat/libexpat/pull/538
 https://linux.oracle.com/cve/CVE-2021-46143.html
 https://linux.oracle.com/errata/ELSA-2022-9227.html
 https://security.netapp.com/advisory/ntap-20220121-0006/
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5073
 https://www.tenable.com/security/tns-2022-05
 
 | 
  | libexpat1-dev | CVE-2022-22825 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825
 https://github.com/libexpat/libexpat/pull/539
 https://linux.oracle.com/cve/CVE-2022-22825.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5073
 https://www.tenable.com/security/tns-2022-05
 
 | 
  | libexpat1-dev | CVE-2022-22826 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826
 https://github.com/libexpat/libexpat/pull/539
 https://linux.oracle.com/cve/CVE-2022-22826.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5073
 https://www.tenable.com/security/tns-2022-05
 
 | 
  | libexpat1-dev | CVE-2022-22827 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827
 https://github.com/libexpat/libexpat/pull/539
 https://linux.oracle.com/cve/CVE-2022-22827.html
 https://linux.oracle.com/errata/ELSA-2022-0951.html
 https://ubuntu.com/security/notices/USN-5288-1
 https://www.debian.org/security/2022/dsa-5073
 https://www.tenable.com/security/tns-2022-05
 
 | 
  | libexpat1-dev | CVE-2022-25314 | HIGH | 2.2.10-2 | 2.2.10-2+deb11u2 | Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1https://blog.hartwork.org/posts/expat-2-4-5-released/
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314
 https://github.com/libexpat/libexpat/pull/560
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
 https://security.netapp.com/advisory/ntap-20220303-0008/
 https://ubuntu.com/security/notices/USN-5320-1
 https://www.debian.org/security/2022/dsa-5085
 
 | 
  | libexpat1-dev | CVE-2022-25313 | MEDIUM | 2.2.10-2 | 2.2.10-2+deb11u2 | Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1https://blog.hartwork.org/posts/expat-2-4-5-released/
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313
 https://github.com/libexpat/libexpat/pull/558
 https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
 https://security.netapp.com/advisory/ntap-20220303-0008/
 https://ubuntu.com/security/notices/USN-5320-1
 https://www.debian.org/security/2022/dsa-5085
 
 | 
  | libexpat1-dev | CVE-2013-0340 | LOW | 2.2.10-2 |  | Expand...http://openwall.com/lists/oss-security/2013/02/22/3http://seclists.org/fulldisclosure/2021/Oct/61
 http://seclists.org/fulldisclosure/2021/Oct/62
 http://seclists.org/fulldisclosure/2021/Oct/63
 http://seclists.org/fulldisclosure/2021/Sep/33
 http://seclists.org/fulldisclosure/2021/Sep/34
 http://seclists.org/fulldisclosure/2021/Sep/35
 http://seclists.org/fulldisclosure/2021/Sep/38
 http://seclists.org/fulldisclosure/2021/Sep/39
 http://seclists.org/fulldisclosure/2021/Sep/40
 http://securitytracker.com/id?1028213
 http://www.openwall.com/lists/oss-security/2013/04/12/6
 http://www.openwall.com/lists/oss-security/2021/10/07/4
 http://www.osvdb.org/90634
 http://www.securityfocus.com/bid/58233
 https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E
 https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E
 https://security.gentoo.org/glsa/201701-21
 https://support.apple.com/kb/HT212804
 https://support.apple.com/kb/HT212805
 https://support.apple.com/kb/HT212807
 https://support.apple.com/kb/HT212814
 https://support.apple.com/kb/HT212815
 https://support.apple.com/kb/HT212819
 
 | 
  | libexpat1-dev | DSA-5085-2 | UNKNOWN | 2.2.10-2 | 2.2.10-2+deb11u3 | Expand... | 
  | libfribidi0 | CVE-2022-25308 | HIGH | 1.0.8-2 |  | Expand... | 
  | libfribidi0 | CVE-2022-25309 | MEDIUM | 1.0.8-2 |  | Expand... | 
  | libfribidi0 | CVE-2022-25310 | MEDIUM | 1.0.8-2 |  | Expand... | 
  | libgcrypt20 | CVE-2021-33560 | HIGH | 1.8.7-6 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560https://dev.gnupg.org/T5305
 https://dev.gnupg.org/T5328
 https://dev.gnupg.org/T5466
 https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
 https://eprint.iacr.org/2021/923
 https://linux.oracle.com/cve/CVE-2021-33560.html
 https://linux.oracle.com/errata/ELSA-2021-4409.html
 https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
 https://ubuntu.com/security/notices/USN-5080-1
 https://ubuntu.com/security/notices/USN-5080-2
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libgcrypt20 | CVE-2018-6829 | LOW | 1.8.7-6 |  | Expand...https://github.com/weikengchen/attack-on-libgcrypt-elgamalhttps://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
 https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
 https://www.oracle.com/security-alerts/cpujan2020.html
 
 | 
  | libgd-dev | CVE-2021-40145 | HIGH | 2.3.0-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40145https://github.com/libgd/libgd/commit/c5fd25ce0e48fd5618a972ca9f5e28d6d62006af
 https://github.com/libgd/libgd/issues/700
 https://github.com/libgd/libgd/pull/713
 https://ubuntu.com/security/notices/USN-5068-1
 
 | 
  | libgd-dev | CVE-2021-38115 | MEDIUM | 2.3.0-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38115https://github.com/libgd/libgd/commit/8b111b2b4a4842179be66db68d84dda91a246032
 https://github.com/libgd/libgd/issues/697
 https://github.com/libgd/libgd/pull/711/commits/8b111b2b4a4842179be66db68d84dda91a246032
 https://ubuntu.com/security/notices/USN-5068-1
 
 | 
  | libgd-dev | CVE-2021-40812 | MEDIUM | 2.3.0-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40812https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9
 https://github.com/libgd/libgd/issues/750#issuecomment-914872385
 https://github.com/libgd/libgd/issues/757
 
 | 
  | libgd3 | CVE-2021-40145 | HIGH | 2.3.0-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40145https://github.com/libgd/libgd/commit/c5fd25ce0e48fd5618a972ca9f5e28d6d62006af
 https://github.com/libgd/libgd/issues/700
 https://github.com/libgd/libgd/pull/713
 https://ubuntu.com/security/notices/USN-5068-1
 
 | 
  | libgd3 | CVE-2021-38115 | MEDIUM | 2.3.0-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38115https://github.com/libgd/libgd/commit/8b111b2b4a4842179be66db68d84dda91a246032
 https://github.com/libgd/libgd/issues/697
 https://github.com/libgd/libgd/pull/711/commits/8b111b2b4a4842179be66db68d84dda91a246032
 https://ubuntu.com/security/notices/USN-5068-1
 
 | 
  | libgd3 | CVE-2021-40812 | MEDIUM | 2.3.0-2 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40812https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9
 https://github.com/libgd/libgd/issues/750#issuecomment-914872385
 https://github.com/libgd/libgd/issues/757
 
 | 
  | libgdk-pixbuf-2.0-0 | CVE-2021-44648 | HIGH | 2.42.2+dfsg-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/
 https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/
 
 | 
  | libgdk-pixbuf-2.0-dev | CVE-2021-44648 | HIGH | 2.42.2+dfsg-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/
 https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/
 
 | 
  | libgdk-pixbuf2.0-bin | CVE-2021-44648 | HIGH | 2.42.2+dfsg-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/
 https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/
 
 | 
  | libgdk-pixbuf2.0-common | CVE-2021-44648 | HIGH | 2.42.2+dfsg-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEVTOGIJITK2N5AOOLKKMDIICZDQE6CH/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEKBMOO52RXONWKB6ZKKHTVPLF6WC3KF/
 https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/
 
 | 
  | libglib2.0-0 | CVE-2012-0039 | LOW | 2.66.8-1 |  | Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
 http://openwall.com/lists/oss-security/2012/01/10/12
 https://bugzilla.redhat.com/show_bug.cgi?id=772720
 
 | 
  | libglib2.0-bin | CVE-2012-0039 | LOW | 2.66.8-1 |  | Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
 http://openwall.com/lists/oss-security/2012/01/10/12
 https://bugzilla.redhat.com/show_bug.cgi?id=772720
 
 | 
  | libglib2.0-data | CVE-2012-0039 | LOW | 2.66.8-1 |  | Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
 http://openwall.com/lists/oss-security/2012/01/10/12
 https://bugzilla.redhat.com/show_bug.cgi?id=772720
 
 | 
  | libglib2.0-dev | CVE-2012-0039 | LOW | 2.66.8-1 |  | Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
 http://openwall.com/lists/oss-security/2012/01/10/12
 https://bugzilla.redhat.com/show_bug.cgi?id=772720
 
 | 
  | libglib2.0-dev-bin | CVE-2012-0039 | LOW | 2.66.8-1 |  | Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
 http://openwall.com/lists/oss-security/2012/01/10/12
 https://bugzilla.redhat.com/show_bug.cgi?id=772720
 
 | 
  | libgnutls30 | CVE-2021-4209 | MEDIUM | 3.7.1-5 |  | Expand... | 
  | libgnutls30 | CVE-2011-3389 | LOW | 3.7.1-5 |  | Expand...http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
 http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
 http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
 http://curl.haxx.se/docs/adv_20120124B.html
 http://downloads.asterisk.org/pub/security/AST-2016-001.html
 http://ekoparty.org/2011/juliano-rizzo.php
 http://eprint.iacr.org/2004/111
 http://eprint.iacr.org/2006/136
 http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
 http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
 http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
 http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
 http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
 http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
 http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
 http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
 http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
 http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
 http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
 http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
 http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
 http://marc.info/?l=bugtraq&m=132750579901589&w=2
 http://marc.info/?l=bugtraq&m=132872385320240&w=2
 http://marc.info/?l=bugtraq&m=133365109612558&w=2
 http://marc.info/?l=bugtraq&m=133728004526190&w=2
 http://marc.info/?l=bugtraq&m=134254866602253&w=2
 http://marc.info/?l=bugtraq&m=134254957702612&w=2
 http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
 http://osvdb.org/74829
 http://rhn.redhat.com/errata/RHSA-2012-0508.html
 http://rhn.redhat.com/errata/RHSA-2013-1455.html
 http://secunia.com/advisories/45791
 http://secunia.com/advisories/47998
 http://secunia.com/advisories/48256
 http://secunia.com/advisories/48692
 http://secunia.com/advisories/48915
 http://secunia.com/advisories/48948
 http://secunia.com/advisories/49198
 http://secunia.com/advisories/55322
 http://secunia.com/advisories/55350
 http://secunia.com/advisories/55351
 http://security.gentoo.org/glsa/glsa-201203-02.xml
 http://security.gentoo.org/glsa/glsa-201406-32.xml
 http://support.apple.com/kb/HT4999
 http://support.apple.com/kb/HT5001
 http://support.apple.com/kb/HT5130
 http://support.apple.com/kb/HT5281
 http://support.apple.com/kb/HT5501
 http://support.apple.com/kb/HT6150
 http://technet.microsoft.com/security/advisory/2588513
 http://vnhacker.blogspot.com/2011/09/beast.html
 http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
 http://www.debian.org/security/2012/dsa-2398
 http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
 http://www.ibm.com/developerworks/java/jdk/alerts/
 http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
 http://www.insecure.cl/Beast-SSL.rar
 http://www.kb.cert.org/vuls/id/864643
 http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
 http://www.opera.com/docs/changelogs/mac/1151/
 http://www.opera.com/docs/changelogs/mac/1160/
 http://www.opera.com/docs/changelogs/unix/1151/
 http://www.opera.com/docs/changelogs/unix/1160/
 http://www.opera.com/docs/changelogs/windows/1151/
 http://www.opera.com/docs/changelogs/windows/1160/
 http://www.opera.com/support/kb/view/1004/
 http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
 http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
 http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
 http://www.redhat.com/support/errata/RHSA-2011-1384.html
 http://www.redhat.com/support/errata/RHSA-2012-0006.html
 http://www.securityfocus.com/bid/49388
 http://www.securityfocus.com/bid/49778
 http://www.securitytracker.com/id/1029190
 http://www.securitytracker.com/id?1025997
 http://www.securitytracker.com/id?1026103
 http://www.securitytracker.com/id?1026704
 http://www.ubuntu.com/usn/USN-1263-1
 http://www.us-cert.gov/cas/techalerts/TA12-010A.html
 https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
 https://bugzilla.novell.com/show_bug.cgi?id=719047
 https://bugzilla.redhat.com/show_bug.cgi?id=737506
 https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
 https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
 https://hermes.opensuse.org/messages/13154861
 https://hermes.opensuse.org/messages/13155432
 https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
 https://linux.oracle.com/cve/CVE-2011-3389.html
 https://linux.oracle.com/errata/ELSA-2011-1380.html
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
 https://ubuntu.com/security/notices/USN-1263-1
 
 | 
  | libgssapi-krb5-2 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 |  | Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
 http://www.redhat.com/support/errata/RHSA-2005-012.html
 http://www.securityfocus.com/bid/11289
 http://www.trustix.org/errata/2004/0050
 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
 
 | 
  | libgssapi-krb5-2 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libheif1 | CVE-2020-23109 | HIGH | 1.11.0-1 |  | Expand...https://github.com/strukturag/libheif/issues/207
 | 
  | libjansson4 | CVE-2020-36325 | LOW | 2.13.1-1.1 |  | Expand...https://github.com/akheron/jansson/issues/548
 | 
  | libjbig-dev | CVE-2017-9937 | LOW | 2.1-3.1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707http://www.securityfocus.com/bid/99304
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libjbig0 | CVE-2017-9937 | LOW | 2.1-3.1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2707http://www.securityfocus.com/bid/99304
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9937
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libk5crypto3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 |  | Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
 http://www.redhat.com/support/errata/RHSA-2005-012.html
 http://www.securityfocus.com/bid/11289
 http://www.trustix.org/errata/2004/0050
 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
 
 | 
  | libk5crypto3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libkrb5-3 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 |  | Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
 http://www.redhat.com/support/errata/RHSA-2005-012.html
 http://www.securityfocus.com/bid/11289
 http://www.trustix.org/errata/2004/0050
 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
 
 | 
  | libkrb5-3 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libkrb5support0 | CVE-2004-0971 | LOW | 1.18.3-6+deb11u1 |  | Expand...http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml
 http://www.redhat.com/support/errata/RHSA-2005-012.html
 http://www.securityfocus.com/bid/11289
 http://www.trustix.org/errata/2004/0050
 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497
 
 | 
  | libkrb5support0 | CVE-2018-5709 | LOW | 1.18.3-6+deb11u1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libldap-2.4-2 | CVE-2015-3276 | LOW | 2.4.57+dfsg-3 |  | Expand...http://rhn.redhat.com/errata/RHSA-2015-2131.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
 http://www.securitytracker.com/id/1034221
 https://bugzilla.redhat.com/show_bug.cgi?id=1238322
 https://linux.oracle.com/cve/CVE-2015-3276.html
 https://linux.oracle.com/errata/ELSA-2015-2131.html
 
 | 
  | libldap-2.4-2 | CVE-2017-14159 | LOW | 2.4.57+dfsg-3 |  | Expand...http://www.openldap.org/its/index.cgi?findid=8703
 | 
  | libldap-2.4-2 | CVE-2017-17740 | LOW | 2.4.57+dfsg-3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
 http://www.openldap.org/its/index.cgi/Incoming?id=8759
 https://kc.mcafee.com/corporate/index?page=content&id=SB10365
 
 | 
  | libldap-2.4-2 | CVE-2020-15719 | LOW | 2.4.57+dfsg-3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.htmlhttp://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
 https://access.redhat.com/errata/RHBA-2019:3674
 https://bugs.openldap.org/show_bug.cgi?id=9266
 https://bugzilla.redhat.com/show_bug.cgi?id=1740070
 https://kc.mcafee.com/corporate/index?page=content&id=SB10365
 
 | 
  | liblua5.3-0 | CVE-2019-6706 | HIGH | 5.3.3-1.1 |  | Expand...http://lua.2524044.n2.nabble.com/Bug-Report-Use-after-free-in-debug-upvaluejoin-tc7685506.htmlhttp://lua.2524044.n2.nabble.com/CVE-2019-6706-use-after-free-in-lua-upvaluejoin-function-tc7685575.html
 https://access.redhat.com/errata/RHSA-2019:3706
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6706
 https://linux.oracle.com/cve/CVE-2019-6706.html
 https://linux.oracle.com/errata/ELSA-2019-3706.html
 https://ubuntu.com/security/notices/USN-3941-1
 https://usn.ubuntu.com/3941-1/
 https://www.exploit-db.com/exploits/46246/
 
 | 
  | liblua5.3-0 | CVE-2020-24370 | MEDIUM | 5.3.3-1.1 |  | Expand...http://lua-users.org/lists/lua-l/2020-07/msg00324.htmlhttps://github.com/lua/lua/commit/a585eae6e7ada1ca9271607a4f48dfb17868ab7b
 https://linux.oracle.com/cve/CVE-2020-24370.html
 https://linux.oracle.com/errata/ELSA-2021-4510.html
 https://lists.debian.org/debian-lts-announce/2020/09/msg00019.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6KONNG6UEI3FMEOY67NDZC32NBGBI44/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXYMCIUNGK26VHAYHGP5LPW56G2KWOHQ/
 
 | 
  | liblua5.3-0 | CVE-2021-43519 | MEDIUM | 5.3.3-1.1 |  | Expand...http://lua-users.org/lists/lua-l/2021-10/msg00123.htmlhttp://lua-users.org/lists/lua-l/2021-11/msg00015.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XHFYHGSZKL53VCLSJSAJ6VMFGAIXKO/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3EMGAQ5Y6GXJLY4K5DUOOEQT4MZ4J4F/
 
 | 
  | libmagickcore-6-arch-config | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6-arch-config | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6-arch-config | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6-arch-config | CVE-2021-4219 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2054611
 | 
  | libmagickcore-6-arch-config | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
 https://github.com/ImageMagick/ImageMagick/pull/3177
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | libmagickcore-6-arch-config | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
 https://github.com/ImageMagick/ImageMagick/pull/3193
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | libmagickcore-6-arch-config | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
 https://github.com/ImageMagick/ImageMagick/pull/3194
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6-arch-config | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
 https://github.com/ImageMagick/ImageMagick/issues/3176
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | libmagickcore-6-arch-config | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6-arch-config | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
 
 | 
  | libmagickcore-6-arch-config | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.htmlhttp://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
 
 | 
  | libmagickcore-6-arch-config | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.htmlhttp://secunia.com/advisories/30879
 http://secunia.com/advisories/32151
 http://sourceforge.net/forum/forum.php?forum_id=841176
 http://sourceforge.net/project/shownotes.php?release_id=610253
 http://www.securityfocus.com/bid/30055
 http://www.securitytracker.com/id?1020413
 http://www.vupen.com/english/advisories/2008/1984/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
 
 | 
  | libmagickcore-6-arch-config | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2http://www.openwall.com/lists/oss-security/2016/12/08/18
 http://www.securityfocus.com/bid/93599
 https://bugzilla.redhat.com/show_bug.cgi?id=1385694
 https://github.com/ImageMagick/ImageMagick/issues/272
 
 | 
  | libmagickcore-6-arch-config | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
 | 
  | libmagickcore-6-arch-config | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
 | 
  | libmagickcore-6-arch-config | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/97166https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
 https://github.com/ImageMagick/ImageMagick/issues/271
 
 | 
  | libmagickcore-6-arch-config | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/105137https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
 https://github.com/ImageMagick/ImageMagick/issues/1255
 https://linux.oracle.com/cve/CVE-2018-15607.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4034-1
 https://usn.ubuntu.com/4034-1/
 
 | 
  | libmagickcore-6-arch-config | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
 | 
  | libmagickcore-6-headers | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6-headers | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6-headers | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6-headers | CVE-2021-4219 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2054611
 | 
  | libmagickcore-6-headers | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
 https://github.com/ImageMagick/ImageMagick/pull/3177
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | libmagickcore-6-headers | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
 https://github.com/ImageMagick/ImageMagick/pull/3193
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | libmagickcore-6-headers | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
 https://github.com/ImageMagick/ImageMagick/pull/3194
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6-headers | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
 https://github.com/ImageMagick/ImageMagick/issues/3176
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | libmagickcore-6-headers | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6-headers | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
 
 | 
  | libmagickcore-6-headers | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.htmlhttp://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
 
 | 
  | libmagickcore-6-headers | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.htmlhttp://secunia.com/advisories/30879
 http://secunia.com/advisories/32151
 http://sourceforge.net/forum/forum.php?forum_id=841176
 http://sourceforge.net/project/shownotes.php?release_id=610253
 http://www.securityfocus.com/bid/30055
 http://www.securitytracker.com/id?1020413
 http://www.vupen.com/english/advisories/2008/1984/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
 
 | 
  | libmagickcore-6-headers | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2http://www.openwall.com/lists/oss-security/2016/12/08/18
 http://www.securityfocus.com/bid/93599
 https://bugzilla.redhat.com/show_bug.cgi?id=1385694
 https://github.com/ImageMagick/ImageMagick/issues/272
 
 | 
  | libmagickcore-6-headers | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
 | 
  | libmagickcore-6-headers | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
 | 
  | libmagickcore-6-headers | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/97166https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
 https://github.com/ImageMagick/ImageMagick/issues/271
 
 | 
  | libmagickcore-6-headers | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/105137https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
 https://github.com/ImageMagick/ImageMagick/issues/1255
 https://linux.oracle.com/cve/CVE-2018-15607.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4034-1
 https://usn.ubuntu.com/4034-1/
 
 | 
  | libmagickcore-6-headers | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-4219 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2054611
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
 https://github.com/ImageMagick/ImageMagick/pull/3177
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
 https://github.com/ImageMagick/ImageMagick/pull/3193
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
 https://github.com/ImageMagick/ImageMagick/pull/3194
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
 https://github.com/ImageMagick/ImageMagick/issues/3176
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
 
 | 
  | libmagickcore-6.q16-6 | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.htmlhttp://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
 
 | 
  | libmagickcore-6.q16-6 | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.htmlhttp://secunia.com/advisories/30879
 http://secunia.com/advisories/32151
 http://sourceforge.net/forum/forum.php?forum_id=841176
 http://sourceforge.net/project/shownotes.php?release_id=610253
 http://www.securityfocus.com/bid/30055
 http://www.securitytracker.com/id?1020413
 http://www.vupen.com/english/advisories/2008/1984/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
 
 | 
  | libmagickcore-6.q16-6 | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2http://www.openwall.com/lists/oss-security/2016/12/08/18
 http://www.securityfocus.com/bid/93599
 https://bugzilla.redhat.com/show_bug.cgi?id=1385694
 https://github.com/ImageMagick/ImageMagick/issues/272
 
 | 
  | libmagickcore-6.q16-6 | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
 | 
  | libmagickcore-6.q16-6 | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
 | 
  | libmagickcore-6.q16-6 | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/97166https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
 https://github.com/ImageMagick/ImageMagick/issues/271
 
