Tom Gates created GUACAMOLE-1368:
------------------------------------
Summary: Latest docker image fails security scans.
Key: GUACAMOLE-1368
URL: https://issues.apache.org/jira/browse/GUACAMOLE-1368
Project: Guacamole
Issue Type: Bug
Components: guacamole
Affects Versions: 1.3.0
Environment: Docker
Reporter: Tom Gates
```
tgates@MacBook-Pro ~
% git pull guacamole/guacamole:1.3.0 !10100
fatal: not a git repository (or any of the parent directories): .git
tgates@MacBook-Pro ~
% docker pull guacamole/guacamole:1.3.0 !10101
1.3.0: Pulling from guacamole/guacamole
Digest: sha256:739cb6820ae884827ceaaa87b45b8802769649c848d737584aea79d999177dc3
Status: Downloaded newer image for guacamole/guacamole:1.3.0
docker.io/guacamole/guacamole:1.3.0
tgates@MacBook-Pro ~
% docker scan guacamole/guacamole:1.3.0 !10102
Testing guacamole/guacamole:1.3.0...
✗ Low severity vulnerability found in tar
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN10-TAR-1063001
Introduced through: meta-common-packages@meta
From: meta-common-packages@meta > [email protected]+dfsg-6
✗ Low severity vulnerability found in tar
Description: CVE-2005-2541
Info: https://snyk.io/vuln/SNYK-DEBIAN10-TAR-312331
Introduced through: meta-common-packages@meta
From: meta-common-packages@meta > [email protected]+dfsg-6
✗ Low severity vulnerability found in tar
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN10-TAR-341203
Introduced through: meta-common-packages@meta
From: meta-common-packages@meta > [email protected]+dfsg-6
✗ Low severity vulnerability found in systemd/libsystemd0
Description: Authentication Bypass
Info: https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-1291056
Introduced through: util-linux/bsdutils@1:2.33.1-0.1, [email protected],
util-linux/[email protected], procps@2:3.3.15-2, systemd/libudev1@241-7~deb10u5
From: util-linux/bsdutils@1:2.33.1-0.1 > systemd/libsystemd0@241-7~deb10u5
From: [email protected] > apt/[email protected] >
systemd/libsystemd0@241-7~deb10u5
From: util-linux/[email protected] > [email protected] >
systemd/libsystemd0@241-7~deb10u5
and 4 more...
✗ Low severity vulnerability found in systemd/libsystemd0
Description: Link Following
Info: https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-305144
Introduced through: util-linux/bsdutils@1:2.33.1-0.1, [email protected],
util-linux/[email protected], procps@2:3.3.15-2, systemd/libudev1@241-7~deb10u5
From: util-linux/bsdutils@1:2.33.1-0.1 > systemd/libsystemd0@241-7~deb10u5
From: [email protected] > apt/[email protected] >
systemd/libsystemd0@241-7~deb10u5
From: util-linux/[email protected] > [email protected] >
systemd/libsystemd0@241-7~deb10u5
and 4 more...
✗ Low severity vulnerability found in systemd/libsystemd0
Description: Missing Release of Resource after Effective Lifetime
Info: https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-542807
Introduced through: util-linux/bsdutils@1:2.33.1-0.1, [email protected],
util-linux/[email protected], procps@2:3.3.15-2, systemd/libudev1@241-7~deb10u5
From: util-linux/bsdutils@1:2.33.1-0.1 > systemd/libsystemd0@241-7~deb10u5
From: [email protected] > apt/[email protected] >
systemd/libsystemd0@241-7~deb10u5
From: util-linux/[email protected] > [email protected] >
systemd/libsystemd0@241-7~deb10u5
and 4 more...
✗ Low severity vulnerability found in systemd/libsystemd0
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-570991
Introduced through: util-linux/bsdutils@1:2.33.1-0.1, [email protected],
util-linux/[email protected], procps@2:3.3.15-2, systemd/libudev1@241-7~deb10u5
From: util-linux/bsdutils@1:2.33.1-0.1 > systemd/libsystemd0@241-7~deb10u5
From: [email protected] > apt/[email protected] >
systemd/libsystemd0@241-7~deb10u5
From: util-linux/[email protected] > [email protected] >
systemd/libsystemd0@241-7~deb10u5
and 4 more...