 | 
  | libmagickcore-6.q16-6 | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/105137https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
 https://github.com/ImageMagick/ImageMagick/issues/1255
 https://linux.oracle.com/cve/CVE-2018-15607.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4034-1
 https://usn.ubuntu.com/4034-1/
 
 | 
  | libmagickcore-6.q16-6 | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
 | 
  | libmagickcore-6.q16-6-extra | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-6-extra | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-6-extra | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-6-extra | CVE-2021-4219 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2054611
 | 
  | libmagickcore-6.q16-6-extra | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
 https://github.com/ImageMagick/ImageMagick/pull/3177
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | libmagickcore-6.q16-6-extra | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
 https://github.com/ImageMagick/ImageMagick/pull/3193
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | libmagickcore-6.q16-6-extra | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
 https://github.com/ImageMagick/ImageMagick/pull/3194
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-6-extra | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
 https://github.com/ImageMagick/ImageMagick/issues/3176
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | libmagickcore-6.q16-6-extra | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-6-extra | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
 
 | 
  | libmagickcore-6.q16-6-extra | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.htmlhttp://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
 
 | 
  | libmagickcore-6.q16-6-extra | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.htmlhttp://secunia.com/advisories/30879
 http://secunia.com/advisories/32151
 http://sourceforge.net/forum/forum.php?forum_id=841176
 http://sourceforge.net/project/shownotes.php?release_id=610253
 http://www.securityfocus.com/bid/30055
 http://www.securitytracker.com/id?1020413
 http://www.vupen.com/english/advisories/2008/1984/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
 
 | 
  | libmagickcore-6.q16-6-extra | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2http://www.openwall.com/lists/oss-security/2016/12/08/18
 http://www.securityfocus.com/bid/93599
 https://bugzilla.redhat.com/show_bug.cgi?id=1385694
 https://github.com/ImageMagick/ImageMagick/issues/272
 
 | 
  | libmagickcore-6.q16-6-extra | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
 | 
  | libmagickcore-6.q16-6-extra | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
 | 
  | libmagickcore-6.q16-6-extra | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/97166https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
 https://github.com/ImageMagick/ImageMagick/issues/271
 
 | 
  | libmagickcore-6.q16-6-extra | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/105137https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
 https://github.com/ImageMagick/ImageMagick/issues/1255
 https://linux.oracle.com/cve/CVE-2018-15607.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4034-1
 https://usn.ubuntu.com/4034-1/
 
 | 
  | libmagickcore-6.q16-6-extra | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
 | 
  | libmagickcore-6.q16-dev | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-dev | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-dev | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-dev | CVE-2021-4219 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2054611
 | 
  | libmagickcore-6.q16-dev | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
 https://github.com/ImageMagick/ImageMagick/pull/3177
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | libmagickcore-6.q16-dev | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
 https://github.com/ImageMagick/ImageMagick/pull/3193
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | libmagickcore-6.q16-dev | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
 https://github.com/ImageMagick/ImageMagick/pull/3194
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-dev | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
 https://github.com/ImageMagick/ImageMagick/issues/3176
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | libmagickcore-6.q16-dev | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickcore-6.q16-dev | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
 
 | 
  | libmagickcore-6.q16-dev | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.htmlhttp://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
 
 | 
  | libmagickcore-6.q16-dev | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.htmlhttp://secunia.com/advisories/30879
 http://secunia.com/advisories/32151
 http://sourceforge.net/forum/forum.php?forum_id=841176
 http://sourceforge.net/project/shownotes.php?release_id=610253
 http://www.securityfocus.com/bid/30055
 http://www.securitytracker.com/id?1020413
 http://www.vupen.com/english/advisories/2008/1984/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
 
 | 
  | libmagickcore-6.q16-dev | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2http://www.openwall.com/lists/oss-security/2016/12/08/18
 http://www.securityfocus.com/bid/93599
 https://bugzilla.redhat.com/show_bug.cgi?id=1385694
 https://github.com/ImageMagick/ImageMagick/issues/272
 
 | 
  | libmagickcore-6.q16-dev | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
 | 
  | libmagickcore-6.q16-dev | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
 | 
  | libmagickcore-6.q16-dev | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/97166https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
 https://github.com/ImageMagick/ImageMagick/issues/271
 
 | 
  | libmagickcore-6.q16-dev | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/105137https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
 https://github.com/ImageMagick/ImageMagick/issues/1255
 https://linux.oracle.com/cve/CVE-2018-15607.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4034-1
 https://usn.ubuntu.com/4034-1/
 
 | 
  | libmagickcore-6.q16-dev | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
 | 
  | libmagickwand-6-headers | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6-headers | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6-headers | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6-headers | CVE-2021-4219 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2054611
 | 
  | libmagickwand-6-headers | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
 https://github.com/ImageMagick/ImageMagick/pull/3177
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | libmagickwand-6-headers | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
 https://github.com/ImageMagick/ImageMagick/pull/3193
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | libmagickwand-6-headers | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
 https://github.com/ImageMagick/ImageMagick/pull/3194
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6-headers | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
 https://github.com/ImageMagick/ImageMagick/issues/3176
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | libmagickwand-6-headers | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6-headers | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
 
 | 
  | libmagickwand-6-headers | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.htmlhttp://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
 
 | 
  | libmagickwand-6-headers | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.htmlhttp://secunia.com/advisories/30879
 http://secunia.com/advisories/32151
 http://sourceforge.net/forum/forum.php?forum_id=841176
 http://sourceforge.net/project/shownotes.php?release_id=610253
 http://www.securityfocus.com/bid/30055
 http://www.securitytracker.com/id?1020413
 http://www.vupen.com/english/advisories/2008/1984/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
 
 | 
  | libmagickwand-6-headers | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2http://www.openwall.com/lists/oss-security/2016/12/08/18
 http://www.securityfocus.com/bid/93599
 https://bugzilla.redhat.com/show_bug.cgi?id=1385694
 https://github.com/ImageMagick/ImageMagick/issues/272
 
 | 
  | libmagickwand-6-headers | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
 | 
  | libmagickwand-6-headers | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
 | 
  | libmagickwand-6-headers | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/97166https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
 https://github.com/ImageMagick/ImageMagick/issues/271
 
 | 
  | libmagickwand-6-headers | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/105137https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
 https://github.com/ImageMagick/ImageMagick/issues/1255
 https://linux.oracle.com/cve/CVE-2018-15607.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4034-1
 https://usn.ubuntu.com/4034-1/
 
 | 
  | libmagickwand-6-headers | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-4219 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2054611
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
 https://github.com/ImageMagick/ImageMagick/pull/3177
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
 https://github.com/ImageMagick/ImageMagick/pull/3193
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
 https://github.com/ImageMagick/ImageMagick/pull/3194
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
 https://github.com/ImageMagick/ImageMagick/issues/3176
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
 
 | 
  | libmagickwand-6.q16-6 | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.htmlhttp://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
 
 | 
  | libmagickwand-6.q16-6 | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.htmlhttp://secunia.com/advisories/30879
 http://secunia.com/advisories/32151
 http://sourceforge.net/forum/forum.php?forum_id=841176
 http://sourceforge.net/project/shownotes.php?release_id=610253
 http://www.securityfocus.com/bid/30055
 http://www.securitytracker.com/id?1020413
 http://www.vupen.com/english/advisories/2008/1984/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
 
 | 
  | libmagickwand-6.q16-6 | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2http://www.openwall.com/lists/oss-security/2016/12/08/18
 http://www.securityfocus.com/bid/93599
 https://bugzilla.redhat.com/show_bug.cgi?id=1385694
 https://github.com/ImageMagick/ImageMagick/issues/272
 
 | 
  | libmagickwand-6.q16-6 | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
 | 
  | libmagickwand-6.q16-6 | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
 | 
  | libmagickwand-6.q16-6 | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/97166https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
 https://github.com/ImageMagick/ImageMagick/issues/271
 
 | 
  | libmagickwand-6.q16-6 | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/105137https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
 https://github.com/ImageMagick/ImageMagick/issues/1255
 https://linux.oracle.com/cve/CVE-2018-15607.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4034-1
 https://usn.ubuntu.com/4034-1/
 
 | 
  | libmagickwand-6.q16-6 | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
 | 
  | libmagickwand-6.q16-dev | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6.q16-dev | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6.q16-dev | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6.q16-dev | CVE-2021-4219 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2054611
 | 
  | libmagickwand-6.q16-dev | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
 https://github.com/ImageMagick/ImageMagick/pull/3177
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | libmagickwand-6.q16-dev | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
 https://github.com/ImageMagick/ImageMagick/pull/3193
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | libmagickwand-6.q16-dev | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
 https://github.com/ImageMagick/ImageMagick/pull/3194
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6.q16-dev | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
 https://github.com/ImageMagick/ImageMagick/issues/3176
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | libmagickwand-6.q16-dev | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-6.q16-dev | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
 
 | 
  | libmagickwand-6.q16-dev | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.htmlhttp://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
 
 | 
  | libmagickwand-6.q16-dev | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.htmlhttp://secunia.com/advisories/30879
 http://secunia.com/advisories/32151
 http://sourceforge.net/forum/forum.php?forum_id=841176
 http://sourceforge.net/project/shownotes.php?release_id=610253
 http://www.securityfocus.com/bid/30055
 http://www.securitytracker.com/id?1020413
 http://www.vupen.com/english/advisories/2008/1984/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
 
 | 
  | libmagickwand-6.q16-dev | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2http://www.openwall.com/lists/oss-security/2016/12/08/18
 http://www.securityfocus.com/bid/93599
 https://bugzilla.redhat.com/show_bug.cgi?id=1385694
 https://github.com/ImageMagick/ImageMagick/issues/272
 
 | 
  | libmagickwand-6.q16-dev | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
 | 
  | libmagickwand-6.q16-dev | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
 | 
  | libmagickwand-6.q16-dev | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/97166https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
 https://github.com/ImageMagick/ImageMagick/issues/271
 
 | 
  | libmagickwand-6.q16-dev | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/105137https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
 https://github.com/ImageMagick/ImageMagick/issues/1255
 https://linux.oracle.com/cve/CVE-2018-15607.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4034-1
 https://usn.ubuntu.com/4034-1/
 
 | 
  | libmagickwand-6.q16-dev | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
 | 
  | libmagickwand-dev | CVE-2021-20309 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946722https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20309
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-dev | CVE-2021-20312 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946742https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20312
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-dev | CVE-2021-20313 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947019https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20313
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-dev | CVE-2021-4219 | HIGH | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2054611
 | 
  | libmagickwand-dev | CVE-2021-20241 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928952https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241
 https://github.com/ImageMagick/ImageMagick/pull/3177
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | libmagickwand-dev | CVE-2021-20243 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928958https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20243
 https://github.com/ImageMagick/ImageMagick/pull/3193
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 https://ubuntu.com/security/notices/USN-5335-1
 
 | 
  | libmagickwand-dev | CVE-2021-20244 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928959https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20244
 https://github.com/ImageMagick/ImageMagick/pull/3194
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-dev | CVE-2021-20245 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928943https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20245
 https://github.com/ImageMagick/ImageMagick/issues/3176
 https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
 
 | 
  | libmagickwand-dev | CVE-2021-20246 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1928941https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20246
 https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
 https://ubuntu.com/security/notices/USN-5158-1
 
 | 
  | libmagickwand-dev | CVE-2021-39212 | MEDIUM | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39212https://github.com/ImageMagick/ImageMagick/commit/01faddbe2711a4156180c4a92837e2f23683cc68
 https://github.com/ImageMagick/ImageMagick/commit/35893e7cad78ce461fcaffa56076c11700ba5e4e
 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qvhr-jj4p-j2qr
 
 | 
  | libmagickwand-dev | CVE-2005-0406 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://seclists.org/lists/fulldisclosure/2005/Feb/0343.htmlhttp://www.redteam-pentesting.de/advisories/rt-sa-2005-008.txt
 
 | 
  | libmagickwand-dev | CVE-2008-3134 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00004.htmlhttp://secunia.com/advisories/30879
 http://secunia.com/advisories/32151
 http://sourceforge.net/forum/forum.php?forum_id=841176
 http://sourceforge.net/project/shownotes.php?release_id=610253
 http://www.securityfocus.com/bid/30055
 http://www.securitytracker.com/id?1020413
 http://www.vupen.com/english/advisories/2008/1984/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43511
 https://exchange.xforce.ibmcloud.com/vulnerabilities/43513
 
 | 
  | libmagickwand-dev | CVE-2016-8678 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/16/2http://www.openwall.com/lists/oss-security/2016/12/08/18
 http://www.securityfocus.com/bid/93599
 https://bugzilla.redhat.com/show_bug.cgi?id=1385694
 https://github.com/ImageMagick/ImageMagick/issues/272
 
 | 
  | libmagickwand-dev | CVE-2017-11754 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/633
 | 
  | libmagickwand-dev | CVE-2017-11755 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://github.com/ImageMagick/ImageMagick/issues/634
 | 
  | libmagickwand-dev | CVE-2017-7275 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/97166https://blogs.gentoo.org/ago/2017/03/27/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c-incomplete-fix-for-cve-2016-8862-and-cve-2016-8866/
 https://github.com/ImageMagick/ImageMagick/issues/271
 
 | 
  | libmagickwand-dev | CVE-2018-15607 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...http://www.securityfocus.com/bid/105137https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
 https://github.com/ImageMagick/ImageMagick/issues/1255
 https://linux.oracle.com/cve/CVE-2018-15607.html
 https://linux.oracle.com/errata/ELSA-2020-1180.html
 https://ubuntu.com/security/notices/USN-4034-1
 https://usn.ubuntu.com/4034-1/
 
 | 
  | libmagickwand-dev | CVE-2021-20311 | LOW | 8:6.9.11.60+dfsg-1.3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1946739
 | 
  | libmount-dev | CVE-2021-3995 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
 https://ubuntu.com/security/notices/USN-5279-1
 https://www.openwall.com/lists/oss-security/2022/01/24/2
 
 | 
  | libmount-dev | CVE-2021-3996 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
 https://ubuntu.com/security/notices/USN-5279-1
 https://www.openwall.com/lists/oss-security/2022/01/24/2
 
 | 
  | libmount-dev | CVE-2022-0563 | LOW | 2.36.1-8 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | libmount1 | CVE-2021-3995 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
 https://ubuntu.com/security/notices/USN-5279-1
 https://www.openwall.com/lists/oss-security/2022/01/24/2
 
 | 
  | libmount1 | CVE-2021-3996 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
 https://ubuntu.com/security/notices/USN-5279-1
 https://www.openwall.com/lists/oss-security/2022/01/24/2
 
 | 
  | libmount1 | CVE-2022-0563 | LOW | 2.36.1-8 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | libncurses6 | CVE-2021-39537 | LOW | 6.2+20201114-2 |  | Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markuphttps://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
 https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
 
 | 
  | libncursesw6 | CVE-2021-39537 | LOW | 6.2+20201114-2 |  | Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markuphttps://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
 https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
 
 | 
  | libopenexr-dev | CVE-2021-23215 | MEDIUM | 2.5.4-2 |  | Expand...https://access.redhat.com/security/cve/CVE-2021-23215https://bugzilla.redhat.com/show_bug.cgi?id=1947586
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23215
 https://github.com/AcademySoftwareFoundation/openexr/pull/901
 https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/
 https://ubuntu.com/security/notices/USN-4996-1
 https://ubuntu.com/security/notices/USN-4996-2
 
 | 
  | libopenexr-dev | CVE-2021-26260 | MEDIUM | 2.5.4-2 |  | Expand...https://access.redhat.com/security/cve/CVE-2021-26260https://bugzilla.redhat.com/show_bug.cgi?id=1947582
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26260
 https://github.com/AcademySoftwareFoundation/openexr/pull/894
 https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/
 https://ubuntu.com/security/notices/USN-4996-1
 https://ubuntu.com/security/notices/USN-4996-2
 
 | 
  | libopenexr-dev | CVE-2021-3598 | MEDIUM | 2.5.4-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1970987https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598
 https://github.com/AcademySoftwareFoundation/openexr/pull/1037
 https://ubuntu.com/security/notices/USN-4996-1
 https://ubuntu.com/security/notices/USN-4996-2
 
 | 
  | libopenexr-dev | CVE-2021-3605 | MEDIUM | 2.5.4-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1970991https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3605
 https://github.com/AcademySoftwareFoundation/openexr/pull/1036
 https://ubuntu.com/security/notices/USN-4996-1
 https://ubuntu.com/security/notices/USN-4996-2
 
 | 
  | libopenexr-dev | CVE-2021-3933 | MEDIUM | 2.5.4-2 |  | Expand...https://access.redhat.com/security/cve/CVE-2021-3933https://bugzilla.redhat.com/show_bug.cgi?id=2019783
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3933
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2JSMJ7HLWFPYYV7IAQZD5ZUUUN7RWBN/
 https://ubuntu.com/security/notices/USN-5144-1
 
 | 
  | libopenexr-dev | CVE-2021-3941 | MEDIUM | 2.5.4-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019789https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3941
 https://github.com/AcademySoftwareFoundation/openexr/pull/1153
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2JSMJ7HLWFPYYV7IAQZD5ZUUUN7RWBN/
 https://ubuntu.com/security/notices/USN-5150-1
 
 | 
  | libopenexr-dev | CVE-2021-45942 | MEDIUM | 2.5.4-2 |  | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45942
 https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022
 https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e
 https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0
 https://github.com/AcademySoftwareFoundation/openexr/pull/1209
 https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4
 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml
 
 | 
  | libopenexr-dev | CVE-2017-14988 | LOW | 2.5.4-2 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00063.htmlhttps://github.com/openexr/openexr/issues/248
 
 | 
  | libopenexr-dev | CVE-2021-26945 | LOW | 2.5.4-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947591
 | 
  | libopenexr25 | CVE-2021-23215 | MEDIUM | 2.5.4-2 |  | Expand...https://access.redhat.com/security/cve/CVE-2021-23215https://bugzilla.redhat.com/show_bug.cgi?id=1947586
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23215
 https://github.com/AcademySoftwareFoundation/openexr/pull/901
 https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/
 https://ubuntu.com/security/notices/USN-4996-1
 https://ubuntu.com/security/notices/USN-4996-2
 
 | 
  | libopenexr25 | CVE-2021-26260 | MEDIUM | 2.5.4-2 |  | Expand...https://access.redhat.com/security/cve/CVE-2021-26260https://bugzilla.redhat.com/show_bug.cgi?id=1947582
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26260
 https://github.com/AcademySoftwareFoundation/openexr/pull/894
 https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/
 https://ubuntu.com/security/notices/USN-4996-1
 https://ubuntu.com/security/notices/USN-4996-2
 
 | 
  | libopenexr25 | CVE-2021-3598 | MEDIUM | 2.5.4-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1970987https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598
 https://github.com/AcademySoftwareFoundation/openexr/pull/1037
 https://ubuntu.com/security/notices/USN-4996-1
 https://ubuntu.com/security/notices/USN-4996-2
 
 | 
  | libopenexr25 | CVE-2021-3605 | MEDIUM | 2.5.4-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1970991https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3605
 https://github.com/AcademySoftwareFoundation/openexr/pull/1036
 https://ubuntu.com/security/notices/USN-4996-1
 https://ubuntu.com/security/notices/USN-4996-2
 
 | 
  | libopenexr25 | CVE-2021-3933 | MEDIUM | 2.5.4-2 |  | Expand...https://access.redhat.com/security/cve/CVE-2021-3933https://bugzilla.redhat.com/show_bug.cgi?id=2019783
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3933
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2JSMJ7HLWFPYYV7IAQZD5ZUUUN7RWBN/
 https://ubuntu.com/security/notices/USN-5144-1
 
 | 
  | libopenexr25 | CVE-2021-3941 | MEDIUM | 2.5.4-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2019789https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3941
 https://github.com/AcademySoftwareFoundation/openexr/pull/1153
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2JSMJ7HLWFPYYV7IAQZD5ZUUUN7RWBN/
 https://ubuntu.com/security/notices/USN-5150-1
 
 | 
  | libopenexr25 | CVE-2021-45942 | MEDIUM | 2.5.4-2 |  | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45942
 https://github.com/AcademySoftwareFoundation/openexr/blob/v3.1.4/CHANGES.md#version-314-january-26-2022
 https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e
 https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0
 https://github.com/AcademySoftwareFoundation/openexr/pull/1209
 https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.1.4
 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openexr/OSV-2021-1627.yaml
 
 | 
  | libopenexr25 | CVE-2017-14988 | LOW | 2.5.4-2 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00063.htmlhttps://github.com/openexr/openexr/issues/248
 
 | 
  | libopenexr25 | CVE-2021-26945 | LOW | 2.5.4-2 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1947591
 | 
  | libopenjp2-7 | CVE-2021-3575 | HIGH | 2.4.0-3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1957616https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575
 https://github.com/uclouvain/openjpeg/issues/1347
 https://linux.oracle.com/cve/CVE-2021-3575.html
 https://linux.oracle.com/errata/ELSA-2021-4251.html
 https://ubuntu.com/security/CVE-2021-3575
 
 | 
  | libopenjp2-7 | CVE-2021-29338 | MEDIUM | 2.4.0-3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338https://github.com/uclouvain/openjpeg/issues/1338
 https://github.com/uclouvain/openjpeg/pull/1346
 https://github.com/uclouvain/openjpeg/pull/1395
 https://github.com/uclouvain/openjpeg/pull/1396
 https://github.com/uclouvain/openjpeg/pull/1397
 https://github.com/uclouvain/openjpeg/pull/1398
 https://linux.oracle.com/cve/CVE-2021-29338.html
 https://linux.oracle.com/errata/ELSA-2021-4251.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
 
 | 
  | libopenjp2-7 | CVE-2016-10505 | LOW | 2.4.0-3 |  | Expand...https://github.com/uclouvain/openjpeg/issues/776https://github.com/uclouvain/openjpeg/issues/784
 https://github.com/uclouvain/openjpeg/issues/785
 https://github.com/uclouvain/openjpeg/issues/792
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-10506 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/100573https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b
 https://github.com/uclouvain/openjpeg/issues/731
 https://github.com/uclouvain/openjpeg/issues/732
 https://github.com/uclouvain/openjpeg/issues/777
 https://github.com/uclouvain/openjpeg/issues/778
 https://github.com/uclouvain/openjpeg/issues/779
 https://github.com/uclouvain/openjpeg/issues/780
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-9113 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/93980https://github.com/uclouvain/openjpeg/issues/856
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-9114 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/93979https://github.com/uclouvain/openjpeg/issues/857
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-9115 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/93977https://github.com/uclouvain/openjpeg/issues/858
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-9116 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/93975https://github.com/uclouvain/openjpeg/issues/859
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-9117 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/93783https://github.com/uclouvain/openjpeg/issues/860
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-9580 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/94822https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580
 https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
 https://github.com/uclouvain/openjpeg/issues/871
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2016-9581 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/94822https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581
 https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
 https://github.com/uclouvain/openjpeg/issues/872
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7 | CVE-2017-17479 | LOW | 2.4.0-3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479https://github.com/uclouvain/openjpeg/issues/1044
 
 | 
  | libopenjp2-7 | CVE-2018-16375 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/105266https://github.com/uclouvain/openjpeg/issues/1126
 
 | 
  | libopenjp2-7 | CVE-2018-16376 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/105262https://github.com/uclouvain/openjpeg/issues/1127
 
 | 
  | libopenjp2-7 | CVE-2018-20846 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/108921https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc
 
 | 
  | libopenjp2-7 | CVE-2019-6988 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/106785https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988
 https://github.com/uclouvain/openjpeg/issues/1178
 
 | 
  | libopenjp2-7-dev | CVE-2021-3575 | HIGH | 2.4.0-3 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1957616https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3575
 https://github.com/uclouvain/openjpeg/issues/1347
 https://linux.oracle.com/cve/CVE-2021-3575.html
 https://linux.oracle.com/errata/ELSA-2021-4251.html
 https://ubuntu.com/security/CVE-2021-3575
 
 | 
  | libopenjp2-7-dev | CVE-2021-29338 | MEDIUM | 2.4.0-3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338https://github.com/uclouvain/openjpeg/issues/1338
 https://github.com/uclouvain/openjpeg/pull/1346
 https://github.com/uclouvain/openjpeg/pull/1395
 https://github.com/uclouvain/openjpeg/pull/1396
 https://github.com/uclouvain/openjpeg/pull/1397
 https://github.com/uclouvain/openjpeg/pull/1398
 https://linux.oracle.com/cve/CVE-2021-29338.html
 https://linux.oracle.com/errata/ELSA-2021-4251.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
 
 | 
  | libopenjp2-7-dev | CVE-2016-10505 | LOW | 2.4.0-3 |  | Expand...https://github.com/uclouvain/openjpeg/issues/776https://github.com/uclouvain/openjpeg/issues/784
 https://github.com/uclouvain/openjpeg/issues/785
 https://github.com/uclouvain/openjpeg/issues/792
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7-dev | CVE-2016-10506 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/100573https://github.com/uclouvain/openjpeg/commit/d27ccf01c68a31ad62b33d2dc1ba2bb1eeaafe7b
 https://github.com/uclouvain/openjpeg/issues/731
 https://github.com/uclouvain/openjpeg/issues/732
 https://github.com/uclouvain/openjpeg/issues/777
 https://github.com/uclouvain/openjpeg/issues/778
 https://github.com/uclouvain/openjpeg/issues/779
 https://github.com/uclouvain/openjpeg/issues/780
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7-dev | CVE-2016-9113 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/93980https://github.com/uclouvain/openjpeg/issues/856
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7-dev | CVE-2016-9114 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/93979https://github.com/uclouvain/openjpeg/issues/857
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7-dev | CVE-2016-9115 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/93977https://github.com/uclouvain/openjpeg/issues/858
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7-dev | CVE-2016-9116 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/93975https://github.com/uclouvain/openjpeg/issues/859
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7-dev | CVE-2016-9117 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/93783https://github.com/uclouvain/openjpeg/issues/860
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7-dev | CVE-2016-9580 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/94822https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580
 https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
 https://github.com/uclouvain/openjpeg/issues/871
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7-dev | CVE-2016-9581 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/94822https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581
 https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
 https://github.com/uclouvain/openjpeg/issues/872
 https://security.gentoo.org/glsa/201710-26
 
 | 
  | libopenjp2-7-dev | CVE-2017-17479 | LOW | 2.4.0-3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17479https://github.com/uclouvain/openjpeg/issues/1044
 
 | 
  | libopenjp2-7-dev | CVE-2018-16375 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/105266https://github.com/uclouvain/openjpeg/issues/1126
 
 | 
  | libopenjp2-7-dev | CVE-2018-16376 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/105262https://github.com/uclouvain/openjpeg/issues/1127
 
 | 
  | libopenjp2-7-dev | CVE-2018-20846 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/108921https://github.com/uclouvain/openjpeg/pull/1168/commits/c277159986c80142180fbe5efb256bbf3bdf3edc
 
 | 
  | libopenjp2-7-dev | CVE-2019-6988 | LOW | 2.4.0-3 |  | Expand...http://www.securityfocus.com/bid/106785https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6988
 https://github.com/uclouvain/openjpeg/issues/1178
 
 | 
  | libpcre16-3 | CVE-2017-11164 | LOW | 2:8.39-13 |  | Expand...http://openwall.com/lists/oss-security/2017/07/11/3http://www.securityfocus.com/bid/99575
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libpcre16-3 | CVE-2017-16231 | LOW | 2:8.39-13 |  | Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.htmlhttp://seclists.org/fulldisclosure/2018/Dec/33
 http://www.openwall.com/lists/oss-security/2017/11/01/11
 http://www.openwall.com/lists/oss-security/2017/11/01/3
 http://www.openwall.com/lists/oss-security/2017/11/01/7
 http://www.openwall.com/lists/oss-security/2017/11/01/8
 http://www.securityfocus.com/bid/101688
 https://bugs.exim.org/show_bug.cgi?id=2047
 
 | 
  | libpcre16-3 | CVE-2017-7245 | LOW | 2:8.39-13 |  | Expand...http://www.securityfocus.com/bid/97067https://access.redhat.com/errata/RHSA-2018:2486
 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
 https://security.gentoo.org/glsa/201710-25
 
 | 
  | libpcre16-3 | CVE-2017-7246 | LOW | 2:8.39-13 |  | Expand...http://www.securityfocus.com/bid/97067https://access.redhat.com/errata/RHSA-2018:2486
 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
 https://security.gentoo.org/glsa/201710-25
 
 | 
  | libpcre16-3 | CVE-2019-20838 | LOW | 2:8.39-13 |  | Expand...http://seclists.org/fulldisclosure/2020/Dec/32http://seclists.org/fulldisclosure/2021/Feb/14
 https://bugs.gentoo.org/717920
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
 https://linux.oracle.com/cve/CVE-2019-20838.html
 https://linux.oracle.com/errata/ELSA-2021-4373.html
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://support.apple.com/kb/HT211931
 https://support.apple.com/kb/HT212147
 https://www.pcre.org/original/changelog.txt
 
 | 
  | libpcre3 | CVE-2017-11164 | LOW | 2:8.39-13 |  | Expand...http://openwall.com/lists/oss-security/2017/07/11/3http://www.securityfocus.com/bid/99575
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libpcre3 | CVE-2017-16231 | LOW | 2:8.39-13 |  | Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.htmlhttp://seclists.org/fulldisclosure/2018/Dec/33
 http://www.openwall.com/lists/oss-security/2017/11/01/11
 http://www.openwall.com/lists/oss-security/2017/11/01/3
 http://www.openwall.com/lists/oss-security/2017/11/01/7
 http://www.openwall.com/lists/oss-security/2017/11/01/8
 http://www.securityfocus.com/bid/101688
 https://bugs.exim.org/show_bug.cgi?id=2047
 
 | 
  | libpcre3 | CVE-2017-7245 | LOW | 2:8.39-13 |  | Expand...http://www.securityfocus.com/bid/97067https://access.redhat.com/errata/RHSA-2018:2486
 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
 https://security.gentoo.org/glsa/201710-25
 
 | 
  | libpcre3 | CVE-2017-7246 | LOW | 2:8.39-13 |  | Expand...http://www.securityfocus.com/bid/97067https://access.redhat.com/errata/RHSA-2018:2486
 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
 https://security.gentoo.org/glsa/201710-25
 
 | 
  | libpcre3 | CVE-2019-20838 | LOW | 2:8.39-13 |  | Expand...http://seclists.org/fulldisclosure/2020/Dec/32http://seclists.org/fulldisclosure/2021/Feb/14
 https://bugs.gentoo.org/717920
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
 https://linux.oracle.com/cve/CVE-2019-20838.html
 https://linux.oracle.com/errata/ELSA-2021-4373.html
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://support.apple.com/kb/HT211931
 https://support.apple.com/kb/HT212147
 https://www.pcre.org/original/changelog.txt
 
 | 
  | libpcre3-dev | CVE-2017-11164 | LOW | 2:8.39-13 |  | Expand...http://openwall.com/lists/oss-security/2017/07/11/3http://www.securityfocus.com/bid/99575
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libpcre3-dev | CVE-2017-16231 | LOW | 2:8.39-13 |  | Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.htmlhttp://seclists.org/fulldisclosure/2018/Dec/33
 http://www.openwall.com/lists/oss-security/2017/11/01/11
 http://www.openwall.com/lists/oss-security/2017/11/01/3
 http://www.openwall.com/lists/oss-security/2017/11/01/7
 http://www.openwall.com/lists/oss-security/2017/11/01/8
 http://www.securityfocus.com/bid/101688
 https://bugs.exim.org/show_bug.cgi?id=2047
 
 | 
  | libpcre3-dev | CVE-2017-7245 | LOW | 2:8.39-13 |  | Expand...http://www.securityfocus.com/bid/97067https://access.redhat.com/errata/RHSA-2018:2486
 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
 https://security.gentoo.org/glsa/201710-25
 
 | 
  | libpcre3-dev | CVE-2017-7246 | LOW | 2:8.39-13 |  | Expand...http://www.securityfocus.com/bid/97067https://access.redhat.com/errata/RHSA-2018:2486
 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
 https://security.gentoo.org/glsa/201710-25
 
 | 
  | libpcre3-dev | CVE-2019-20838 | LOW | 2:8.39-13 |  | Expand...http://seclists.org/fulldisclosure/2020/Dec/32http://seclists.org/fulldisclosure/2021/Feb/14
 https://bugs.gentoo.org/717920
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
 https://linux.oracle.com/cve/CVE-2019-20838.html
 https://linux.oracle.com/errata/ELSA-2021-4373.html
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://support.apple.com/kb/HT211931
 https://support.apple.com/kb/HT212147
 https://www.pcre.org/original/changelog.txt
 
 | 
  | libpcre32-3 | CVE-2017-11164 | LOW | 2:8.39-13 |  | Expand...http://openwall.com/lists/oss-security/2017/07/11/3http://www.securityfocus.com/bid/99575
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libpcre32-3 | CVE-2017-16231 | LOW | 2:8.39-13 |  | Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.htmlhttp://seclists.org/fulldisclosure/2018/Dec/33
 http://www.openwall.com/lists/oss-security/2017/11/01/11
 http://www.openwall.com/lists/oss-security/2017/11/01/3
 http://www.openwall.com/lists/oss-security/2017/11/01/7
 http://www.openwall.com/lists/oss-security/2017/11/01/8
 http://www.securityfocus.com/bid/101688
 https://bugs.exim.org/show_bug.cgi?id=2047
 
 | 
  | libpcre32-3 | CVE-2017-7245 | LOW | 2:8.39-13 |  | Expand...http://www.securityfocus.com/bid/97067https://access.redhat.com/errata/RHSA-2018:2486
 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
 https://security.gentoo.org/glsa/201710-25
 
 | 
  | libpcre32-3 | CVE-2017-7246 | LOW | 2:8.39-13 |  | Expand...http://www.securityfocus.com/bid/97067https://access.redhat.com/errata/RHSA-2018:2486
 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
 https://security.gentoo.org/glsa/201710-25
 
 | 
  | libpcre32-3 | CVE-2019-20838 | LOW | 2:8.39-13 |  | Expand...http://seclists.org/fulldisclosure/2020/Dec/32http://seclists.org/fulldisclosure/2021/Feb/14
 https://bugs.gentoo.org/717920
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
 https://linux.oracle.com/cve/CVE-2019-20838.html
 https://linux.oracle.com/errata/ELSA-2021-4373.html
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://support.apple.com/kb/HT211931
 https://support.apple.com/kb/HT212147
 https://www.pcre.org/original/changelog.txt
 
 | 
  | libpcrecpp0v5 | CVE-2017-11164 | LOW | 2:8.39-13 |  | Expand...http://openwall.com/lists/oss-security/2017/07/11/3http://www.securityfocus.com/bid/99575
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libpcrecpp0v5 | CVE-2017-16231 | LOW | 2:8.39-13 |  | Expand...http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.htmlhttp://seclists.org/fulldisclosure/2018/Dec/33
 http://www.openwall.com/lists/oss-security/2017/11/01/11
 http://www.openwall.com/lists/oss-security/2017/11/01/3
 http://www.openwall.com/lists/oss-security/2017/11/01/7
 http://www.openwall.com/lists/oss-security/2017/11/01/8
 http://www.securityfocus.com/bid/101688
 https://bugs.exim.org/show_bug.cgi?id=2047
 
 | 
  | libpcrecpp0v5 | CVE-2017-7245 | LOW | 2:8.39-13 |  | Expand...http://www.securityfocus.com/bid/97067https://access.redhat.com/errata/RHSA-2018:2486
 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
 https://security.gentoo.org/glsa/201710-25
 
 | 
  | libpcrecpp0v5 | CVE-2017-7246 | LOW | 2:8.39-13 |  | Expand...http://www.securityfocus.com/bid/97067https://access.redhat.com/errata/RHSA-2018:2486
 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
 https://security.gentoo.org/glsa/201710-25
 
 | 
  | libpcrecpp0v5 | CVE-2019-20838 | LOW | 2:8.39-13 |  | Expand...http://seclists.org/fulldisclosure/2020/Dec/32http://seclists.org/fulldisclosure/2021/Feb/14
 https://bugs.gentoo.org/717920
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
 https://linux.oracle.com/cve/CVE-2019-20838.html
 https://linux.oracle.com/errata/ELSA-2021-4373.html
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://support.apple.com/kb/HT211931
 https://support.apple.com/kb/HT212147
 https://www.pcre.org/original/changelog.txt
 
 | 
  | libperl5.32 | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 |  | Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.htmlhttps://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
 https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
 https://metacpan.org/pod/distribution/CPAN/scripts/cpan
 
 | 
  | libperl5.32 | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 |  | Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2http://www.openwall.com/lists/oss-security/2011/11/04/4
 https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
 https://rt.cpan.org/Public/Bug/Display.html?id=69106
 https://seclists.org/oss-sec/2011/q4/238
 
 | 
  | libpng-dev | CVE-2019-6129 | LOW | 1.6.37-3 |  | Expand...https://github.com/glennrp/libpng/issues/269https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
 
 | 
  | libpng-dev | CVE-2021-4214 | LOW | 1.6.37-3 |  | Expand... | 
  | libpng16-16 | CVE-2019-6129 | LOW | 1.6.37-3 |  | Expand...https://github.com/glennrp/libpng/issues/269https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
 
 | 
  | libpng16-16 | CVE-2021-4214 | LOW | 1.6.37-3 |  | Expand... | 
  | libpython3.9-minimal | CVE-2021-29921 | CRITICAL | 3.9.2-1 |  | Expand...https://bugs.python.org/issue36384https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
 https://docs.python.org/3/library/ipaddress.html
 https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
 https://github.com/python/cpython/pull/12577
 https://github.com/python/cpython/pull/25099
 https://github.com/sickcodes
 https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
 https://linux.oracle.com/cve/CVE-2021-29921.html
 https://linux.oracle.com/errata/ELSA-2021-4162.html
 https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
 https://security.netapp.com/advisory/ntap-20210622-0003/
 https://sick.codes/sick-2021-014
 https://ubuntu.com/security/notices/USN-4973-1
 https://ubuntu.com/security/notices/USN-4973-2
 https://www.oracle.com//security-alerts/cpujul2021.html
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libpython3.9-minimal | CVE-2021-3737 | HIGH | 3.9.2-1 |  | Expand...https://bugs.python.org/issue44022https://bugzilla.redhat.com/show_bug.cgi?id=1995162
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
 https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
 https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
 https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
 https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
 https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
 https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
 https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
 https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
 https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
 https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
 https://github.com/python/cpython/pull/25916
 https://github.com/python/cpython/pull/26503
 https://linux.oracle.com/cve/CVE-2021-3737.html
 https://linux.oracle.com/errata/ELSA-2021-4160.html
 https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
 https://ubuntu.com/security/CVE-2021-3737
 https://ubuntu.com/security/notices/USN-5083-1
 https://ubuntu.com/security/notices/USN-5199-1
 https://ubuntu.com/security/notices/USN-5200-1
 https://ubuntu.com/security/notices/USN-5201-1
 
 | 
  | libpython3.9-minimal | CVE-2022-0391 | HIGH | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43882https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
 https://security.netapp.com/advisory/ntap-20220225-0009/
 
 | 
  | libpython3.9-minimal | CVE-2021-3426 | MEDIUM | 3.9.2-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1935913https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
 https://github.com/python/cpython/pull/24285
 https://github.com/python/cpython/pull/24337
 https://linux.oracle.com/cve/CVE-2021-3426.html
 https://linux.oracle.com/errata/ELSA-2021-9562.html
 https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
 https://python-security.readthedocs.io/vuln/pydoc-getfile.html
 https://security.gentoo.org/glsa/202104-04
 https://security.netapp.com/advisory/ntap-20210629-0003/
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libpython3.9-minimal | CVE-2021-3733 | MEDIUM | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43075https://bugzilla.redhat.com/show_bug.cgi?id=1995234
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
 https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
 https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
 https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
 https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
 https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
 https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
 https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
 https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
 https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
 https://github.com/python/cpython/pull/24391
 https://linux.oracle.com/cve/CVE-2021-3733.html
 https://linux.oracle.com/errata/ELSA-2021-4160.html
 https://ubuntu.com/security/CVE-2021-3733
 https://ubuntu.com/security/notices/USN-5083-1
 https://ubuntu.com/security/notices/USN-5199-1
 https://ubuntu.com/security/notices/USN-5200-1
 
 | 
  | libpython3.9-minimal | CVE-2021-4189 | MEDIUM | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43285https://bugzilla.redhat.com/show_bug.cgi?id=2036020
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
 https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
 https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
 https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
 https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
 
 | 
  | libpython3.9-minimal | CVE-2020-27619 | LOW | 3.9.2-1 |  | Expand...https://bugs.python.org/issue41944https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
 https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
 https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
 https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
 https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
 https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
 https://linux.oracle.com/cve/CVE-2020-27619.html
 https://linux.oracle.com/errata/ELSA-2021-4151.html
 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
 https://security.netapp.com/advisory/ntap-20201123-0004/
 https://ubuntu.com/security/notices/USN-4754-1
 https://ubuntu.com/security/notices/USN-4754-3
 
 | 
  | libpython3.9-stdlib | CVE-2021-29921 | CRITICAL | 3.9.2-1 |  | Expand...https://bugs.python.org/issue36384https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
 https://docs.python.org/3/library/ipaddress.html
 https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
 https://github.com/python/cpython/pull/12577
 https://github.com/python/cpython/pull/25099
 https://github.com/sickcodes
 https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
 https://linux.oracle.com/cve/CVE-2021-29921.html
 https://linux.oracle.com/errata/ELSA-2021-4162.html
 https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
 https://security.netapp.com/advisory/ntap-20210622-0003/
 https://sick.codes/sick-2021-014
 https://ubuntu.com/security/notices/USN-4973-1
 https://ubuntu.com/security/notices/USN-4973-2
 https://www.oracle.com//security-alerts/cpujul2021.html
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libpython3.9-stdlib | CVE-2021-3737 | HIGH | 3.9.2-1 |  | Expand...https://bugs.python.org/issue44022https://bugzilla.redhat.com/show_bug.cgi?id=1995162
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
 https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
 https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
 https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
 https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
 https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
 https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
 https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
 https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
 https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
 https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
 https://github.com/python/cpython/pull/25916
 https://github.com/python/cpython/pull/26503
 https://linux.oracle.com/cve/CVE-2021-3737.html
 https://linux.oracle.com/errata/ELSA-2021-4160.html
 https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
 https://ubuntu.com/security/CVE-2021-3737
 https://ubuntu.com/security/notices/USN-5083-1
 https://ubuntu.com/security/notices/USN-5199-1
 https://ubuntu.com/security/notices/USN-5200-1
 https://ubuntu.com/security/notices/USN-5201-1
 
 | 
  | libpython3.9-stdlib | CVE-2022-0391 | HIGH | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43882https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
 https://security.netapp.com/advisory/ntap-20220225-0009/
 
 | 
  | libpython3.9-stdlib | CVE-2021-3426 | MEDIUM | 3.9.2-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1935913https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
 https://github.com/python/cpython/pull/24285
 https://github.com/python/cpython/pull/24337
 https://linux.oracle.com/cve/CVE-2021-3426.html
 https://linux.oracle.com/errata/ELSA-2021-9562.html
 https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
 https://python-security.readthedocs.io/vuln/pydoc-getfile.html
 https://security.gentoo.org/glsa/202104-04
 https://security.netapp.com/advisory/ntap-20210629-0003/
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | libpython3.9-stdlib | CVE-2021-3733 | MEDIUM | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43075https://bugzilla.redhat.com/show_bug.cgi?id=1995234
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
 https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
 https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
 https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
 https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
 https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
 https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
 https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
 https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
 https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
 https://github.com/python/cpython/pull/24391
 https://linux.oracle.com/cve/CVE-2021-3733.html
 https://linux.oracle.com/errata/ELSA-2021-4160.html
 https://ubuntu.com/security/CVE-2021-3733
 https://ubuntu.com/security/notices/USN-5083-1
 https://ubuntu.com/security/notices/USN-5199-1
 https://ubuntu.com/security/notices/USN-5200-1
 
 | 
  | libpython3.9-stdlib | CVE-2021-4189 | MEDIUM | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43285https://bugzilla.redhat.com/show_bug.cgi?id=2036020
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
 https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
 https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
 https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
 https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
 
 | 
  | libpython3.9-stdlib | CVE-2020-27619 | LOW | 3.9.2-1 |  | Expand...https://bugs.python.org/issue41944https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
 https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
 https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
 https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
 https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
 https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
 https://linux.oracle.com/cve/CVE-2020-27619.html
 https://linux.oracle.com/errata/ELSA-2021-4151.html
 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
 https://security.netapp.com/advisory/ntap-20201123-0004/
 https://ubuntu.com/security/notices/USN-4754-1
 https://ubuntu.com/security/notices/USN-4754-3
 
 | 
  | libsasl2-2 | CVE-2022-24407 | HIGH | 2.1.27+dfsg-2.1 | 2.1.27+dfsg-2.1+deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/02/23/4https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407
 https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
 https://linux.oracle.com/cve/CVE-2022-24407.html
 https://linux.oracle.com/errata/ELSA-2022-9239.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/
 https://ubuntu.com/security/notices/USN-5301-1
 https://ubuntu.com/security/notices/USN-5301-2
 https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
 https://www.debian.org/security/2022/dsa-5087
 