✗ Low severity vulnerability found in sqlite3/libsqlite3-0
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN10-SQLITE3-535712
Introduced through: gnupg2/[email protected]+deb10u1,
[email protected]+deb10u1, [email protected]+deb10u1
From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
sqlite3/[email protected]+deb10u1
From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 >
sqlite3/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1 >
sqlite3/[email protected]+deb10u1
✗ Low severity vulnerability found in sqlite3/libsqlite3-0
Description: Use After Free
Info: https://snyk.io/vuln/SNYK-DEBIAN10-SQLITE3-565214
Introduced through: gnupg2/[email protected]+deb10u1,
[email protected]+deb10u1, [email protected]+deb10u1
From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
sqlite3/[email protected]+deb10u1
From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 >
sqlite3/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1 >
sqlite3/[email protected]+deb10u1
✗ Low severity vulnerability found in shadow/passwd
Description: Time-of-check Time-of-use (TOCTOU)
Info: https://snyk.io/vuln/SNYK-DEBIAN10-SHADOW-306205
Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2,
gnupg2/[email protected]+deb10u1, shadow/login@1:4.5-1.1,
util-linux/[email protected]
From: openssh/openssh-client@1:7.9p1-10+deb10u2 > shadow/passwd@1:4.5-1.1
From: gnupg2/[email protected]+deb10u1 > [email protected] > shadow/passwd@1:4.5-1.1
From: shadow/login@1:4.5-1.1
and 1 more...
✗ Low severity vulnerability found in shadow/passwd
Description: Incorrect Permission Assignment for Critical Resource
Info: https://snyk.io/vuln/SNYK-DEBIAN10-SHADOW-306230
Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2,
gnupg2/[email protected]+deb10u1, shadow/login@1:4.5-1.1,
util-linux/[email protected]
From: openssh/openssh-client@1:7.9p1-10+deb10u2 > shadow/passwd@1:4.5-1.1
From: gnupg2/[email protected]+deb10u1 > [email protected] > shadow/passwd@1:4.5-1.1
From: shadow/login@1:4.5-1.1
and 1 more...
✗ Low severity vulnerability found in shadow/passwd
Description: Access Restriction Bypass
Info: https://snyk.io/vuln/SNYK-DEBIAN10-SHADOW-306250
Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2,
gnupg2/[email protected]+deb10u1, shadow/login@1:4.5-1.1,
util-linux/[email protected]
From: openssh/openssh-client@1:7.9p1-10+deb10u2 > shadow/passwd@1:4.5-1.1
From: gnupg2/[email protected]+deb10u1 > [email protected] > shadow/passwd@1:4.5-1.1
From: shadow/login@1:4.5-1.1
and 1 more...
✗ Low severity vulnerability found in shadow/passwd
Description: Incorrect Permission Assignment for Critical Resource
Info: https://snyk.io/vuln/SNYK-DEBIAN10-SHADOW-539852
Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2,
gnupg2/[email protected]+deb10u1, shadow/login@1:4.5-1.1,
util-linux/[email protected]
From: openssh/openssh-client@1:7.9p1-10+deb10u2 > shadow/passwd@1:4.5-1.1
From: gnupg2/[email protected]+deb10u1 > [email protected] > shadow/passwd@1:4.5-1.1
From: shadow/login@1:4.5-1.1
and 1 more...
✗ Low severity vulnerability found in python2.7/libpython2.7-stdlib
Description: Cryptographic Issues
Info: https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-306560
Introduced through: [email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
python-defaults/[email protected] >
python2.7/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
python-defaults/[email protected] >
python-defaults/[email protected] >
python2.7/[email protected]+deb10u1
and 7 more...