 | 
  | libsasl2-modules-db | CVE-2022-24407 | HIGH | 2.1.27+dfsg-2.1 | 2.1.27+dfsg-2.1+deb11u1 | Expand...http://www.openwall.com/lists/oss-security/2022/02/23/4https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407
 https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
 https://linux.oracle.com/cve/CVE-2022-24407.html
 https://linux.oracle.com/errata/ELSA-2022-9239.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/
 https://ubuntu.com/security/notices/USN-5301-1
 https://ubuntu.com/security/notices/USN-5301-2
 https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
 https://www.debian.org/security/2022/dsa-5087
 
 | 
  | libsepol1 | CVE-2021-36084 | LOW | 3.1-1 |  | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
 https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
 https://linux.oracle.com/cve/CVE-2021-36084.html
 https://linux.oracle.com/errata/ELSA-2021-4513.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
 
 | 
  | libsepol1 | CVE-2021-36085 | LOW | 3.1-1 |  | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
 https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
 https://linux.oracle.com/cve/CVE-2021-36085.html
 https://linux.oracle.com/errata/ELSA-2021-4513.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
 
 | 
  | libsepol1 | CVE-2021-36086 | LOW | 3.1-1 |  | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
 https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
 https://linux.oracle.com/cve/CVE-2021-36086.html
 https://linux.oracle.com/errata/ELSA-2021-4513.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
 
 | 
  | libsepol1 | CVE-2021-36087 | LOW | 3.1-1 |  | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
 https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
 https://linux.oracle.com/cve/CVE-2021-36087.html
 https://linux.oracle.com/errata/ELSA-2021-4513.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
 https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
 
 | 
  | libsepol1-dev | CVE-2021-36084 | LOW | 3.1-1 |  | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
 https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
 https://linux.oracle.com/cve/CVE-2021-36084.html
 https://linux.oracle.com/errata/ELSA-2021-4513.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
 
 | 
  | libsepol1-dev | CVE-2021-36085 | LOW | 3.1-1 |  | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
 https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
 https://linux.oracle.com/cve/CVE-2021-36085.html
 https://linux.oracle.com/errata/ELSA-2021-4513.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
 
 | 
  | libsepol1-dev | CVE-2021-36086 | LOW | 3.1-1 |  | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
 https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
 https://linux.oracle.com/cve/CVE-2021-36086.html
 https://linux.oracle.com/errata/ELSA-2021-4513.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
 
 | 
  | libsepol1-dev | CVE-2021-36087 | LOW | 3.1-1 |  | Expand...https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
 https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
 https://linux.oracle.com/cve/CVE-2021-36087.html
 https://linux.oracle.com/errata/ELSA-2021-4513.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
 https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/
 
 | 
  | libsmartcols1 | CVE-2021-3995 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
 https://ubuntu.com/security/notices/USN-5279-1
 https://www.openwall.com/lists/oss-security/2022/01/24/2
 
 | 
  | libsmartcols1 | CVE-2021-3996 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
 https://ubuntu.com/security/notices/USN-5279-1
 https://www.openwall.com/lists/oss-security/2022/01/24/2
 
 | 
  | libsmartcols1 | CVE-2022-0563 | LOW | 2.36.1-8 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | libsqlite3-0 | CVE-2021-45346 | MEDIUM | 3.34.1-3 |  | Expand...https://github.com/guyinatuxedo/sqlite3_record_leakinghttps://security.netapp.com/advisory/ntap-20220303-0001/
 https://sqlite.org/forum/forumpost/53de8864ba114bf6
 
 | 
  | libsqlite3-0 | CVE-2021-36690 | LOW | 3.34.1-3 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.sqlite.org/forum/forumpost/718c0a8d17
 
 | 
  | libssl1.1 | CVE-2022-0778 | HIGH | 1.1.1k-1+deb11u1 | 1.1.1k-1+deb11u2 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
 https://linux.oracle.com/cve/CVE-2022-0778.html
 https://linux.oracle.com/errata/ELSA-2022-9246.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
 https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
 https://security.netapp.com/advisory/ntap-20220321-0002/
 https://ubuntu.com/security/notices/USN-5328-1
 https://ubuntu.com/security/notices/USN-5328-2
 https://www.debian.org/security/2022/dsa-5103
 https://www.openssl.org/news/secadv/20220315.txt
 
 | 
  | libssl1.1 | CVE-2021-4160 | MEDIUM | 1.1.1k-1+deb11u1 | 1.1.1k-1+deb11u2 | Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37fhttps://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
 https://www.debian.org/security/2022/dsa-5103
 https://www.openssl.org/news/secadv/20220128.txt
 
 | 
  | libssl1.1 | CVE-2007-6755 | LOW | 1.1.1k-1+deb11u1 |  | Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
 http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
 http://rump2007.cr.yp.to/15-shumow.pdf
 http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
 http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
 http://www.securityfocus.com/bid/63657
 https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
 
 | 
  | libssl1.1 | CVE-2010-0928 | LOW | 1.1.1k-1+deb11u1 |  | Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
 http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
 http://www.osvdb.org/62808
 http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
 https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
 
 | 
  | libsystemd0 | CVE-2021-3997 | MEDIUM | 247.3-6 | 247.3-7 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997https://ubuntu.com/security/notices/USN-5226-1
 https://www.openwall.com/lists/oss-security/2022/01/10/2
 
 | 
  | libsystemd0 | CVE-2013-4392 | LOW | 247.3-6 |  | Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357http://www.openwall.com/lists/oss-security/2013/10/01/9
 https://bugzilla.redhat.com/show_bug.cgi?id=859060
 
 | 
  | libsystemd0 | CVE-2020-13529 | LOW | 247.3-6 |  | Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2http://www.openwall.com/lists/oss-security/2021/08/17/3
 http://www.openwall.com/lists/oss-security/2021/09/07/3
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
 https://linux.oracle.com/cve/CVE-2020-13529.html
 https://linux.oracle.com/errata/ELSA-2021-4361.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
 https://security.gentoo.org/glsa/202107-48
 https://security.netapp.com/advisory/ntap-20210625-0005/
 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
 https://ubuntu.com/security/notices/USN-5013-1
 https://ubuntu.com/security/notices/USN-5013-2
 
 | 
  | libtiff-dev | CVE-2022-0891 | HIGH | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
 https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json
 https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
 https://gitlab.com/libtiff/libtiff/-/issues/380
 https://gitlab.com/libtiff/libtiff/-/issues/382
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiff-dev | CVE-2022-0561 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
 https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
 https://gitlab.com/libtiff/libtiff/-/issues/362
 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
 https://security.netapp.com/advisory/ntap-20220318-0001/
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiff-dev | CVE-2022-0562 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
 https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
 https://gitlab.com/libtiff/libtiff/-/issues/362
 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
 https://security.netapp.com/advisory/ntap-20220318-0001/
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiff-dev | CVE-2022-0865 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json
 https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067
 https://gitlab.com/libtiff/libtiff/-/issues/385
 https://gitlab.com/libtiff/libtiff/-/merge_requests/306
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiff-dev | CVE-2022-0907 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0907.jsonhttps://gitlab.com/libtiff/libtiff/-/issues/392
 https://gitlab.com/libtiff/libtiff/-/merge_requests/314
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiff-dev | CVE-2022-0908 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.jsonhttps://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85
 https://gitlab.com/libtiff/libtiff/-/issues/383
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiff-dev | CVE-2022-0909 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.jsonhttps://gitlab.com/libtiff/libtiff/-/issues/393
 https://gitlab.com/libtiff/libtiff/-/merge_requests/310
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiff-dev | CVE-2022-0924 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.jsonhttps://gitlab.com/libtiff/libtiff/-/issues/278
 https://gitlab.com/libtiff/libtiff/-/merge_requests/311
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiff-dev | CVE-2022-22844 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844https://gitlab.com/libtiff/libtiff/-/issues/355
 https://gitlab.com/libtiff/libtiff/-/merge_requests/287
 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
 https://security.netapp.com/advisory/ntap-20220311-0002/
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiff-dev | CVE-2014-8130 | LOW | 4.2.0-1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2483http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
 http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
 http://openwall.com/lists/oss-security/2015/01/24/15
 http://rhn.redhat.com/errata/RHSA-2016-1546.html
 http://rhn.redhat.com/errata/RHSA-2016-1547.html
 http://support.apple.com/kb/HT204941
 http://support.apple.com/kb/HT204942
 http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
 http://www.securityfocus.com/bid/72353
 http://www.securitytracker.com/id/1032760
 https://bugzilla.redhat.com/show_bug.cgi?id=1185817
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130
 https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
 https://linux.oracle.com/cve/CVE-2014-8130.html
 https://linux.oracle.com/errata/ELSA-2016-1547.html
 https://security.gentoo.org/glsa/201701-16
 https://ubuntu.com/security/notices/USN-2553-1
 
 | 
  | libtiff-dev | CVE-2017-16232 | LOW | 4.2.0-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.htmlhttp://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html
 http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html
 http://seclists.org/fulldisclosure/2018/Dec/32
 http://seclists.org/fulldisclosure/2018/Dec/47
 http://www.openwall.com/lists/oss-security/2017/11/01/11
 http://www.openwall.com/lists/oss-security/2017/11/01/3
 http://www.openwall.com/lists/oss-security/2017/11/01/7
 http://www.openwall.com/lists/oss-security/2017/11/01/8
 http://www.securityfocus.com/bid/101696
 
 | 
  | libtiff-dev | CVE-2017-17973 | LOW | 4.2.0-1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2769http://www.securityfocus.com/bid/102331
 https://bugzilla.novell.com/show_bug.cgi?id=1074318
 https://bugzilla.redhat.com/show_bug.cgi?id=1530912
 
 | 
  | libtiff-dev | CVE-2017-5563 | LOW | 4.2.0-1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2664http://www.securityfocus.com/bid/95705
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563
 https://security.gentoo.org/glsa/201709-27
 https://ubuntu.com/security/notices/USN-3606-1
 https://usn.ubuntu.com/3606-1/
 
 | 
  | libtiff-dev | CVE-2017-9117 | LOW | 4.2.0-1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2690http://www.securityfocus.com/bid/98581
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117
 https://ubuntu.com/security/notices/USN-3606-1
 https://usn.ubuntu.com/3606-1/
 
 | 
  | libtiff-dev | CVE-2018-10126 | LOW | 4.2.0-1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libtiff5 | CVE-2022-0891 | HIGH | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
 https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json
 https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
 https://gitlab.com/libtiff/libtiff/-/issues/380
 https://gitlab.com/libtiff/libtiff/-/issues/382
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiff5 | CVE-2022-0561 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
 https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
 https://gitlab.com/libtiff/libtiff/-/issues/362
 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
 https://security.netapp.com/advisory/ntap-20220318-0001/
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiff5 | CVE-2022-0562 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
 https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
 https://gitlab.com/libtiff/libtiff/-/issues/362
 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
 https://security.netapp.com/advisory/ntap-20220318-0001/
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiff5 | CVE-2022-0865 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json
 https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067
 https://gitlab.com/libtiff/libtiff/-/issues/385
 https://gitlab.com/libtiff/libtiff/-/merge_requests/306
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiff5 | CVE-2022-0907 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0907.jsonhttps://gitlab.com/libtiff/libtiff/-/issues/392
 https://gitlab.com/libtiff/libtiff/-/merge_requests/314
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiff5 | CVE-2022-0908 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.jsonhttps://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85
 https://gitlab.com/libtiff/libtiff/-/issues/383
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiff5 | CVE-2022-0909 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.jsonhttps://gitlab.com/libtiff/libtiff/-/issues/393
 https://gitlab.com/libtiff/libtiff/-/merge_requests/310
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiff5 | CVE-2022-0924 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.jsonhttps://gitlab.com/libtiff/libtiff/-/issues/278
 https://gitlab.com/libtiff/libtiff/-/merge_requests/311
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiff5 | CVE-2022-22844 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844https://gitlab.com/libtiff/libtiff/-/issues/355
 https://gitlab.com/libtiff/libtiff/-/merge_requests/287
 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
 https://security.netapp.com/advisory/ntap-20220311-0002/
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiff5 | CVE-2014-8130 | LOW | 4.2.0-1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2483http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
 http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
 http://openwall.com/lists/oss-security/2015/01/24/15
 http://rhn.redhat.com/errata/RHSA-2016-1546.html
 http://rhn.redhat.com/errata/RHSA-2016-1547.html
 http://support.apple.com/kb/HT204941
 http://support.apple.com/kb/HT204942
 http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
 http://www.securityfocus.com/bid/72353
 http://www.securitytracker.com/id/1032760
 https://bugzilla.redhat.com/show_bug.cgi?id=1185817
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130
 https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
 https://linux.oracle.com/cve/CVE-2014-8130.html
 https://linux.oracle.com/errata/ELSA-2016-1547.html
 https://security.gentoo.org/glsa/201701-16
 https://ubuntu.com/security/notices/USN-2553-1
 
 | 
  | libtiff5 | CVE-2017-16232 | LOW | 4.2.0-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.htmlhttp://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html
 http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html
 http://seclists.org/fulldisclosure/2018/Dec/32
 http://seclists.org/fulldisclosure/2018/Dec/47
 http://www.openwall.com/lists/oss-security/2017/11/01/11
 http://www.openwall.com/lists/oss-security/2017/11/01/3
 http://www.openwall.com/lists/oss-security/2017/11/01/7
 http://www.openwall.com/lists/oss-security/2017/11/01/8
 http://www.securityfocus.com/bid/101696
 
 | 
  | libtiff5 | CVE-2017-17973 | LOW | 4.2.0-1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2769http://www.securityfocus.com/bid/102331
 https://bugzilla.novell.com/show_bug.cgi?id=1074318
 https://bugzilla.redhat.com/show_bug.cgi?id=1530912
 
 | 
  | libtiff5 | CVE-2017-5563 | LOW | 4.2.0-1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2664http://www.securityfocus.com/bid/95705
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563
 https://security.gentoo.org/glsa/201709-27
 https://ubuntu.com/security/notices/USN-3606-1
 https://usn.ubuntu.com/3606-1/
 
 | 
  | libtiff5 | CVE-2017-9117 | LOW | 4.2.0-1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2690http://www.securityfocus.com/bid/98581
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117
 https://ubuntu.com/security/notices/USN-3606-1
 https://usn.ubuntu.com/3606-1/
 
 | 
  | libtiff5 | CVE-2018-10126 | LOW | 4.2.0-1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libtiffxx5 | CVE-2022-0891 | HIGH | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
 https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0891.json
 https://gitlab.com/libtiff/libtiff/-/commit/232282fd8f9c21eefe8d2d2b96cdbbb172fe7b7c
 https://gitlab.com/libtiff/libtiff/-/issues/380
 https://gitlab.com/libtiff/libtiff/-/issues/382
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiffxx5 | CVE-2022-0561 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
 https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json
 https://gitlab.com/libtiff/libtiff/-/issues/362
 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
 https://security.netapp.com/advisory/ntap-20220318-0001/
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiffxx5 | CVE-2022-0562 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
 https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
 https://gitlab.com/libtiff/libtiff/-/issues/362
 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
 https://security.netapp.com/advisory/ntap-20220318-0001/
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiffxx5 | CVE-2022-0865 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json
 https://gitlab.com/libtiff/libtiff/-/commit/a1c933dabd0e1c54a412f3f84ae0aa58115c6067
 https://gitlab.com/libtiff/libtiff/-/issues/385
 https://gitlab.com/libtiff/libtiff/-/merge_requests/306
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiffxx5 | CVE-2022-0907 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0907.jsonhttps://gitlab.com/libtiff/libtiff/-/issues/392
 https://gitlab.com/libtiff/libtiff/-/merge_requests/314
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiffxx5 | CVE-2022-0908 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0908.jsonhttps://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85
 https://gitlab.com/libtiff/libtiff/-/issues/383
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiffxx5 | CVE-2022-0909 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.jsonhttps://gitlab.com/libtiff/libtiff/-/issues/393
 https://gitlab.com/libtiff/libtiff/-/merge_requests/310
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiffxx5 | CVE-2022-0924 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.jsonhttps://gitlab.com/libtiff/libtiff/-/issues/278
 https://gitlab.com/libtiff/libtiff/-/merge_requests/311
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiffxx5 | CVE-2022-22844 | MEDIUM | 4.2.0-1 | 4.2.0-1+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844https://gitlab.com/libtiff/libtiff/-/issues/355
 https://gitlab.com/libtiff/libtiff/-/merge_requests/287
 https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
 https://security.netapp.com/advisory/ntap-20220311-0002/
 https://www.debian.org/security/2022/dsa-5108
 
 | 
  | libtiffxx5 | CVE-2014-8130 | LOW | 4.2.0-1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2483http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
 http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
 http://openwall.com/lists/oss-security/2015/01/24/15
 http://rhn.redhat.com/errata/RHSA-2016-1546.html
 http://rhn.redhat.com/errata/RHSA-2016-1547.html
 http://support.apple.com/kb/HT204941
 http://support.apple.com/kb/HT204942
 http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
 http://www.securityfocus.com/bid/72353
 http://www.securitytracker.com/id/1032760
 https://bugzilla.redhat.com/show_bug.cgi?id=1185817
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130
 https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
 https://linux.oracle.com/cve/CVE-2014-8130.html
 https://linux.oracle.com/errata/ELSA-2016-1547.html
 https://security.gentoo.org/glsa/201701-16
 https://ubuntu.com/security/notices/USN-2553-1
 
 | 
  | libtiffxx5 | CVE-2017-16232 | LOW | 4.2.0-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.htmlhttp://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html
 http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html
 http://seclists.org/fulldisclosure/2018/Dec/32
 http://seclists.org/fulldisclosure/2018/Dec/47
 http://www.openwall.com/lists/oss-security/2017/11/01/11
 http://www.openwall.com/lists/oss-security/2017/11/01/3
 http://www.openwall.com/lists/oss-security/2017/11/01/7
 http://www.openwall.com/lists/oss-security/2017/11/01/8
 http://www.securityfocus.com/bid/101696
 
 | 
  | libtiffxx5 | CVE-2017-17973 | LOW | 4.2.0-1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2769http://www.securityfocus.com/bid/102331
 https://bugzilla.novell.com/show_bug.cgi?id=1074318
 https://bugzilla.redhat.com/show_bug.cgi?id=1530912
 
 | 
  | libtiffxx5 | CVE-2017-5563 | LOW | 4.2.0-1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2664http://www.securityfocus.com/bid/95705
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5563
 https://security.gentoo.org/glsa/201709-27
 https://ubuntu.com/security/notices/USN-3606-1
 https://usn.ubuntu.com/3606-1/
 
 | 
  | libtiffxx5 | CVE-2017-9117 | LOW | 4.2.0-1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2690http://www.securityfocus.com/bid/98581
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9117
 https://ubuntu.com/security/notices/USN-3606-1
 https://usn.ubuntu.com/3606-1/
 
 | 
  | libtiffxx5 | CVE-2018-10126 | LOW | 4.2.0-1 |  | Expand...http://bugzilla.maptools.org/show_bug.cgi?id=2786https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 
 | 
  | libtinfo6 | CVE-2021-39537 | LOW | 6.2+20201114-2 |  | Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markuphttps://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
 https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
 
 | 
  | libudev1 | CVE-2021-3997 | MEDIUM | 247.3-6 | 247.3-7 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997https://ubuntu.com/security/notices/USN-5226-1
 https://www.openwall.com/lists/oss-security/2022/01/10/2
 
 | 
  | libudev1 | CVE-2013-4392 | LOW | 247.3-6 |  | Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357http://www.openwall.com/lists/oss-security/2013/10/01/9
 https://bugzilla.redhat.com/show_bug.cgi?id=859060
 
 | 
  | libudev1 | CVE-2020-13529 | LOW | 247.3-6 |  | Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2http://www.openwall.com/lists/oss-security/2021/08/17/3
 http://www.openwall.com/lists/oss-security/2021/09/07/3
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
 https://linux.oracle.com/cve/CVE-2020-13529.html
 https://linux.oracle.com/errata/ELSA-2021-4361.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
 https://security.gentoo.org/glsa/202107-48
 https://security.netapp.com/advisory/ntap-20210625-0005/
 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
 https://ubuntu.com/security/notices/USN-5013-1
 https://ubuntu.com/security/notices/USN-5013-2
 
 | 
  | libuuid1 | CVE-2021-3995 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
 https://ubuntu.com/security/notices/USN-5279-1
 https://www.openwall.com/lists/oss-security/2022/01/24/2
 
 | 
  | libuuid1 | CVE-2021-3996 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
 https://ubuntu.com/security/notices/USN-5279-1
 https://www.openwall.com/lists/oss-security/2022/01/24/2
 
 | 
  | libuuid1 | CVE-2022-0563 | LOW | 2.36.1-8 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | libvpx-dev | CVE-2017-0641 | LOW | 1.9.0-1 |  | Expand...http://www.securityfocus.com/bid/98868http://www.securitytracker.com/id/1038623
 https://android.googlesource.com/platform/external/libvpx/+/698796fc930baecf5c3fdebef17e73d5d9a58bcb
 https://source.android.com/security/bulletin/2017-06-01
 
 | 
  | libvpx6 | CVE-2017-0641 | LOW | 1.9.0-1 |  | Expand...http://www.securityfocus.com/bid/98868http://www.securitytracker.com/id/1038623
 https://android.googlesource.com/platform/external/libvpx/+/698796fc930baecf5c3fdebef17e73d5d9a58bcb
 https://source.android.com/security/bulletin/2017-06-01
 
 | 
  | libwebp-dev | CVE-2016-9085 | LOW | 0.6.1-2.1 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3http://www.securityfocus.com/bid/93928
 https://bugzilla.redhat.com/show_bug.cgi?id=1389338
 https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
 https://security.gentoo.org/glsa/201701-61
 
 | 
  | libwebp6 | CVE-2016-9085 | LOW | 0.6.1-2.1 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3http://www.securityfocus.com/bid/93928
 https://bugzilla.redhat.com/show_bug.cgi?id=1389338
 https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
 https://security.gentoo.org/glsa/201701-61
 
 | 
  | libwebpdemux2 | CVE-2016-9085 | LOW | 0.6.1-2.1 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3http://www.securityfocus.com/bid/93928
 https://bugzilla.redhat.com/show_bug.cgi?id=1389338
 https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
 https://security.gentoo.org/glsa/201701-61
 
 | 
  | libwebpmux3 | CVE-2016-9085 | LOW | 0.6.1-2.1 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/27/3http://www.securityfocus.com/bid/93928
 https://bugzilla.redhat.com/show_bug.cgi?id=1389338
 https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5Q42J7EJDKQKWTTHCO4YZMOMP74YPQ/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SH6X3MWD5AHZC5JT4625PGFHAYLR7YW7/
 https://security.gentoo.org/glsa/201701-61
 
 | 
  | libwmf-dev | CVE-2007-3476 | LOW | 0.2.8.4-17 |  | Expand...ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgzhttp://bugs.libgd.org/?do=details&task_id=87
 http://fedoranews.org/updates/FEDORA-2007-205.shtml
 http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
 http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
 http://osvdb.org/37741
 http://secunia.com/advisories/25860
 http://secunia.com/advisories/26272
 http://secunia.com/advisories/26390
 http://secunia.com/advisories/26415
 http://secunia.com/advisories/26467
 http://secunia.com/advisories/26663
 http://secunia.com/advisories/26766
 http://secunia.com/advisories/26856
 http://secunia.com/advisories/29157
 http://secunia.com/advisories/30168
 http://secunia.com/advisories/31168
 http://secunia.com/advisories/42813
 http://security.gentoo.org/glsa/glsa-200708-05.xml
 http://security.gentoo.org/glsa/glsa-200711-34.xml
 http://security.gentoo.org/glsa/glsa-200805-13.xml
 http://www.debian.org/security/2008/dsa-1613
 http://www.libgd.org/ReleaseNote020035
 http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
 http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
 http://www.novell.com/linux/security/advisories/2007_15_sr.html
 http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
 http://www.redhat.com/support/errata/RHSA-2008-0146.html
 http://www.securityfocus.com/archive/1/478796/100/0/threaded
 http://www.securityfocus.com/bid/24651
 http://www.trustix.org/errata/2007/0024/
 http://www.vupen.com/english/advisories/2011/0022
 https://bugzilla.redhat.com/show_bug.cgi?id=277421
 https://issues.rpath.com/browse/RPL-1643
 https://linux.oracle.com/cve/CVE-2007-3476.html
 https://linux.oracle.com/errata/ELSA-2008-0146.html
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348
 
 | 
  | libwmf-dev | CVE-2007-3477 | LOW | 0.2.8.4-17 |  | Expand...ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgzhttp://bugs.libgd.org/?do=details&task_id=74
 http://bugs.libgd.org/?do=details&task_id=92
 http://fedoranews.org/updates/FEDORA-2007-205.shtml
 http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
 http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
 http://osvdb.org/42062
 http://secunia.com/advisories/25860
 http://secunia.com/advisories/26272
 http://secunia.com/advisories/26390
 http://secunia.com/advisories/26415
 http://secunia.com/advisories/26467
 http://secunia.com/advisories/26663
 http://secunia.com/advisories/26766
 http://secunia.com/advisories/26856
 http://secunia.com/advisories/30168
 http://secunia.com/advisories/31168
 http://secunia.com/advisories/42813
 http://security.gentoo.org/glsa/glsa-200708-05.xml
 http://security.gentoo.org/glsa/glsa-200711-34.xml
 http://security.gentoo.org/glsa/glsa-200805-13.xml
 http://www.debian.org/security/2008/dsa-1613
 http://www.libgd.org/ReleaseNote020035
 http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
 http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
 http://www.novell.com/linux/security/advisories/2007_15_sr.html
 http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
 http://www.securityfocus.com/archive/1/478796/100/0/threaded
 http://www.securityfocus.com/bid/24651
 http://www.trustix.org/errata/2007/0024/
 http://www.vupen.com/english/advisories/2011/0022
 https://bugzilla.redhat.com/show_bug.cgi?id=277421
 https://issues.rpath.com/browse/RPL-1643
 
 | 
  | libwmf-dev | CVE-2007-3996 | LOW | 0.2.8.4-17 |  | Expand...http://bugs.gentoo.org/show_bug.cgi?id=201546http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
 http://rhn.redhat.com/errata/RHSA-2007-0889.html
 http://secunia.com/advisories/26642
 http://secunia.com/advisories/26822
 http://secunia.com/advisories/26838
 http://secunia.com/advisories/26871
 http://secunia.com/advisories/26895
 http://secunia.com/advisories/26930
 http://secunia.com/advisories/26967
 http://secunia.com/advisories/27102
 http://secunia.com/advisories/27351
 http://secunia.com/advisories/27377
 http://secunia.com/advisories/27545
 http://secunia.com/advisories/28009
 http://secunia.com/advisories/28147
 http://secunia.com/advisories/28658
 http://secunia.com/advisories/31168
 http://security.gentoo.org/glsa/glsa-200712-13.xml
 http://securityreason.com/securityalert/3103
 http://secweb.se/en/advisories/php-imagecopyresized-integer-overflow/
 http://secweb.se/en/advisories/php-imagecreatetruecolor-integer-overflow/
 http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
 http://www.debian.org/security/2008/dsa-1613
 http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
 http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
 http://www.php.net/ChangeLog-5.php#5.2.4
 http://www.php.net/releases/5_2_4.php
 http://www.redhat.com/support/errata/RHSA-2007-0888.html
 http://www.redhat.com/support/errata/RHSA-2007-0890.html
 http://www.redhat.com/support/errata/RHSA-2007-0891.html
 http://www.trustix.org/errata/2007/0026/
 http://www.ubuntu.com/usn/usn-557-1
 http://www.vupen.com/english/advisories/2007/3023
 https://exchange.xforce.ibmcloud.com/vulnerabilities/36382
 https://exchange.xforce.ibmcloud.com/vulnerabilities/36383
 https://issues.rpath.com/browse/RPL-1693
 https://issues.rpath.com/browse/RPL-1702
 https://linux.oracle.com/cve/CVE-2007-3996.html
 https://linux.oracle.com/errata/ELSA-2007-0890.html
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11147
 https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
 
 | 
  | libwmf-dev | CVE-2009-3546 | LOW | 0.2.8.4-17 |  | Expand...http://marc.info/?l=oss-security&m=125562113503923&w=2http://secunia.com/advisories/37069
 http://secunia.com/advisories/37080
 http://secunia.com/advisories/38055
 http://svn.php.net/viewvc?view=revision&revision=289557
 http://www.mandriva.com/security/advisories?name=MDVSA-2009:285
 http://www.openwall.com/lists/oss-security/2009/11/20/5
 http://www.redhat.com/support/errata/RHSA-2010-0003.html
 http://www.securityfocus.com/bid/36712
 http://www.vupen.com/english/advisories/2009/2929
 http://www.vupen.com/english/advisories/2009/2930
 https://linux.oracle.com/cve/CVE-2009-3546.html
 https://linux.oracle.com/errata/ELSA-2010-0040.html
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11199
 
 | 
  | libwmf0.2-7 | CVE-2007-3476 | LOW | 0.2.8.4-17 |  | Expand...ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgzhttp://bugs.libgd.org/?do=details&task_id=87
 http://fedoranews.org/updates/FEDORA-2007-205.shtml
 http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
 http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
 http://osvdb.org/37741
 http://secunia.com/advisories/25860
 http://secunia.com/advisories/26272
 http://secunia.com/advisories/26390
 http://secunia.com/advisories/26415
 http://secunia.com/advisories/26467
 http://secunia.com/advisories/26663
 http://secunia.com/advisories/26766
 http://secunia.com/advisories/26856
 http://secunia.com/advisories/29157
 http://secunia.com/advisories/30168
 http://secunia.com/advisories/31168
 http://secunia.com/advisories/42813
 http://security.gentoo.org/glsa/glsa-200708-05.xml
 http://security.gentoo.org/glsa/glsa-200711-34.xml
 http://security.gentoo.org/glsa/glsa-200805-13.xml
 http://www.debian.org/security/2008/dsa-1613
 http://www.libgd.org/ReleaseNote020035
 http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
 http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
 http://www.novell.com/linux/security/advisories/2007_15_sr.html
 http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
 http://www.redhat.com/support/errata/RHSA-2008-0146.html
 http://www.securityfocus.com/archive/1/478796/100/0/threaded
 http://www.securityfocus.com/bid/24651
 http://www.trustix.org/errata/2007/0024/
 http://www.vupen.com/english/advisories/2011/0022
 https://bugzilla.redhat.com/show_bug.cgi?id=277421
 https://issues.rpath.com/browse/RPL-1643
 https://linux.oracle.com/cve/CVE-2007-3476.html
 https://linux.oracle.com/errata/ELSA-2008-0146.html
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10348
 
 | 
  | libwmf0.2-7 | CVE-2007-3477 | LOW | 0.2.8.4-17 |  | Expand...ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/gd-2.0.35-i486-1_slack11.0.tgzhttp://bugs.libgd.org/?do=details&task_id=74
 http://bugs.libgd.org/?do=details&task_id=92
 http://fedoranews.org/updates/FEDORA-2007-205.shtml
 http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
 http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
 http://osvdb.org/42062
 http://secunia.com/advisories/25860
 http://secunia.com/advisories/26272
 http://secunia.com/advisories/26390
 http://secunia.com/advisories/26415
 http://secunia.com/advisories/26467
 http://secunia.com/advisories/26663
 http://secunia.com/advisories/26766
 http://secunia.com/advisories/26856
 http://secunia.com/advisories/30168
 http://secunia.com/advisories/31168
 http://secunia.com/advisories/42813
 http://security.gentoo.org/glsa/glsa-200708-05.xml
 http://security.gentoo.org/glsa/glsa-200711-34.xml
 http://security.gentoo.org/glsa/glsa-200805-13.xml
 http://www.debian.org/security/2008/dsa-1613
 http://www.libgd.org/ReleaseNote020035
 http://www.mandriva.com/security/advisories?name=MDKSA-2007:153
 http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
 http://www.novell.com/linux/security/advisories/2007_15_sr.html
 http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00311.html
 http://www.securityfocus.com/archive/1/478796/100/0/threaded
 http://www.securityfocus.com/bid/24651
 http://www.trustix.org/errata/2007/0024/
 http://www.vupen.com/english/advisories/2011/0022
 https://bugzilla.redhat.com/show_bug.cgi?id=277421
 https://issues.rpath.com/browse/RPL-1643
 
 | 
  | libwmf0.2-7 | CVE-2007-3996 | LOW | 0.2.8.4-17 |  | Expand...http://bugs.gentoo.org/show_bug.cgi?id=201546http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
 http://rhn.redhat.com/errata/RHSA-2007-0889.html
 http://secunia.com/advisories/26642
 http://secunia.com/advisories/26822
 http://secunia.com/advisories/26838
 http://secunia.com/advisories/26871
 http://secunia.com/advisories/26895
 http://secunia.com/advisories/26930
 http://secunia.com/advisories/26967
 http://secunia.com/advisories/27102
 http://secunia.com/advisories/27351
 http://secunia.com/advisories/27377
 http://secunia.com/advisories/27545
 http://secunia.com/advisories/28009
 http://secunia.com/advisories/28147
 http://secunia.com/advisories/28658
 http://secunia.com/advisories/31168
 http://security.gentoo.org/glsa/glsa-200712-13.xml
 http://securityreason.com/securityalert/3103
 http://secweb.se/en/advisories/php-imagecopyresized-integer-overflow/
 http://secweb.se/en/advisories/php-imagecreatetruecolor-integer-overflow/
 http://support.avaya.com/elmodocs2/security/ASA-2007-449.htm
 http://www.debian.org/security/2008/dsa-1613
 http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
 http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
 http://www.php.net/ChangeLog-5.php#5.2.4
 http://www.php.net/releases/5_2_4.php
 http://www.redhat.com/support/errata/RHSA-2007-0888.html
 http://www.redhat.com/support/errata/RHSA-2007-0890.html
 http://www.redhat.com/support/errata/RHSA-2007-0891.html
 http://www.trustix.org/errata/2007/0026/
 http://www.ubuntu.com/usn/usn-557-1
 http://www.vupen.com/english/advisories/2007/3023
 https://exchange.xforce.ibmcloud.com/vulnerabilities/36382
 https://exchange.xforce.ibmcloud.com/vulnerabilities/36383
 https://issues.rpath.com/browse/RPL-1693
 https://issues.rpath.com/browse/RPL-1702
 https://linux.oracle.com/cve/CVE-2007-3996.html
 https://linux.oracle.com/errata/ELSA-2007-0890.html
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11147
 https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
 
 | 
  | libwmf0.2-7 | CVE-2009-3546 | LOW | 0.2.8.4-17 |  | Expand...http://marc.info/?l=oss-security&m=125562113503923&w=2http://secunia.com/advisories/37069
 http://secunia.com/advisories/37080
 http://secunia.com/advisories/38055
 http://svn.php.net/viewvc?view=revision&revision=289557
 http://www.mandriva.com/security/advisories?name=MDVSA-2009:285
 http://www.openwall.com/lists/oss-security/2009/11/20/5
 http://www.redhat.com/support/errata/RHSA-2010-0003.html
 http://www.securityfocus.com/bid/36712
 http://www.vupen.com/english/advisories/2009/2929
 http://www.vupen.com/english/advisories/2009/2930
 https://linux.oracle.com/cve/CVE-2009-3546.html
 https://linux.oracle.com/errata/ELSA-2010-0040.html
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11199
 
 | 
  | libxml2 | CVE-2022-23308 | HIGH | 2.9.10+dfsg-6.7 | 2.9.10+dfsg-6.7+deb11u1 | Expand...https://access.redhat.com/security/cve/CVE-2022-23308https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308
 https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e
 https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
 https://linux.oracle.com/cve/CVE-2022-23308.html
 https://linux.oracle.com/errata/ELSA-2022-0899.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
 https://ubuntu.com/security/notices/USN-5324-1
 
 | 
  | libxml2-dev | CVE-2022-23308 | HIGH | 2.9.10+dfsg-6.7 | 2.9.10+dfsg-6.7+deb11u1 | Expand...https://access.redhat.com/security/cve/CVE-2022-23308https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308
 https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e
 https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
 https://linux.oracle.com/cve/CVE-2022-23308.html
 https://linux.oracle.com/errata/ELSA-2022-0899.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
 https://ubuntu.com/security/notices/USN-5324-1
 
 | 
  | linux-libc-dev | CVE-2013-7445 | HIGH | 5.10.84-1 |  | Expand...https://bugzilla.kernel.org/show_bug.cgi?id=60533https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7445
 https://lists.freedesktop.org/archives/dri-devel/2015-September/089778.html (potential start towards fixing)
 
 | 
  | linux-libc-dev | CVE-2019-19378 | HIGH | 5.10.84-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378
 https://security.netapp.com/advisory/ntap-20200103-0001/
 
 | 
  | linux-libc-dev | CVE-2019-19449 | HIGH | 5.10.84-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449
 https://security.netapp.com/advisory/ntap-20200103-0001/
 https://ubuntu.com/security/notices/USN-5120-1
 https://ubuntu.com/security/notices/USN-5136-1
 https://ubuntu.com/security/notices/USN-5137-1
 https://ubuntu.com/security/notices/USN-5137-2
 https://ubuntu.com/security/notices/USN-5343-1
 
 | 
  | linux-libc-dev | CVE-2019-19814 | HIGH | 5.10.84-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19814
 https://security.netapp.com/advisory/ntap-20200103-0001/
 
 | 
  | linux-libc-dev | CVE-2020-12362 | HIGH | 5.10.84-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362https://linux.oracle.com/cve/CVE-2020-12362.html
 https://linux.oracle.com/errata/ELSA-2021-9434.html
 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
 
 | 
  | linux-libc-dev | CVE-2021-22600 | HIGH | 5.10.84-1 | 5.10.92-1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=ec6af094ea28f0f2dda1a6a33b14cd57e36a9755
 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
 https://ubuntu.com/security/notices/USN-5266-1
 https://ubuntu.com/security/notices/USN-5278-1
 https://ubuntu.com/security/notices/USN-5294-1
 https://ubuntu.com/security/notices/USN-5294-2
 https://ubuntu.com/security/notices/USN-5295-1
 https://ubuntu.com/security/notices/USN-5295-2
 https://ubuntu.com/security/notices/USN-5298-1
 https://www.debian.org/security/2022/dsa-5096
 
 | 
  | linux-libc-dev | CVE-2021-3864 | HIGH | 5.10.84-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com
 https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/
 https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com
 https://www.openwall.com/lists/oss-security/2021/10/20/2
 
 | 
  | linux-libc-dev | CVE-2021-39685 | HIGH | 5.10.84-1 | 5.10.92-1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=36dfdf11af49d3c009c711fb16f5c6e7a274505d
 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=6eea4ace62fa6414432692ee44f0c0a3d541d97a
 https://github.com/szymonh/inspector-gadget
 https://gitlab.com/postmarketOS/pmaports/-/issues/1346
 https://linux.oracle.com/cve/CVE-2021-39685.html
 https://linux.oracle.com/errata/ELSA-2022-9245.html
 https://source.android.com/security/bulletin/2022-03-01
 https://ubuntu.com/security/notices/USN-5278-1
 https://ubuntu.com/security/notices/USN-5294-1
 https://ubuntu.com/security/notices/USN-5294-2
 https://ubuntu.com/security/notices/USN-5297-1
 https://ubuntu.com/security/notices/USN-5298-1
 https://ubuntu.com/security/notices/USN-5337-1
 https://www.openwall.com/lists/oss-security/2021/12/15/4
 
 | 
  | linux-libc-dev | CVE-2021-39686 | HIGH | 5.10.84-1 |  | Expand...https://android.googlesource.com/kernel/common/+/11db2de0af2ahttps://android.googlesource.com/kernel/common/+/3af7a2f61023
 https://android.googlesource.com/kernel/common/+/a4eacf3227bd
 https://android.googlesource.com/kernel/common/+/d49297739550
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
 https://source.android.com/security/bulletin/2022-03-01
 
 | 
  | linux-libc-dev | CVE-2021-39698 | HIGH | 5.10.84-1 | 5.10.92-1 | Expand...https://android.googlesource.com/kernel/common/+/363bee27e258https://android.googlesource.com/kernel/common/+/42288cb44c4b
 https://android.googlesource.com/kernel/common/+/50252e4b5e98
 https://android.googlesource.com/kernel/common/+/9537bae0da1f
 https://android.googlesource.com/kernel/common/+/a880b28a71e3
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
 https://lore.kernel.org/all/20211209010455.42744-2-ebiggers@kernel.org/
 https://lore.kernel.org/all/20211210235312.40412-5-ebiggers@kernel.org/
 https://source.android.com/security/bulletin/2022-03-01
 https://ubuntu.com/security/notices/USN-5337-1
 
 | 
  | linux-libc-dev | CVE-2021-44733 | HIGH | 5.10.84-1 | 5.10.92-1 | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2030747https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/tee/tee_shm.c
 https://github.com/pjlantz/optee-qemu/blob/main/README.md
 https://linux.oracle.com/cve/CVE-2021-44733.html
 https://linux.oracle.com/errata/ELSA-2022-9148.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
 https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/
 https://lore.kernel.org/lkml/20211215092501.1861229-1-jens.wiklander@linaro.org/
 https://security.netapp.com/advisory/ntap-20220114-0003/
 https://ubuntu.com/security/notices/USN-5278-1
 https://ubuntu.com/security/notices/USN-5337-1
 https://ubuntu.com/security/notices/USN-5338-1
 https://ubuntu.com/security/notices/USN-5339-1
 https://www.debian.org/security/2022/dsa-5096
 
 | 
  | linux-libc-dev | CVE-2021-45469 | HIGH | 5.10.84-1 | 5.10.92-1 | Expand...http://www.openwall.com/lists/oss-security/2021/12/25/1https://bugzilla.kernel.org/show_bug.cgi?id=215235
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
 https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=dev&id=5598b24efaf4892741c798b425d543e4bed357a1
 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AK2C4A43BZSWATZWFUHHHUQF3HPIALNP/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QG7XV2WXKMSMKIQKIBG5LW3Y3GXEWG5Q/
 https://security.netapp.com/advisory/ntap-20220114-0003/
 https://ubuntu.com/security/notices/USN-5343-1
 https://www.debian.org/security/2022/dsa-5050
 https://www.debian.org/security/2022/dsa-5096
 
 | 
  | linux-libc-dev | CVE-2022-0185 | HIGH | 5.10.84-1 | 5.10.92-1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de29310e8aa03fcbdb41fc92c521756
 https://github.com/Crusaders-of-Rust/CVE-2022-0185
 https://linux.oracle.com/cve/CVE-2022-0185.html
 https://linux.oracle.com/errata/ELSA-2022-9148.html
 https://security.netapp.com/advisory/ntap-20220225-0003/
 https://ubuntu.com/security/notices/USN-5240-1
 https://www.openwall.com/lists/oss-security/2022/01/18/7
 https://www.willsroot.io/2022/01/cve-2022-0185.html
 
 | 
  | linux-libc-dev | CVE-2022-0330 | HIGH | 5.10.84-1 | 5.10.92-2 | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2042404https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
 https://git.kernel.org/linus/7938d61591d33394a21bdd7797a245b65428f44c
 https://linux.oracle.com/cve/CVE-2022-0330.html
 https://linux.oracle.com/errata/ELSA-2022-9245.html
 https://ubuntu.com/security/notices/USN-5278-1
 https://ubuntu.com/security/notices/USN-5294-1
 https://ubuntu.com/security/notices/USN-5294-2
 https://ubuntu.com/security/notices/USN-5295-1
 https://ubuntu.com/security/notices/USN-5295-2
 https://ubuntu.com/security/notices/USN-5297-1
 https://ubuntu.com/security/notices/USN-5298-1
 https://www.openwall.com/lists/oss-security/2022/01/25/12
 
 | 
  | linux-libc-dev | CVE-2022-0435 | HIGH | 5.10.84-1 | 5.10.92-2 | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2048738https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
 https://linux.oracle.com/cve/CVE-2022-0435.html
 https://linux.oracle.com/errata/ELSA-2022-9245.html
 https://ubuntu.com/security/notices/USN-5302-1
 https://ubuntu.com/security/notices/USN-5337-1
 https://ubuntu.com/security/notices/USN-5338-1
 https://ubuntu.com/security/notices/USN-5339-1
 https://www.openwall.com/lists/oss-security/2022/02/10/1
 
 | 
  | linux-libc-dev | CVE-2022-0492 | HIGH | 5.10.84-1 | 5.10.103-1 | Expand...http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.htmlhttps://bugzilla.redhat.com/show_bug.cgi?id=2051505
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af
 https://linux.oracle.com/cve/CVE-2022-0492.html
 https://linux.oracle.com/errata/ELSA-2022-9245.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
 https://ubuntu.com/security/notices/USN-5302-1
 https://ubuntu.com/security/notices/USN-5337-1
 https://ubuntu.com/security/notices/USN-5338-1
 https://ubuntu.com/security/notices/USN-5339-1
 https://ubuntu.com/security/notices/USN-5343-1
 https://www.debian.org/security/2022/dsa-5095
 https://www.debian.org/security/2022/dsa-5096
 https://www.openwall.com/lists/oss-security/2022/02/04/1
 
 | 
  | linux-libc-dev | CVE-2022-0500 | HIGH | 5.10.84-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2044578https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=20b2aff4bc15bda809f994761d5719827d66c0b4
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=216e3cd2f28dbbf1fe86848e0e29e6693b9f0a20
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34d3a78c681e8e7844b43d1a2f4671a04249c821
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4807322660d4290ac9062c034aed6b87243861
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48946bd6a5d695c50b34546864b79c1f910a33c1
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c25b2ae136039ffa820c26138ed4a5e5f3ab3841
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf9f2f8d62eca810afbd1ee6cc0800202b000e57
 