✗ Low severity vulnerability found in python2.7/libpython2.7-stdlib
Description: Arbitrary Code Injection
Info: https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-306596
Introduced through: [email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
python-defaults/[email protected] >
python2.7/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
python-defaults/[email protected] >
python-defaults/[email protected] >
python2.7/[email protected]+deb10u1
and 7 more...
✗ Low severity vulnerability found in python2.7/libpython2.7-stdlib
Description: Arbitrary Code Injection
Info: https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-474393
Introduced through: [email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
python-defaults/[email protected] >
python2.7/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
python-defaults/[email protected] >
python-defaults/[email protected] >
python2.7/[email protected]+deb10u1
and 7 more...
✗ Low severity vulnerability found in python2.7/libpython2.7-stdlib
Description: Resource Exhaustion
Info: https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-543815
Introduced through: [email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
python-defaults/[email protected] >
python2.7/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
python-defaults/[email protected] >
python-defaults/[email protected] >
python2.7/[email protected]+deb10u1
and 7 more...
✗ Low severity vulnerability found in python2.7/libpython2.7-stdlib
Description: Resource Exhaustion
Info: https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-546420
Introduced through: [email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
python-defaults/[email protected] >
python2.7/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
python-defaults/[email protected] >
python-defaults/[email protected] >
python2.7/[email protected]+deb10u1
and 7 more...
✗ Low severity vulnerability found in python2.7/libpython2.7-stdlib
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-584372
Introduced through: [email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
python-defaults/[email protected] >
python2.7/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
python-defaults/[email protected] >
python-defaults/[email protected] >
python2.7/[email protected]+deb10u1
and 7 more...
✗ Low severity vulnerability found in python-defaults/libpython2-stdlib
Description: Link Following
Info: https://snyk.io/vuln/SNYK-DEBIAN10-PYTHONDEFAULTS-269278
Introduced through: [email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
python-defaults/[email protected] >
python-defaults/[email protected]
From: [email protected]+deb10u1 > python-defaults/[email protected] >
python-defaults/[email protected] > python-defaults/[email protected]
From: [email protected]+deb10u1 > python-defaults/[email protected] >
python-defaults/[email protected]
and 5 more...
✗ Low severity vulnerability found in perl
Description: Link Following
Info: https://snyk.io/vuln/SNYK-DEBIAN10-PERL-327793
Introduced through: git@1:2.20.1-2+deb10u3, meta-common-packages@meta
From: git@1:2.20.1-2+deb10u3 > [email protected]+deb10u1
From: git@1:2.20.1-2+deb10u3 > [email protected] > [email protected]+deb10u1
From: git@1:2.20.1-2+deb10u3 > [email protected]+deb10u1 >
perl/[email protected]+deb10u1
and 3 more...
✗ Low severity vulnerability found in pcre3/libpcre3
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN10-PCRE3-345321
Introduced through: meta-common-packages@meta
From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-12
✗ Low severity vulnerability found in pcre3/libpcre3
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN10-PCRE3-345353
Introduced through: meta-common-packages@meta
From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-12
✗ Low severity vulnerability found in pcre3/libpcre3
Description: Uncontrolled Recursion
Info: https://snyk.io/vuln/SNYK-DEBIAN10-PCRE3-345502
Introduced through: meta-common-packages@meta
From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-12
✗ Low severity vulnerability found in pcre3/libpcre3
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN10-PCRE3-345530
Introduced through: meta-common-packages@meta
From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-12
✗ Low severity vulnerability found in pcre3/libpcre3
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN10-PCRE3-572368
Introduced through: meta-common-packages@meta
From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-12
✗ Low severity vulnerability found in openssl/libssl1.1
Description: Cryptographic Issues
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSL-374709
Introduced through: openssl/[email protected]+deb10u4,
openssh/openssh-client@1:7.9p1-10+deb10u2, ca-certificates@20200601~deb10u1,
[email protected]+deb10u1, [email protected]+deb10u1, [email protected]+deb10u1
From: openssl/[email protected]+deb10u4
From: openssh/openssh-client@1:7.9p1-10+deb10u2 >
openssl/[email protected]+deb10u4
From: ca-certificates@20200601~deb10u1 > [email protected]+deb10u4 >
openssl/[email protected]+deb10u4
and 6 more...