 | 
  | linux-libc-dev | CVE-2022-0516 | HIGH | 5.10.84-1 | 5.10.92-2 | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2050237https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=09a93c1df3eafa43bcdfd7bf837c574911f12f55
 https://linux.oracle.com/cve/CVE-2022-0516.html
 https://linux.oracle.com/errata/ELSA-2022-0825.html
 https://ubuntu.com/security/notices/USN-5337-1
 https://ubuntu.com/security/notices/USN-5338-1
 https://www.debian.org/security/2022/dsa-5092
 https://www.openwall.com/lists/oss-security/2022/02/11/2
 
 | 
  | linux-libc-dev | CVE-2022-0847 | HIGH | 5.10.84-1 | 5.10.92-2 | Expand...http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-Escalation.htmlhttp://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html
 http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-Escalation.html
 https://bugzilla.redhat.com/show_bug.cgi?id=2060795
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847
 https://dirtypipe.cm4all.com/
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/lib/iov_iter.c?id=9d2231c5d74e13b2a0546fee6737ee4446017903
 https://linux.oracle.com/cve/CVE-2022-0847.html
 https://linux.oracle.com/errata/ELSA-2022-9245.html
 https://security.netapp.com/advisory/ntap-20220325-0005/
 https://ubuntu.com/security/notices/USN-5317-1
 https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/DirtyPipe
 https://www.openwall.com/lists/oss-security/2022/03/07/1
 https://www.suse.com/support/kb/doc/?id=000020603
 
 | 
  | linux-libc-dev | CVE-2022-0995 | HIGH | 5.10.84-1 | 5.10.106-1 | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2063786https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0995
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93ce93587d36493f2f86921fa79921b3cba63fbb
 
 | 
  | linux-libc-dev | CVE-2022-1011 | HIGH | 5.10.84-1 | 5.10.106-1 | Expand...https://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/fuse.git/commit/?h=for-nexthttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/
 
 | 
  | linux-libc-dev | CVE-2022-1048 | HIGH | 5.10.84-1 |  | Expand...https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai@suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3
 | 
  | linux-libc-dev | CVE-2022-22942 | HIGH | 5.10.84-1 | 5.10.92-2 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942https://linux.oracle.com/cve/CVE-2022-22942.html
 https://linux.oracle.com/errata/ELSA-2022-0825.html
 https://ubuntu.com/security/notices/USN-5278-1
 https://ubuntu.com/security/notices/USN-5294-1
 https://ubuntu.com/security/notices/USN-5294-2
 https://ubuntu.com/security/notices/USN-5295-1
 https://ubuntu.com/security/notices/USN-5295-2
 https://ubuntu.com/security/notices/USN-5297-1
 https://ubuntu.com/security/notices/USN-5298-1
 https://www.openwall.com/lists/oss-security/2022/01/27/4
 
 | 
  | linux-libc-dev | CVE-2022-23036 | HIGH | 5.10.84-1 | 5.10.106-1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036https://xenbits.xen.org/xsa/advisory-396.html
 https://xenbits.xenproject.org/xsa/advisory-396.txt
 
 | 
  | linux-libc-dev | CVE-2022-23037 | HIGH | 5.10.84-1 | 5.10.106-1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037https://xenbits.xen.org/xsa/advisory-396.html
 https://xenbits.xenproject.org/xsa/advisory-396.txt
 
 | 
  | linux-libc-dev | CVE-2022-23038 | HIGH | 5.10.84-1 | 5.10.106-1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038https://xenbits.xen.org/xsa/advisory-396.html
 https://xenbits.xenproject.org/xsa/advisory-396.txt
 
 | 
  | linux-libc-dev | CVE-2022-23039 | HIGH | 5.10.84-1 | 5.10.106-1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039https://xenbits.xen.org/xsa/advisory-396.html
 https://xenbits.xenproject.org/xsa/advisory-396.txt
 
 | 
  | linux-libc-dev | CVE-2022-23040 | HIGH | 5.10.84-1 | 5.10.106-1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040https://xenbits.xen.org/xsa/advisory-396.html
 https://xenbits.xenproject.org/xsa/advisory-396.txt
 
 | 
  | linux-libc-dev | CVE-2022-23041 | HIGH | 5.10.84-1 | 5.10.106-1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041https://xenbits.xen.org/xsa/advisory-396.html
 https://xenbits.xenproject.org/xsa/advisory-396.txt
 
 | 
  | linux-libc-dev | CVE-2022-23042 | HIGH | 5.10.84-1 | 5.10.106-1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042https://xenbits.xen.org/xsa/advisory-396.html
 https://xenbits.xenproject.org/xsa/advisory-396.txt
 
 | 
  | linux-libc-dev | CVE-2022-23222 | HIGH | 5.10.84-1 | 5.10.92-1 | Expand...http://www.openwall.com/lists/oss-security/2022/01/14/1http://www.openwall.com/lists/oss-security/2022/01/18/2
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCR3LIRUEXR7CA63W5M2HT3K63MZGKBR/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z5VTIZZUPC73IEJNZX66BY2YCBRZAELB/
 https://security.netapp.com/advisory/ntap-20220217-0002/
 https://ubuntu.com/security/notices/USN-5278-1
 https://ubuntu.com/security/notices/USN-5337-1
 https://www.debian.org/security/2022/dsa-5050
 https://www.openwall.com/lists/oss-security/2022/01/13/1
 
 | 
  | linux-libc-dev | CVE-2022-24958 | HIGH | 5.10.84-1 | 5.10.106-1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=501e38a5531efbd77d5c73c0ba838a889bfc1d74
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=89f3594d0de58e8a57d92d497dea9fee3d4b9cda
 https://github.com/torvalds/linux/commit/501e38a5531efbd77d5c73c0ba838a889bfc1d74
 https://github.com/torvalds/linux/commit/89f3594d0de58e8a57d92d497dea9fee3d4b9cda
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUVZA2YVOQJBJTDIDQ5HF5TAU2C6WP6H/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/
 https://security.netapp.com/advisory/ntap-20220225-0008/
 
 | 
  | linux-libc-dev | CVE-2022-25636 | HIGH | 5.10.84-1 | 5.10.103-1 | Expand...http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.htmlhttp://www.openwall.com/lists/oss-security/2022/02/22/1
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25636
 https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git/commit/?id=b1a5983f56e371046dcf164f90bfaf704d2b89f6
 https://github.com/Bonfee/CVE-2022-25636
 https://linux.oracle.com/cve/CVE-2022-25636.html
 https://linux.oracle.com/errata/ELSA-2022-9245.html
 https://nickgregory.me/linux/security/2022/03/12/cve-2022-25636/
 https://security.netapp.com/advisory/ntap-20220325-0002/
 https://ubuntu.com/security/notices/USN-5317-1
 https://ubuntu.com/security/notices/USN-5318-1
 https://www.debian.org/security/2022/dsa-5095
 https://www.openwall.com/lists/oss-security/2022/02/21/2
 
 | 
  | linux-libc-dev | CVE-2022-26490 | HIGH | 5.10.84-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490https://git.kernel.org/linux/4fbcc1a4cb20fe26ad0225679c536c80f1648221 (5.17-rc1)
 https://github.com/torvalds/linux/commit/4fbcc1a4cb20fe26ad0225679c536c80f1648221
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/
 
 | 
  | linux-libc-dev | CVE-2022-27223 | HIGH | 5.10.84-1 | 5.10.103-1 | Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27223
 https://git.kernel.org/linus/7f14c7227f342d9932f9b918893c8814f86d2a0d (5.17-rc6)
 https://github.com/torvalds/linux/commit/7f14c7227f342d9932f9b918893c8814f86d2a0d
 
 | 
  | linux-libc-dev | CVE-2022-27666 | HIGH | 5.10.84-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2061633https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645
 
 | 
  | linux-libc-dev | CVE-2019-15213 | MEDIUM | 5.10.84-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.htmlhttp://www.openwall.com/lists/oss-security/2019/08/20/2
 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7
 https://linux.oracle.com/cve/CVE-2019-15213.html
 https://linux.oracle.com/errata/ELSA-2019-4872.html
 https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/
 https://security.netapp.com/advisory/ntap-20190905-0002/
 https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
 
 | 
  | linux-libc-dev | CVE-2019-15794 | MEDIUM | 5.10.84-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15794https://git.launchpad.net/ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=270d16ae48a4dbf1c7e25e94cc3e38b4bea37635
 https://git.launchpad.net/ubuntu-kernel/ubuntu/+source/linux/+git/eoan/commit/?id=ef81780548d20a786cc77ed4203fca146fd81ce3
 https://ubuntu.com/security/notices/USN-4208-1
 https://ubuntu.com/security/notices/USN-4209-1
 https://usn.ubuntu.com/usn/usn-4208-1
 https://usn.ubuntu.com/usn/usn-4209-1
 
 | 
  | linux-libc-dev | CVE-2019-16089 | MEDIUM | 5.10.84-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16089https://linux.oracle.com/cve/CVE-2019-16089.html
 https://linux.oracle.com/errata/ELSA-2020-5913.html
 https://lore.kernel.org/lkml/20190911164013.27364-1-navid.emamdoost@gmail.com/
 https://lore.kernel.org/patchwork/patch/1106884/
 https://lore.kernel.org/patchwork/patch/1126650/
 https://security.netapp.com/advisory/ntap-20191004-0001/
 https://support.f5.com/csp/article/K03814795?utm_source=f5support&utm_medium=RSS
 https://ubuntu.com/security/notices/USN-4414-1
 https://ubuntu.com/security/notices/USN-4425-1
 https://ubuntu.com/security/notices/USN-4439-1
 https://ubuntu.com/security/notices/USN-4440-1
 https://usn.ubuntu.com/4414-1/
 https://usn.ubuntu.com/4425-1/
 https://usn.ubuntu.com/4439-1/
 https://usn.ubuntu.com/4440-1/
 
 | 
  | linux-libc-dev | CVE-2019-20794 | MEDIUM | 5.10.84-1 |  | Expand...http://www.openwall.com/lists/oss-security/2020/08/24/1https://github.com/sargun/fuse-example
 https://security.netapp.com/advisory/ntap-20200608-0001/
 https://sourceforge.net/p/fuse/mailman/message/36598753/
 
 | 
  | linux-libc-dev | CVE-2020-12363 | MEDIUM | 5.10.84-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363https://linux.oracle.com/cve/CVE-2020-12363.html
 https://linux.oracle.com/errata/ELSA-2021-2314.html
 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
 
 | 
  | linux-libc-dev | CVE-2020-12364 | MEDIUM | 5.10.84-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364https://linux.oracle.com/cve/CVE-2020-12364.html
 https://linux.oracle.com/errata/ELSA-2021-2314.html
 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
 
 | 
  | linux-libc-dev | CVE-2020-14304 | MEDIUM | 5.10.84-1 |  | Expand...https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304
 https://linux.oracle.com/cve/CVE-2020-14304.html
 https://linux.oracle.com/errata/ELSA-2021-9410.html
 https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
 
 | 
  | linux-libc-dev | CVE-2020-15802 | MEDIUM | 5.10.84-1 |  | Expand...https://arxiv.org/abs/2009.11776https://gizmodo.com/bluetooth-unveils-its-latest-security-issue-with-no-se-1845013709
 https://hexhive.epfl.ch/BLURtooth/
 https://securityaffairs.co/wordpress/108096/hacking/blurtooth-bluetooth-attack.html
 https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/
 https://www.kb.cert.org/vuls/id/589825
 https://www.kb.cert.org/vuls/id/589825/
 
 | 
  | linux-libc-dev | CVE-2020-24504 | MEDIUM | 5.10.84-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504https://linux.oracle.com/cve/CVE-2020-24504.html
 https://linux.oracle.com/errata/ELSA-2021-4356.html
 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
 
 | 
  | linux-libc-dev | CVE-2020-26555 | MEDIUM | 5.10.84-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1918601https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26555
 https://kb.cert.org/vuls/id/799380
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/
 https://ubuntu.com/security/notices/USN-5343-1
 https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/impersonation-pin-pairing/
 https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html
 
 | 
  | linux-libc-dev | CVE-2020-36310 | MEDIUM | 5.10.84-1 | 5.10.103-1 | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1769283#c148https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310
 https://git.kernel.org/linus/e72436bc3a5206f95bb384e741154166ddb3202e
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e
 https://linux.oracle.com/cve/CVE-2020-36310.html
 https://linux.oracle.com/errata/ELSA-2021-9307.html
 https://www.debian.org/security/2022/dsa-5095
 
 | 
  | linux-libc-dev | CVE-2020-36516 | MEDIUM | 5.10.84-1 |  | Expand...https://dl.acm.org/doi/10.1145/3372297.3417884https://www.spinics.net/lists/netdev/msg795642.html
 
 | 
  | linux-libc-dev | CVE-2021-28711 | MEDIUM | 5.10.84-1 | 5.10.92-1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
 https://ubuntu.com/security/notices/USN-5298-1
 https://ubuntu.com/security/notices/USN-5337-1
 https://ubuntu.com/security/notices/USN-5338-1
 https://www.debian.org/security/2022/dsa-5050
 https://www.debian.org/security/2022/dsa-5096
 https://xenbits.xen.org/xsa/advisory-391.html
 https://xenbits.xenproject.org/xsa/advisory-391.txt
 
 | 
  | linux-libc-dev | CVE-2021-28712 | MEDIUM | 5.10.84-1 | 5.10.92-1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
 https://ubuntu.com/security/notices/USN-5298-1
 https://ubuntu.com/security/notices/USN-5337-1
 https://ubuntu.com/security/notices/USN-5338-1
 https://www.debian.org/security/2022/dsa-5050
 https://www.debian.org/security/2022/dsa-5096
 https://xenbits.xen.org/xsa/advisory-391.html
 https://xenbits.xenproject.org/xsa/advisory-391.txt
 
 | 
  | linux-libc-dev | CVE-2021-28713 | MEDIUM | 5.10.84-1 | 5.10.92-1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
 https://ubuntu.com/security/notices/USN-5278-1
 https://ubuntu.com/security/notices/USN-5298-1
 https://ubuntu.com/security/notices/USN-5337-1
 https://ubuntu.com/security/notices/USN-5338-1
 https://www.debian.org/security/2022/dsa-5050
 https://www.debian.org/security/2022/dsa-5096
 https://xenbits.xen.org/xsa/advisory-391.html
 https://xenbits.xenproject.org/xsa/advisory-391.txt
 
 | 
  | linux-libc-dev | CVE-2021-28714 | MEDIUM | 5.10.84-1 | 5.10.92-1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
 https://ubuntu.com/security/notices/USN-5278-1
 https://ubuntu.com/security/notices/USN-5298-1
 https://ubuntu.com/security/notices/USN-5337-1
 https://ubuntu.com/security/notices/USN-5338-1
 https://www.debian.org/security/2022/dsa-5050
 https://www.debian.org/security/2022/dsa-5096
 https://xenbits.xen.org/xsa/advisory-392.html
 https://xenbits.xenproject.org/xsa/advisory-392.txt
 
 | 
  | linux-libc-dev | CVE-2021-28715 | MEDIUM | 5.10.84-1 | 5.10.92-1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
 https://ubuntu.com/security/notices/USN-5278-1
 https://ubuntu.com/security/notices/USN-5298-1
 https://ubuntu.com/security/notices/USN-5337-1
 https://ubuntu.com/security/notices/USN-5338-1
 https://www.debian.org/security/2022/dsa-5050
 https://www.debian.org/security/2022/dsa-5096
 https://xenbits.xen.org/xsa/advisory-392.html
 https://xenbits.xenproject.org/xsa/advisory-392.txt
 
 | 
  | linux-libc-dev | CVE-2021-3669 | MEDIUM | 5.10.84-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
 
 | 
  | linux-libc-dev | CVE-2021-3759 | MEDIUM | 5.10.84-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3759https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/
 https://ubuntu.com/security/notices/USN-5115-1
 https://ubuntu.com/security/notices/USN-5117-1
 https://ubuntu.com/security/notices/USN-5120-1
 https://ubuntu.com/security/notices/USN-5135-1
 https://ubuntu.com/security/notices/USN-5136-1
 https://ubuntu.com/security/notices/USN-5137-1
 https://ubuntu.com/security/notices/USN-5137-2
 
 | 
  | linux-libc-dev | CVE-2021-3847 | MEDIUM | 5.10.84-1 |  | Expand...https://www.openwall.com/lists/oss-security/2021/10/14/3
 | 
  | linux-libc-dev | CVE-2021-4023 | MEDIUM | 5.10.84-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2026484
 | 
  | linux-libc-dev | CVE-2021-4037 | MEDIUM | 5.10.84-1 |  | Expand...https://access.redhat.com/security/cve/CVE-2021-4037https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848
 
 | 
  | linux-libc-dev | CVE-2021-4149 | MEDIUM | 5.10.84-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2026485https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4149
 https://git.kernel.org/linus/19ea40dddf1833db868533958ca066f368862211 (5.15-rc6)
 https://lkml.org/lkml/2021/10/18/885
 https://lkml.org/lkml/2021/9/13/2565
 
 | 
  | linux-libc-dev | CVE-2021-4155 | MEDIUM | 5.10.84-1 | 5.10.92-1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155https://git.kernel.org/linus/983d8e60f50806f90534cc5373d0ce867e5aaf79 (5.16)
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79
 https://linux.oracle.com/cve/CVE-2021-4155.html
 https://linux.oracle.com/errata/ELSA-2022-9148.html
 https://ubuntu.com/security/notices/USN-5278-1
 https://ubuntu.com/security/notices/USN-5294-1
 https://ubuntu.com/security/notices/USN-5294-2
 https://ubuntu.com/security/notices/USN-5295-1
 https://ubuntu.com/security/notices/USN-5295-2
 https://ubuntu.com/security/notices/USN-5297-1
 https://ubuntu.com/security/notices/USN-5298-1
 https://www.openwall.com/lists/oss-security/2022/01/10/1
 
 | 
  | linux-libc-dev | CVE-2021-4197 | MEDIUM | 5.10.84-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2035652https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
 https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/
 https://ubuntu.com/security/notices/USN-5278-1
 https://ubuntu.com/security/notices/USN-5337-1
 
 | 
  | linux-libc-dev | CVE-2021-4204 | MEDIUM | 5.10.84-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4204https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/impish/commit/?id=53fb7741ff9d546174dbb585957b4f8b6afbdb83
 https://ubuntu.com/security/notices/USN-5217-1
 https://ubuntu.com/security/notices/USN-5218-1
 https://ubuntu.com/security/notices/USN-5219-1
 https://www.openwall.com/lists/oss-security/2022/01/11/4
 
 | 
  | linux-libc-dev | CVE-2021-43976 | MEDIUM | 5.10.84-1 | 5.10.92-2 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/wireless-drivers-next.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84
 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
 https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/
 https://security.netapp.com/advisory/ntap-20211210-0001/
 https://ubuntu.com/security/notices/USN-5302-1
 https://ubuntu.com/security/notices/USN-5338-1
 https://ubuntu.com/security/notices/USN-5339-1
 https://www.debian.org/security/2022/dsa-5092
 https://www.debian.org/security/2022/dsa-5096
 
 | 
  | linux-libc-dev | CVE-2021-44879 | MEDIUM | 5.10.84-1 |  | Expand...https://bugzilla.kernel.org/show_bug.cgi?id=215231https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f
 https://lkml.org/lkml/2022/1/24/4067
 https://lore.kernel.org/linux-f2fs-devel/20211206144421.3735-3-chao@kernel.org/T/
 https://ubuntu.com/security/notices/USN-5302-1
 https://www.openwall.com/lists/oss-security/2022/02/12/1
 
 | 
  | linux-libc-dev | CVE-2021-45095 | MEDIUM | 5.10.84-1 | 5.10.92-1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=bcd0f93353326954817a4f9fa55ec57fb38acbb0
 https://github.com/torvalds/linux/commit/bcd0f93353326954817a4f9fa55ec57fb38acbb0
 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
 https://lore.kernel.org/all/20211209082839.33985-1-hbh25y@gmail.com/
 https://ubuntu.com/security/notices/USN-5278-1
 https://ubuntu.com/security/notices/USN-5337-1
 https://ubuntu.com/security/notices/USN-5338-1
 https://ubuntu.com/security/notices/USN-5339-1
 https://ubuntu.com/security/notices/USN-5343-1
 https://www.debian.org/security/2022/dsa-5050
 https://www.debian.org/security/2022/dsa-5096
 
 | 
  | linux-libc-dev | CVE-2021-45402 | MEDIUM | 5.10.84-1 | 5.10.92-1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45402https://git.kernel.org/linus/3cf2b61eb06765e27fec6799292d9fb46d0b7e60
 https://git.kernel.org/linus/b1a7288dedc6caf9023f2676b4f5ed34cf0d4029
 https://git.kernel.org/linus/e572ff80f05c33cd0cb4860f864f5c9c044280b6
 https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=3cf2b61eb06765e27fec6799292d9fb46d0b7e60
 https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b1a7288dedc6caf9023f2676b4f5ed34cf0d4029
 https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=e572ff80f05c33cd0cb4860f864f5c9c044280b6
 https://ubuntu.com/security/notices/USN-5337-1
 
 | 
  | linux-libc-dev | CVE-2021-45480 | MEDIUM | 5.10.84-1 | 5.10.92-1 | Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.11https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
 https://git.kernel.org/linus/5f9562ebe710c307adc5f666bf1a2162ee7977c0
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5f9562ebe710c307adc5f666bf1a2162ee7977c0
 https://github.com/torvalds/linux/commit/5f9562ebe710c307adc5f666bf1a2162ee7977c0
 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
 https://ubuntu.com/security/notices/USN-5278-1
 https://ubuntu.com/security/notices/USN-5337-1
 https://ubuntu.com/security/notices/USN-5338-1
 https://www.debian.org/security/2022/dsa-5050
 https://www.debian.org/security/2022/dsa-5096
 
 | 
  | linux-libc-dev | CVE-2022-0001 | MEDIUM | 5.10.84-1 | 5.10.103-1 | Expand...http://www.openwall.com/lists/oss-security/2022/03/18/2https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
 https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
 https://ubuntu.com/security/notices/USN-5317-1
 https://ubuntu.com/security/notices/USN-5318-1
 https://ubuntu.com/security/notices/USN-5319-1
 https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI
 https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html
 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
 https://www.vusec.net/projects/bhi-spectre-bhb/
 
 | 
  | linux-libc-dev | CVE-2022-0002 | MEDIUM | 5.10.84-1 | 5.10.103-1 | Expand...http://www.openwall.com/lists/oss-security/2022/03/18/2https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
 https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
 https://ubuntu.com/security/notices/USN-5317-1
 https://ubuntu.com/security/notices/USN-5318-1
 https://ubuntu.com/security/notices/USN-5319-1
 https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI
 https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html
 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
 https://www.vusec.net/projects/bhi-spectre-bhb/
 
 | 
  | linux-libc-dev | CVE-2022-0168 | MEDIUM | 5.10.84-1 |  | Expand... | 
  | linux-libc-dev | CVE-2022-0400 | MEDIUM | 5.10.84-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2040604https://bugzilla.redhat.com/show_bug.cgi?id=2040604 (not public)
 https://bugzilla.redhat.com/show_bug.cgi?id=2044575
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0400
 
 | 
  | linux-libc-dev | CVE-2022-0480 | MEDIUM | 5.10.84-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2049700https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480
 https://git.kernel.org/linus/0f12156dff2862ac54235fc72703f18770769042 (5.15-rc1)
 https://github.com/kata-containers/kata-containers/issues/3373
 https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/
 
 | 
  | linux-libc-dev | CVE-2022-0487 | MEDIUM | 5.10.84-1 | 5.10.103-1 | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2044561https://bugzilla.suse.com/show_bug.cgi?id=1194516
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bd2db32e7c3e35bd4d9b8bbff689434a50893546
 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
 https://lore.kernel.org/all/20220114075934.302464-1-gregkh@linuxfoundation.org/
 https://lore.kernel.org/all/20220127071638.4057899-1-gregkh@linuxfoundation.org/
 https://www.debian.org/security/2022/dsa-5095
 https://www.debian.org/security/2022/dsa-5096
 
 | 
  | linux-libc-dev | CVE-2022-0494 | MEDIUM | 5.10.84-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2039448https://lore.kernel.org/all/20220216084038.15635-1-tcs.kernel@gmail.com/
 
 | 
  | linux-libc-dev | CVE-2022-0617 | MEDIUM | 5.10.84-1 | 5.10.103-1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617https://git.kernel.org/linus/7fc3b7c2981bbd1047916ade327beccb90994eee
 https://git.kernel.org/linus/ea8569194b43f0f01f0a84c689388542c7254a1f
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f
 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
 https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/
 https://www.debian.org/security/2022/dsa-5095
 https://www.debian.org/security/2022/dsa-5096
 
 | 
  | linux-libc-dev | CVE-2022-0812 | MEDIUM | 5.10.84-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2058361https://twitter.com/iMilnb/status/1497125078252806161
 
 | 
  | linux-libc-dev | CVE-2022-0854 | MEDIUM | 5.10.84-1 |  | Expand...https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13
 | 
  | linux-libc-dev | CVE-2022-23960 | MEDIUM | 5.10.84-1 | 5.10.106-1 | Expand...http://www.openwall.com/lists/oss-security/2022/03/18/2https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
 https://developer.arm.com/documentation/ka004995/latest/
 https://developer.arm.com/support/arm-security-updates
 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
 https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/spectre-bhb
 https://linux.oracle.com/cve/CVE-2022-23960.html
 https://linux.oracle.com/errata/ELSA-2022-9245.html
 https://ubuntu.com/security/notices/USN-5317-1
 https://ubuntu.com/security/notices/USN-5318-1
 https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI
 https://www.vusec.net/projects/bhi-spectre-bhb/
 
 | 
  | linux-libc-dev | CVE-2022-24959 | MEDIUM | 5.10.84-1 | 5.10.92-2 | Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
 https://git.kernel.org/linus/29eb31542787e1019208a2e1047bb7c76c069536 (5.17-rc2)
 https://github.com/torvalds/linux/commit/29eb31542787e1019208a2e1047bb7c76c069536
 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
 https://ubuntu.com/security/notices/USN-5302-1
 https://www.debian.org/security/2022/dsa-5092
 https://www.debian.org/security/2022/dsa-5096
 
 | 
  | linux-libc-dev | CVE-2022-25258 | MEDIUM | 5.10.84-1 | 5.10.92-2 | Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
 https://github.com/szymonh/d-os-descriptor
 https://github.com/torvalds/linux/commit/75e5b4849b81e19e9efe1654b30d7f3151c33c2c
 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCW2KZYJ2H6BKZE3CVLHRIXYDGNYYC5P/
 https://www.debian.org/security/2022/dsa-5092
 https://www.debian.org/security/2022/dsa-5096
 
 | 
  | linux-libc-dev | CVE-2022-25375 | MEDIUM | 5.10.84-1 | 5.10.92-2 | Expand...http://www.openwall.com/lists/oss-security/2022/02/21/1https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
 https://git.kernel.org/linus/38ea1eac7d88072bbffb630e2b3db83ca649b826 (5.17-rc4)
 https://github.com/szymonh/rndis-co
 https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826
 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
 https://www.debian.org/security/2022/dsa-5092
 https://www.debian.org/security/2022/dsa-5096
 
 | 
  | linux-libc-dev | CVE-2022-26966 | MEDIUM | 5.10.84-1 | 5.10.103-1 | Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26966
 https://git.kernel.org/linus/e9da0b56fe27206b49f39805f7dcda8a89379062 (5.17-rc6)
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e9da0b56fe27206b49f39805f7dcda8a89379062
 
 | 
  | linux-libc-dev | CVE-2004-0230 | LOW | 5.10.84-1 |  | Expand...ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-006.txt.ascftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt
 ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt
 ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.14/SCOSA-2005.14.txt
 ftp://patches.sgi.com/support/free/security/advisories/20040403-01-A.asc
 http://kb.juniper.net/JSA10638
 http://marc.info/?l=bugtraq&m=108302060014745&w=2
 http://marc.info/?l=bugtraq&m=108506952116653&w=2
 http://secunia.com/advisories/11440
 http://secunia.com/advisories/11458
 http://secunia.com/advisories/22341
 http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml
 http://www.kb.cert.org/vuls/id/415294
 http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
 http://www.osvdb.org/4030
 http://www.securityfocus.com/archive/1/449179/100/0/threaded
 http://www.securityfocus.com/bid/10183
 http://www.uniras.gov.uk/vuls/2004/236929/index.htm
 http://www.us-cert.gov/cas/techalerts/TA04-111A.html
 http://www.vupen.com/english/advisories/2006/3983
 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019
 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-064
 https://exchange.xforce.ibmcloud.com/vulnerabilities/15886
 https://kc.mcafee.com/corporate/index?page=content&id=SB10053
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2689
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A270
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3508
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4791
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5711
 
 | 
  | linux-libc-dev | CVE-2005-3660 | LOW | 5.10.84-1 |  | Expand...http://secunia.com/advisories/18205http://securityreason.com/securityalert/291
 http://securitytracker.com/id?1015402
 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362
 http://www.securityfocus.com/bid/16041
 http://www.vupen.com/english/advisories/2005/3076
 https://exchange.xforce.ibmcloud.com/vulnerabilities/23835
 
 | 
  | linux-libc-dev | CVE-2007-3719 | LOW | 5.10.84-1 |  | Expand...http://osvdb.org/37127http://www.cs.huji.ac.il/~dants/papers/Cheat07Security.pdf
 
 | 
  | linux-libc-dev | CVE-2008-2544 | LOW | 5.10.84-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=213135
 | 
  | linux-libc-dev | CVE-2008-4609 | LOW | 5.10.84-1 |  | Expand...http://blog.robertlee.name/2008/10/conjecture-speculation.htmlhttp://insecure.org/stf/tcp-dos-attack-explained.html
 http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html
 http://marc.info/?l=bugtraq&m=125856010926699&w=2
 http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked
 http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml
 http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html
 http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf
 http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
 http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html
 http://www.outpost24.com/news/news-2008-10-02.html
 http://www.us-cert.gov/cas/techalerts/TA09-251A.html
 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048
 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340
 https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html
 
 | 
  | linux-libc-dev | CVE-2010-4563 | LOW | 5.10.84-1 |  | Expand...http://seclists.org/dailydave/2011/q2/25http://seclists.org/fulldisclosure/2011/Apr/254
 
 | 
  | linux-libc-dev | CVE-2010-5321 | LOW | 5.10.84-1 |  | Expand...http://linuxtv.org/irc/v4l/index.php?date=2010-07-29http://www.openwall.com/lists/oss-security/2015/02/08/4
 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827340
 https://bugzilla.kernel.org/show_bug.cgi?id=120571
 https://bugzilla.redhat.com/show_bug.cgi?id=620629
 
 | 
  | linux-libc-dev | CVE-2011-4915 | LOW | 5.10.84-1 |  | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0499680a42141d86417a8fbaa8c8db806bea1201http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2ef990ab5a6705a356d146dd773a3b359787497
 http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4915.html
 http://www.openwall.com/lists/oss-security/2011/11/07/9
 https://lkml.org/lkml/2011/11/7/340
 https://seclists.org/oss-sec/2011/q4/571
 https://security-tracker.debian.org/tracker/CVE-2011-4915
 https://vigilance.fr/vulnerability/Linux-kernel-information-disclosure-about-keyboard-11131
 
 | 
  | linux-libc-dev | CVE-2011-4917 | LOW | 5.10.84-1 |  | Expand... | 
  | linux-libc-dev | CVE-2012-4542 | LOW | 5.10.84-1 |  | Expand...http://marc.info/?l=linux-kernel&m=135903967015813&w=2http://marc.info/?l=linux-kernel&m=135904012416042&w=2
 http://rhn.redhat.com/errata/RHSA-2013-0496.html
 http://rhn.redhat.com/errata/RHSA-2013-0579.html
 http://rhn.redhat.com/errata/RHSA-2013-0882.html
 http://rhn.redhat.com/errata/RHSA-2013-0928.html
 https://bugzilla.redhat.com/show_bug.cgi?id=875360
 https://linux.oracle.com/cve/CVE-2012-4542.html
 https://linux.oracle.com/errata/ELSA-2013-2534.html
 https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=76a274e17114abf1a77de6b651424648ce9e10c8
 
 | 
  | linux-libc-dev | CVE-2014-9892 | LOW | 5.10.84-1 |  | Expand...http://source.android.com/security/bulletin/2016-08-01.htmlhttp://www.securityfocus.com/bid/92222
 https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=591b1f455c32206704cbcf426bb30911c260c33e
 
 | 
  | linux-libc-dev | CVE-2014-9900 | LOW | 5.10.84-1 |  | Expand...http://source.android.com/security/bulletin/2016-08-01.htmlhttp://www.securityfocus.com/bid/92222
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9900
 https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=63c317dbee97983004dffdd9f742a20d17150071
 https://ubuntu.com/security/notices/USN-3358-1
 https://ubuntu.com/security/notices/USN-3359-1
 https://ubuntu.com/security/notices/USN-3360-1
 https://ubuntu.com/security/notices/USN-3360-2
 https://ubuntu.com/security/notices/USN-3364-1
 https://ubuntu.com/security/notices/USN-3364-2
 https://ubuntu.com/security/notices/USN-3364-3
 https://ubuntu.com/security/notices/USN-3371-1
 
 | 
  | linux-libc-dev | CVE-2015-2877 | LOW | 5.10.84-1 |  | Expand...http://www.antoniobarresi.com/files/cain_advisory.txthttp://www.kb.cert.org/vuls/id/935424
 http://www.securityfocus.com/bid/76256
 https://bugzilla.redhat.com/show_bug.cgi?id=1252096
 https://www.kb.cert.org/vuls/id/BGAR-A2CNKG
 https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH
 https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf
 
 | 
  | linux-libc-dev | CVE-2016-10723 | LOW | 5.10.84-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10723https://lore.kernel.org/lkml/195a512f-aecc-f8cf-f409-6c42ee924a8c@i-love.sakura.ne.jp/
 https://lore.kernel.org/lkml/cb2d635c-c14d-c2cc-868a-d4c447364f0d@i-love.sakura.ne.jp/
 https://patchwork.kernel.org/patch/10395909/
 https://patchwork.kernel.org/patch/9842889/
 https://www.spinics.net/lists/linux-mm/msg117896.html
 
 | 
  | linux-libc-dev | CVE-2016-8660 | LOW | 5.10.84-1 |  | Expand...http://www.openwall.com/lists/oss-security/2016/10/13/8http://www.securityfocus.com/bid/93558
 https://bugzilla.redhat.com/show_bug.cgi?id=1384851
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8660
 https://lore.kernel.org/linux-xfs/895314622.769515.1476375930648.JavaMail.zimbra@redhat.com/
 https://marc.info/?l=linux-fsdevel&m=147639177409294&w=2
 https://marc.info/?l=linux-xfs&m=149498118228320&w=2
 
 | 
  | linux-libc-dev | CVE-2017-0630 | LOW | 5.10.84-1 |  | Expand...http://www.securityfocus.com/bid/98213https://source.android.com/security/bulletin/2017-05-01
 https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-trace-subsystem
 
 | 
  | linux-libc-dev | CVE-2017-13693 | LOW | 5.10.84-1 |  | Expand...http://www.securityfocus.com/bid/100502https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693
 https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
 https://patchwork.kernel.org/patch/9919053/
 
 | 
  | linux-libc-dev | CVE-2017-13694 | LOW | 5.10.84-1 |  | Expand...http://www.securityfocus.com/bid/100500https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0
 https://patchwork.kernel.org/patch/9806085/
 
 | 
  | linux-libc-dev | CVE-2018-1121 | LOW | 5.10.84-1 |  | Expand...http://seclists.org/oss-sec/2018/q2/122http://www.securityfocus.com/bid/104214
 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121
 https://www.exploit-db.com/exploits/44806/
 https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
 
 | 
  | linux-libc-dev | CVE-2018-12928 | LOW | 5.10.84-1 |  | Expand...http://www.securityfocus.com/bid/104593https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928
 https://groups.google.com/forum/#!msg/syzkaller-bugs/9SgQk_6tSZ4/zLhTm4r1AwAJ
 https://lore.kernel.org/linux-fsdevel/20180418173028.GA30953@bombadil.infradead.org/
 https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2
 
 | 
  | linux-libc-dev | CVE-2018-17977 | LOW | 5.10.84-1 |  | Expand...http://www.securityfocus.com/bid/105539https://bugzilla.suse.com/show_bug.cgi?id=1111609
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977
 https://www.openwall.com/lists/oss-security/2018/10/05/5
 
 | 
  | linux-libc-dev | CVE-2019-11191 | LOW | 5.10.84-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.htmlhttp://www.openwall.com/lists/oss-security/2019/04/18/5
 http://www.openwall.com/lists/oss-security/2019/05/22/7
 http://www.securityfocus.com/bid/107887
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11191
 https://ubuntu.com/security/notices/USN-4006-1
 https://ubuntu.com/security/notices/USN-4006-2
 https://ubuntu.com/security/notices/USN-4007-1
 https://ubuntu.com/security/notices/USN-4007-2
 https://ubuntu.com/security/notices/USN-4008-1
 https://ubuntu.com/security/notices/USN-4008-3
 https://usn.ubuntu.com/4006-1/
 https://usn.ubuntu.com/4006-2/
 https://usn.ubuntu.com/4007-1/
 https://usn.ubuntu.com/4007-2/
 https://usn.ubuntu.com/4008-1/
 https://usn.ubuntu.com/4008-3/
 https://www.openwall.com/lists/oss-security/2019/04/03/4
 https://www.openwall.com/lists/oss-security/2019/04/03/4/1
 
 | 
  | linux-libc-dev | CVE-2019-12378 | LOW | 5.10.84-1 |  | Expand...http://www.securityfocus.com/bid/108475https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=95baa60a0da80a0143e3ddd4d3725758b4513825
 https://linux.oracle.com/cve/CVE-2019-12378.html
 https://linux.oracle.com/errata/ELSA-2019-4746.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
 https://lkml.org/lkml/2019/5/25/229
 
 | 
  | linux-libc-dev | CVE-2019-12379 | LOW | 5.10.84-1 |  | Expand...http://www.securityfocus.com/bid/108478https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-next&id=84ecc2f6eb1cb12e6d44818f94fa49b50f06e6ac
 https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-testing&id=15b3cd8ef46ad1b100e0d3c7e38774f330726820
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
 https://security.netapp.com/advisory/ntap-20190710-0002/
 
 | 
  | linux-libc-dev | CVE-2019-12380 | LOW | 5.10.84-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
 http://www.securityfocus.com/bid/108477
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380
 https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e
 https://linux.oracle.com/cve/CVE-2019-12380.html
 https://linux.oracle.com/errata/ELSA-2020-5913.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
 https://security.netapp.com/advisory/ntap-20190710-0002/
 https://ubuntu.com/security/notices/USN-4414-1
 https://ubuntu.com/security/notices/USN-4427-1
 https://ubuntu.com/security/notices/USN-4439-1
 https://usn.ubuntu.com/4414-1/
 https://usn.ubuntu.com/4427-1/
 https://usn.ubuntu.com/4439-1/
 
 | 
  | linux-libc-dev | CVE-2019-12381 | LOW | 5.10.84-1 |  | Expand...http://www.securityfocus.com/bid/108473https://bugzilla.redhat.com/show_bug.cgi?id=1715501
 https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=425aa0e1d01513437668fa3d4a971168bbaa8515
 https://linux.oracle.com/cve/CVE-2019-12381.html
 https://linux.oracle.com/errata/ELSA-2019-4746.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
 https://lkml.org/lkml/2019/5/25/230
 
 | 
  | linux-libc-dev | CVE-2019-12382 | LOW | 5.10.84-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
 http://www.securityfocus.com/bid/108474
 https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f
 https://linux.oracle.com/cve/CVE-2019-12382.html
 https://linux.oracle.com/errata/ELSA-2020-1016.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
 https://lkml.org/lkml/2019/5/24/843
 https://lore.kernel.org/lkml/87o93u7d3s.fsf@intel.com/
 https://salsa.debian.org/kernel-team/kernel-sec/blob/master/retired/CVE-2019-12382
 
 | 
  | linux-libc-dev | CVE-2019-12455 | LOW | 5.10.84-1 |  | Expand...https://git.kernel.org/pub/scm/linux/kernel/git/sunxi/linux.git/commit/?h=sunxi/clk-for-5.3&id=fcdf445ff42f036d22178b49cf64e92d527c1330https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
 https://security.netapp.com/advisory/ntap-20190710-0002/
 https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2010240.html
 
 | 
  | linux-libc-dev | CVE-2019-12456 | LOW | 5.10.84-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
 https://bugzilla.redhat.com/show_bug.cgi?id=1717182
 https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=5.3/scsi-queue&id=86e5aca7fa2927060839f3e3b40c8bd65a7e8d1e
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/
 https://lkml.org/lkml/2019/5/29/1164
 https://support.f5.com/csp/article/K84310302
 https://support.f5.com/csp/article/K84310302?utm_source=f5support&utm_medium=RSS
 
 | 
  | linux-libc-dev | CVE-2019-16229 | LOW | 5.10.84-1 |  | Expand...https://bugzilla.suse.com/show_bug.cgi?id=1150469#c3https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229
 https://lkml.org/lkml/2019/9/9/487
 https://security.netapp.com/advisory/ntap-20191004-0001/
 https://ubuntu.com/security/notices/USN-4284-1
 https://ubuntu.com/security/notices/USN-4285-1
 https://ubuntu.com/security/notices/USN-4287-1
 https://ubuntu.com/security/notices/USN-4287-2
 https://usn.ubuntu.com/4284-1/
 https://usn.ubuntu.com/4285-1/
 https://usn.ubuntu.com/4287-1/
 https://usn.ubuntu.com/4287-2/
 
 | 
  | linux-libc-dev | CVE-2019-16230 | LOW | 5.10.84-1 |  | Expand...https://bugzilla.suse.com/show_bug.cgi?id=1150468https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230
 https://lkml.org/lkml/2019/9/9/487
 https://security.netapp.com/advisory/ntap-20191004-0001/
 
 | 
  | linux-libc-dev | CVE-2019-16231 | LOW | 5.10.84-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231
 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=85ac30fa2e24f628e9f4f9344460f4015d33fd7d
 https://linux.oracle.com/cve/CVE-2019-16231.html
 https://linux.oracle.com/errata/ELSA-2020-5533.html
 https://lkml.org/lkml/2019/9/9/487
 https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
 https://security.netapp.com/advisory/ntap-20191004-0001/
 https://ubuntu.com/security/notices/USN-4225-1
 https://ubuntu.com/security/notices/USN-4225-2
 https://ubuntu.com/security/notices/USN-4226-1
 https://ubuntu.com/security/notices/USN-4227-1
 https://ubuntu.com/security/notices/USN-4227-2
 https://ubuntu.com/security/notices/USN-4904-1
 https://usn.ubuntu.com/4225-1/
 https://usn.ubuntu.com/4225-2/
 https://usn.ubuntu.com/4226-1/
 https://usn.ubuntu.com/4227-1/
 https://usn.ubuntu.com/4227-2/
 
 | 
  | linux-libc-dev | CVE-2019-16232 | LOW | 5.10.84-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16232
 https://linux.oracle.com/cve/CVE-2019-16232.html
 https://linux.oracle.com/errata/ELSA-2020-5804.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
 https://lkml.org/lkml/2019/9/9/487
 https://security.netapp.com/advisory/ntap-20191004-0001/
 https://ubuntu.com/security/notices/USN-4284-1
 https://ubuntu.com/security/notices/USN-4285-1
 https://ubuntu.com/security/notices/USN-4287-1
 https://ubuntu.com/security/notices/USN-4287-2
 https://ubuntu.com/security/notices/USN-4904-1
 https://usn.ubuntu.com/4284-1/
 https://usn.ubuntu.com/4285-1/
 https://usn.ubuntu.com/4287-1/
 https://usn.ubuntu.com/4287-2/
 
 | 
  | linux-libc-dev | CVE-2019-16233 | LOW | 5.10.84-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233
 https://linux.oracle.com/cve/CVE-2019-16233.html
 https://linux.oracle.com/errata/ELSA-2020-5508.html
 https://lkml.org/lkml/2019/9/9/487
 https://security.netapp.com/advisory/ntap-20191004-0001/
 https://ubuntu.com/security/notices/USN-4226-1
 https://ubuntu.com/security/notices/USN-4227-1
 https://ubuntu.com/security/notices/USN-4227-2
 https://ubuntu.com/security/notices/USN-4346-1
 https://usn.ubuntu.com/4226-1/
 https://usn.ubuntu.com/4227-1/
 https://usn.ubuntu.com/4227-2/
 https://usn.ubuntu.com/4346-1/
 
 | 
  | linux-libc-dev | CVE-2019-16234 | LOW | 5.10.84-1 |  | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234
 https://linux.oracle.com/cve/CVE-2019-16234.html
 https://linux.oracle.com/errata/ELSA-2020-5804.html
 https://lkml.org/lkml/2019/9/9/487
 https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
 https://security.netapp.com/advisory/ntap-20191004-0001/
 https://ubuntu.com/security/notices/USN-4342-1
 https://ubuntu.com/security/notices/USN-4344-1
 https://ubuntu.com/security/notices/USN-4345-1
 https://ubuntu.com/security/notices/USN-4346-1
 https://usn.ubuntu.com/4342-1/
 https://usn.ubuntu.com/4344-1/
 https://usn.ubuntu.com/4345-1/
 https://usn.ubuntu.com/4346-1/
 
 | 
  | linux-libc-dev | CVE-2019-19070 | LOW | 5.10.84-1 |  | Expand...https://bugzilla.suse.com/show_bug.cgi?id=1157294https://github.com/torvalds/linux/commit/d3b0ffa1d75d5305ebe34735598993afbb8a869d
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
 
 | 
  | linux-libc-dev | CVE-2020-11725 | LOW | 5.10.84-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11725https://github.com/torvalds/linux/blob/3b2549a3740efb8af0150415737067d87e466c5b/sound/core/control.c#L1434-L1474
 https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai@suse.de/
 https://twitter.com/yabbadabbadrew/status/1248632267028582400
 
 | 
  | linux-libc-dev | CVE-2020-35501 | LOW | 5.10.84-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html
 https://www.openwall.com/lists/oss-security/2021/02/18/1
 
 | 
  | linux-libc-dev | CVE-2021-26934 | LOW | 5.10.84-1 |  | Expand...http://xenbits.xen.org/xsa/advisory-363.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GELN5E6MDR5KQBJF5M5COUUED3YFZTD/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOAJBVAVR6RSCUCHNXPVSNRPSFM7INMP/
 https://security.netapp.com/advisory/ntap-20210326-0001/
 https://www.openwall.com/lists/oss-security/2021/02/16/2
 https://xenbits.xen.org/xsa/advisory-363.html
 
 | 
  | linux-libc-dev | CVE-2021-32078 | LOW | 5.10.84-1 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f
 https://git.kernel.org/linus/298a58e165e447ccfaae35fe9f651f9d7e15166f (5.13-rc1)
 https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f
 https://kirtikumarar.com/CVE-2021-32078.txt
 https://security.netapp.com/advisory/ntap-20210813-0002/
 
 | 
  | linux-libc-dev | CVE-2021-4135 | LOW | 5.10.84-1 | 5.10.92-1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135https://git.kernel.org/linus/481221775d53d6215a6e5e9ce1cce6d2b4ab9a46 (5.16-rc6)
 https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=481221775d53
 https://ubuntu.com/security/notices/USN-5278-1
 https://ubuntu.com/security/notices/USN-5337-1
 https://ubuntu.com/security/notices/USN-5338-1
 
 | 
  | linux-libc-dev | CVE-2022-0998 | LOW | 5.10.84-1 | 5.10.92-1 | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-0998https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0998
 https://git.kernel.org/linus/870aaff92e959e29d40f9cfdb5ed06ba2fc2dae0 (5.17-rc1)
 https://lore.kernel.org/netdev/20220123001216.2460383-13-sashal@kernel.org/
 
 | 
  | linux-libc-dev | CVE-2022-24448 | LOW | 5.10.84-1 | 5.10.92-2 | Expand...https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf
 https://github.com/torvalds/linux/commit/ac795161c93699d600db16c1a8cc23a65a1eceaf
 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
 https://ubuntu.com/security/notices/USN-5302-1
 https://www.debian.org/security/2022/dsa-5092
 https://www.debian.org/security/2022/dsa-5096
 https://www.spinics.net/lists/stable/msg531976.html
 
 | 
  | linux-libc-dev | CVE-2022-25265 | LOW | 5.10.84-1 |  | Expand...https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294https://github.com/x0reaxeax/exec-prot-bypass
 https://security.netapp.com/advisory/ntap-20220318-0005/
 
 | 
  | login | CVE-2007-5686 | LOW | 1:4.8.1-1 |  | Expand...http://secunia.com/advisories/27215http://www.securityfocus.com/archive/1/482129/100/100/threaded
 http://www.securityfocus.com/archive/1/482857/100/0/threaded
 http://www.securityfocus.com/bid/26048
 http://www.vupen.com/english/advisories/2007/3474
 https://issues.rpath.com/browse/RPL-1825
 
 | 
  | login | CVE-2013-4235 | LOW | 1:4.8.1-1 |  | Expand...https://access.redhat.com/security/cve/cve-2013-4235https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://security-tracker.debian.org/tracker/CVE-2013-4235
 
 | 
  | login | CVE-2019-19882 | LOW | 1:4.8.1-1 |  | Expand...https://bugs.archlinux.org/task/64836https://bugs.gentoo.org/702252
 https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
 https://github.com/shadow-maint/shadow/pull/199
 https://github.com/void-linux/void-packages/pull/17580
 https://security.gentoo.org/glsa/202008-09
 
 | 
  | m4 | CVE-2008-1687 | LOW | 1.4.18-5 |  | Expand...http://secunia.com/advisories/29671http://secunia.com/advisories/29729
 http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.510612
 http://www.openwall.com/lists/oss-security/2008/04/07/1
 http://www.openwall.com/lists/oss-security/2008/04/07/12
 http://www.openwall.com/lists/oss-security/2008/04/07/3
 http://www.openwall.com/lists/oss-security/2008/04/07/4
 http://www.securityfocus.com/bid/28688
 http://www.vupen.com/english/advisories/2008/1151/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/41706
 
 | 
  | m4 | CVE-2008-1688 | LOW | 1.4.18-5 |  | Expand...http://osvdb.org/44272http://secunia.com/advisories/29671
 http://secunia.com/advisories/29729
 http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.510612
 http://www.openwall.com/lists/oss-security/2008/04/07/1
 http://www.openwall.com/lists/oss-security/2008/04/07/3
 http://www.securityfocus.com/bid/28688
 http://www.vupen.com/english/advisories/2008/1151/references
 https://exchange.xforce.ibmcloud.com/vulnerabilities/41704
 
 | 
  | mount | CVE-2021-3995 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
 https://ubuntu.com/security/notices/USN-5279-1
 https://www.openwall.com/lists/oss-security/2022/01/24/2
 
 | 
  | mount | CVE-2021-3996 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
 https://ubuntu.com/security/notices/USN-5279-1
 https://www.openwall.com/lists/oss-security/2022/01/24/2
 
 | 
  | mount | CVE-2022-0563 | LOW | 2.36.1-8 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | ncurses-base | CVE-2021-39537 | LOW | 6.2+20201114-2 |  | Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markuphttps://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
 https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
 
 | 
  | ncurses-bin | CVE-2021-39537 | LOW | 6.2+20201114-2 |  | Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markuphttps://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
 https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
 
 | 
  | openssl | CVE-2022-0778 | HIGH | 1.1.1k-1+deb11u1 | 1.1.1k-1+deb11u2 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
 https://linux.oracle.com/cve/CVE-2022-0778.html
 https://linux.oracle.com/errata/ELSA-2022-9246.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
 https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
 https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
 https://security.netapp.com/advisory/ntap-20220321-0002/
 https://ubuntu.com/security/notices/USN-5328-1
 https://ubuntu.com/security/notices/USN-5328-2
 https://www.debian.org/security/2022/dsa-5103
 https://www.openssl.org/news/secadv/20220315.txt
 
 | 
  | openssl | CVE-2021-4160 | MEDIUM | 1.1.1k-1+deb11u1 | 1.1.1k-1+deb11u2 | Expand...https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37fhttps://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
 https://www.debian.org/security/2022/dsa-5103
 https://www.openssl.org/news/secadv/20220128.txt
 
 | 
  | openssl | CVE-2007-6755 | LOW | 1.1.1k-1+deb11u1 |  | Expand...http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html
 http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html
 http://rump2007.cr.yp.to/15-shumow.pdf
 http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/
 http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect
 http://www.securityfocus.com/bid/63657
 https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
 
 | 
  | openssl | CVE-2010-0928 | LOW | 1.1.1k-1+deb11u1 |  | Expand...http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf
 http://www.networkworld.com/news/2010/030410-rsa-security-attack.html
 http://www.osvdb.org/62808
 http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/
 https://exchange.xforce.ibmcloud.com/vulnerabilities/56750
 
 | 
  | passwd | CVE-2007-5686 | LOW | 1:4.8.1-1 |  | Expand...http://secunia.com/advisories/27215http://www.securityfocus.com/archive/1/482129/100/100/threaded
 http://www.securityfocus.com/archive/1/482857/100/0/threaded
 http://www.securityfocus.com/bid/26048
 http://www.vupen.com/english/advisories/2007/3474
 https://issues.rpath.com/browse/RPL-1825
 
 | 
  | passwd | CVE-2013-4235 | LOW | 1:4.8.1-1 |  | Expand...https://access.redhat.com/security/cve/cve-2013-4235https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://security-tracker.debian.org/tracker/CVE-2013-4235
 
 | 
  | passwd | CVE-2019-19882 | LOW | 1:4.8.1-1 |  | Expand...https://bugs.archlinux.org/task/64836https://bugs.gentoo.org/702252
 https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
 https://github.com/shadow-maint/shadow/pull/199
 https://github.com/void-linux/void-packages/pull/17580
 https://security.gentoo.org/glsa/202008-09
 
 | 
  | patch | CVE-2010-4651 | LOW | 2.7.6-7 |  | Expand...http://git.savannah.gnu.org/cgit/patch.git/commit/?id=685a78b6052f4df6eac6d625a545cfb54a6ac0e1http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
 http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055241.html
 http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055246.html
 http://lists.gnu.org/archive/html/bug-patch/2010-12/msg00000.html
 http://openwall.com/lists/oss-security/2011/01/05/10
 http://openwall.com/lists/oss-security/2011/01/06/19
 http://openwall.com/lists/oss-security/2011/01/06/20
 http://openwall.com/lists/oss-security/2011/01/06/21
 http://secunia.com/advisories/43663
 http://secunia.com/advisories/43677
 http://support.apple.com/kb/HT4723
 http://www.securityfocus.com/bid/46768
 http://www.vupen.com/english/advisories/2011/0600
 https://bugzilla.redhat.com/show_bug.cgi?id=667529
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4651
 https://ubuntu.com/security/notices/USN-2651-1
 
 | 
  | patch | CVE-2018-6951 | LOW | 2.7.6-7 |  | Expand...http://www.securityfocus.com/bid/103044https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6951
 https://git.savannah.gnu.org/cgit/patch.git/commit/?id=f290f48a621867084884bfff87f8093c15195e6a
 https://savannah.gnu.org/bugs/index.php?53132
 https://security.gentoo.org/glsa/201904-17
 https://ubuntu.com/security/notices/USN-3624-1
 https://usn.ubuntu.com/3624-1/
 
 | 
  | patch | CVE-2018-6952 | LOW | 2.7.6-7 |  | Expand...http://www.securityfocus.com/bid/103047https://access.redhat.com/errata/RHSA-2019:2033
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952
 https://linux.oracle.com/cve/CVE-2018-6952.html
 https://linux.oracle.com/errata/ELSA-2019-2033.html
 https://savannah.gnu.org/bugs/index.php?53133
 https://security.gentoo.org/glsa/201904-17
 
 | 
  | patch | CVE-2021-45261 | LOW | 2.7.6-7 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45261https://savannah.gnu.org/bugs/?61685
 
 | 
  | perl | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 |  | Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.htmlhttps://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
 https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
 https://metacpan.org/pod/distribution/CPAN/scripts/cpan
 
 | 
  | perl | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 |  | Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2http://www.openwall.com/lists/oss-security/2011/11/04/4
 https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
 https://rt.cpan.org/Public/Bug/Display.html?id=69106
 https://seclists.org/oss-sec/2011/q4/238
 
 | 
  | perl-base | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 |  | Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.htmlhttps://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
 https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
 https://metacpan.org/pod/distribution/CPAN/scripts/cpan
 
 | 
  | perl-base | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 |  | Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2http://www.openwall.com/lists/oss-security/2011/11/04/4
 https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
 https://rt.cpan.org/Public/Bug/Display.html?id=69106
 https://seclists.org/oss-sec/2011/q4/238
 
 | 
  | perl-modules-5.32 | CVE-2020-16156 | HIGH | 5.32.1-4+deb11u2 |  | Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.htmlhttps://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
 https://github.com/andk/cpanpm/commit/b27c51adf0fda25dee84cb72cb2b1bf7d832148c
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
 https://metacpan.org/pod/distribution/CPAN/scripts/cpan
 
 | 
  | perl-modules-5.32 | CVE-2011-4116 | LOW | 5.32.1-4+deb11u2 |  | Expand...http://www.openwall.com/lists/oss-security/2011/11/04/2http://www.openwall.com/lists/oss-security/2011/11/04/4
 https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
 https://rt.cpan.org/Public/Bug/Display.html?id=69106
 https://seclists.org/oss-sec/2011/q4/238
 
 | 
  | python3.9 | CVE-2021-29921 | CRITICAL | 3.9.2-1 |  | Expand...https://bugs.python.org/issue36384https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
 https://docs.python.org/3/library/ipaddress.html
 https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
 https://github.com/python/cpython/pull/12577
 https://github.com/python/cpython/pull/25099
 https://github.com/sickcodes
 https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
 https://linux.oracle.com/cve/CVE-2021-29921.html
 https://linux.oracle.com/errata/ELSA-2021-4162.html
 https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
 https://security.netapp.com/advisory/ntap-20210622-0003/
 https://sick.codes/sick-2021-014
 https://ubuntu.com/security/notices/USN-4973-1
 https://ubuntu.com/security/notices/USN-4973-2
 https://www.oracle.com//security-alerts/cpujul2021.html
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | python3.9 | CVE-2021-3737 | HIGH | 3.9.2-1 |  | Expand...https://bugs.python.org/issue44022https://bugzilla.redhat.com/show_bug.cgi?id=1995162
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
 https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
 https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
 https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
 https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
 https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
 https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
 https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
 https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
 https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
 https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
 https://github.com/python/cpython/pull/25916
 https://github.com/python/cpython/pull/26503
 https://linux.oracle.com/cve/CVE-2021-3737.html
 https://linux.oracle.com/errata/ELSA-2021-4160.html
 https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
 https://ubuntu.com/security/CVE-2021-3737
 https://ubuntu.com/security/notices/USN-5083-1
 https://ubuntu.com/security/notices/USN-5199-1
 https://ubuntu.com/security/notices/USN-5200-1
 https://ubuntu.com/security/notices/USN-5201-1
 
 | 
  | python3.9 | CVE-2022-0391 | HIGH | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43882https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
 https://security.netapp.com/advisory/ntap-20220225-0009/
 
 | 
  | python3.9 | CVE-2021-3426 | MEDIUM | 3.9.2-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1935913https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
 https://github.com/python/cpython/pull/24285
 https://github.com/python/cpython/pull/24337
 https://linux.oracle.com/cve/CVE-2021-3426.html
 https://linux.oracle.com/errata/ELSA-2021-9562.html
 https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
 https://python-security.readthedocs.io/vuln/pydoc-getfile.html
 https://security.gentoo.org/glsa/202104-04
 https://security.netapp.com/advisory/ntap-20210629-0003/
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | python3.9 | CVE-2021-3733 | MEDIUM | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43075https://bugzilla.redhat.com/show_bug.cgi?id=1995234
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
 https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
 https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
 https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
 https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
 https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
 https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
 https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
 https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
 https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
 https://github.com/python/cpython/pull/24391
 https://linux.oracle.com/cve/CVE-2021-3733.html
 https://linux.oracle.com/errata/ELSA-2021-4160.html
 https://ubuntu.com/security/CVE-2021-3733
 https://ubuntu.com/security/notices/USN-5083-1
 https://ubuntu.com/security/notices/USN-5199-1
 https://ubuntu.com/security/notices/USN-5200-1
 
 | 
  | python3.9 | CVE-2021-4189 | MEDIUM | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43285https://bugzilla.redhat.com/show_bug.cgi?id=2036020
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
 https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
 https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
 https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
 https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
 
 | 
  | python3.9 | CVE-2020-27619 | LOW | 3.9.2-1 |  | Expand...https://bugs.python.org/issue41944https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
 https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
 https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
 https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
 https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
 https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
 https://linux.oracle.com/cve/CVE-2020-27619.html
 https://linux.oracle.com/errata/ELSA-2021-4151.html
 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
 https://security.netapp.com/advisory/ntap-20201123-0004/
 https://ubuntu.com/security/notices/USN-4754-1
 https://ubuntu.com/security/notices/USN-4754-3
 
 | 
  | python3.9-minimal | CVE-2021-29921 | CRITICAL | 3.9.2-1 |  | Expand...https://bugs.python.org/issue36384https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29921
 https://docs.python.org/3/library/ipaddress.html
 https://github.com/python/cpython/blob/63298930fb531ba2bb4f23bc3b915dbf1e17e9e1/Misc/NEWS.d/3.8.0a4.rst
 https://github.com/python/cpython/pull/12577
 https://github.com/python/cpython/pull/25099
 https://github.com/sickcodes
 https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-014.md
 https://linux.oracle.com/cve/CVE-2021-29921.html
 https://linux.oracle.com/errata/ELSA-2021-4162.html
 https://python-security.readthedocs.io/vuln/ipaddress-ipv4-leading-zeros.html
 https://security.netapp.com/advisory/ntap-20210622-0003/
 https://sick.codes/sick-2021-014
 https://ubuntu.com/security/notices/USN-4973-1
 https://ubuntu.com/security/notices/USN-4973-2
 https://www.oracle.com//security-alerts/cpujul2021.html
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | python3.9-minimal | CVE-2021-3737 | HIGH | 3.9.2-1 |  | Expand...https://bugs.python.org/issue44022https://bugzilla.redhat.com/show_bug.cgi?id=1995162
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
 https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
 https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
 https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
 https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
 https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
 https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
 https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
 https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
 https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
 https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
 https://github.com/python/cpython/pull/25916
 https://github.com/python/cpython/pull/26503
 https://linux.oracle.com/cve/CVE-2021-3737.html
 https://linux.oracle.com/errata/ELSA-2021-4160.html
 https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
 https://ubuntu.com/security/CVE-2021-3737
 https://ubuntu.com/security/notices/USN-5083-1
 https://ubuntu.com/security/notices/USN-5199-1
 https://ubuntu.com/security/notices/USN-5200-1
 https://ubuntu.com/security/notices/USN-5201-1
 
 | 
  | python3.9-minimal | CVE-2022-0391 | HIGH | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43882https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
 https://security.netapp.com/advisory/ntap-20220225-0009/
 
 | 
  | python3.9-minimal | CVE-2021-3426 | MEDIUM | 3.9.2-1 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=1935913https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426
 https://github.com/python/cpython/pull/24285
 https://github.com/python/cpython/pull/24337
 https://linux.oracle.com/cve/CVE-2021-3426.html
 https://linux.oracle.com/errata/ELSA-2021-9562.html
 https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
 https://python-security.readthedocs.io/vuln/pydoc-getfile.html
 https://security.gentoo.org/glsa/202104-04
 https://security.netapp.com/advisory/ntap-20210629-0003/
 https://www.oracle.com/security-alerts/cpujan2022.html
 https://www.oracle.com/security-alerts/cpuoct2021.html
 
 | 
  | python3.9-minimal | CVE-2021-3733 | MEDIUM | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43075https://bugzilla.redhat.com/show_bug.cgi?id=1995234
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
 https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
 https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
 https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
 https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
 https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
 https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
 https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
 https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
 https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
 https://github.com/python/cpython/pull/24391
 https://linux.oracle.com/cve/CVE-2021-3733.html
 https://linux.oracle.com/errata/ELSA-2021-4160.html
 https://ubuntu.com/security/CVE-2021-3733
 https://ubuntu.com/security/notices/USN-5083-1
 https://ubuntu.com/security/notices/USN-5199-1
 https://ubuntu.com/security/notices/USN-5200-1
 
 | 
  | python3.9-minimal | CVE-2021-4189 | MEDIUM | 3.9.2-1 |  | Expand...https://bugs.python.org/issue43285https://bugzilla.redhat.com/show_bug.cgi?id=2036020
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
 https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
 https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
 https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
 https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
 
 | 
  | python3.9-minimal | CVE-2020-27619 | LOW | 3.9.2-1 |  | Expand...https://bugs.python.org/issue41944https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
 https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
 https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
 https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
 https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
 https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
 https://linux.oracle.com/cve/CVE-2020-27619.html
 https://linux.oracle.com/errata/ELSA-2021-4151.html
 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
 https://security.netapp.com/advisory/ntap-20201123-0004/
 https://ubuntu.com/security/notices/USN-4754-1
 https://ubuntu.com/security/notices/USN-4754-3
 
 | 
  | re2c | CVE-2018-21232 | LOW | 2.0.3-1 |  | Expand...http://www.openwall.com/lists/oss-security/2020/05/14/4https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21232
 https://github.com/skvadrik/re2c/issues/219
 https://www.openwall.com/lists/oss-security/2020/04/27/2
 
 | 
  | tar | CVE-2005-2541 | LOW | 1.34+dfsg-1 |  | Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
 
 | 
  | unzip | CVE-2022-0529 | HIGH | 6.0-26 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2051395https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0529
 https://github.com/ByteHackr/unzip_poc
 
 | 
  | unzip | CVE-2022-0530 | HIGH | 6.0-26 |  | Expand...https://bugzilla.redhat.com/show_bug.cgi?id=2051395https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0530
 https://github.com/ByteHackr/unzip_poc
 
 | 
  | unzip | CVE-2021-4217 | LOW | 6.0-26 |  | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4217
 | 
  | util-linux | CVE-2021-3995 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
 https://ubuntu.com/security/notices/USN-5279-1
 https://www.openwall.com/lists/oss-security/2022/01/24/2
 
 | 
  | util-linux | CVE-2021-3996 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
 https://ubuntu.com/security/notices/USN-5279-1
 https://www.openwall.com/lists/oss-security/2022/01/24/2
 
 | 
  | util-linux | CVE-2022-0563 | LOW | 2.36.1-8 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | uuid-dev | CVE-2021-3995 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
 https://ubuntu.com/security/notices/USN-5279-1
 https://www.openwall.com/lists/oss-security/2022/01/24/2
 
 | 
  | uuid-dev | CVE-2021-3996 | MEDIUM | 2.36.1-8 | 2.36.1-8+deb11u1 | Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
 https://ubuntu.com/security/notices/USN-5279-1
 https://www.openwall.com/lists/oss-security/2022/01/24/2
 
 | 
  | uuid-dev | CVE-2022-0563 | LOW | 2.36.1-8 |  | Expand...https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
 | 
  | zip | CVE-2018-13410 | LOW | 3.0-12 |  | Expand...http://seclists.org/fulldisclosure/2018/Jul/24
 | 
  | zlib1g | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-2 |  | Expand...http://www.openwall.com/lists/oss-security/2022/03/25/2http://www.openwall.com/lists/oss-security/2022/03/26/1
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
 https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
 https://www.openwall.com/lists/oss-security/2022/03/24/1
 
 | 
  | zlib1g-dev | CVE-2018-25032 | MEDIUM | 1:1.2.11.dfsg-2 |  | Expand...http://www.openwall.com/lists/oss-security/2022/03/25/2http://www.openwall.com/lists/oss-security/2022/03/26/1
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
 https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
 https://www.openwall.com/lists/oss-security/2022/03/24/1
 
 |