✗ Low severity vulnerability found in openssl/libssl1.1
Description: Cryptographic Issues
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSL-374996
Introduced through: openssl/[email protected]+deb10u4,
openssh/openssh-client@1:7.9p1-10+deb10u2, ca-certificates@20200601~deb10u1,
[email protected]+deb10u1, [email protected]+deb10u1, [email protected]+deb10u1
From: openssl/[email protected]+deb10u4
From: openssh/openssh-client@1:7.9p1-10+deb10u2 >
openssl/[email protected]+deb10u4
From: ca-certificates@20200601~deb10u1 > [email protected]+deb10u4 >
openssl/[email protected]+deb10u4
and 6 more...
✗ Low severity vulnerability found in openssh/openssh-client
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-368617
Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
From: openssh/openssh-client@1:7.9p1-10+deb10u2
✗ Low severity vulnerability found in openssh/openssh-client
Description: Access Restriction Bypass
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-368833
Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
From: openssh/openssh-client@1:7.9p1-10+deb10u2
✗ Low severity vulnerability found in openssh/openssh-client
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-368925
Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
From: openssh/openssh-client@1:7.9p1-10+deb10u2
✗ Low severity vulnerability found in openssh/openssh-client
Description: Improper Authentication
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-369016
Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
From: openssh/openssh-client@1:7.9p1-10+deb10u2
✗ Low severity vulnerability found in openssh/openssh-client
Description: Inappropriate Encoding for Output Context
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-369020
Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
From: openssh/openssh-client@1:7.9p1-10+deb10u2
✗ Low severity vulnerability found in openssh/openssh-client
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-472477
Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
From: openssh/openssh-client@1:7.9p1-10+deb10u2
✗ Low severity vulnerability found in openssh/openssh-client
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-570880
Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
From: openssh/openssh-client@1:7.9p1-10+deb10u2
✗ Low severity vulnerability found in openssh/openssh-client
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-574764
Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
From: openssh/openssh-client@1:7.9p1-10+deb10u2
✗ Low severity vulnerability found in openssh/openssh-client
Description: OS Command Injection
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSH-590144
Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
From: openssh/openssh-client@1:7.9p1-10+deb10u2
✗ Low severity vulnerability found in openldap/libldap-common
Description: Improper Initialization
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-304601
Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4 >
openldap/[email protected]+dfsg-3+deb10u4
From: gnupg2/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
and 1 more...
✗ Low severity vulnerability found in openldap/libldap-common
Description: Cryptographic Issues
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-304654
Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4 >
openldap/[email protected]+dfsg-3+deb10u4
From: gnupg2/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
and 1 more...
✗ Low severity vulnerability found in openldap/libldap-common
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-304666
Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4 >
openldap/[email protected]+dfsg-3+deb10u4
From: gnupg2/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
and 1 more...
✗ Low severity vulnerability found in openldap/libldap-common
Description: Improper Certificate Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-584924
Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4 >
openldap/[email protected]+dfsg-3+deb10u4
From: gnupg2/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
and 1 more...
✗ Low severity vulnerability found in nettle/libnettle6
Description: CVE-2021-3580
Info: https://snyk.io/vuln/SNYK-DEBIAN10-NETTLE-1301269
Introduced through: iputils/iputils-ping@3:20180629-2+deb10u1,
[email protected], git@1:2.20.1-2+deb10u3, [email protected]+deb10u1
From: iputils/iputils-ping@3:20180629-2+deb10u1 > nettle/[email protected]
From: [email protected] > nettle/[email protected]
From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1 >
nettle/[email protected]
and 5 more...
✗ Low severity vulnerability found in lz4/liblz4-1
Description: Buffer Overflow
Info: https://snyk.io/vuln/SNYK-DEBIAN10-LZ4-473072
Introduced through: [email protected], [email protected]+deb10u1, procps@2:3.3.15-2
From: [email protected] > apt/[email protected] > lz4/[email protected]
From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 >
lz4/[email protected]
From: procps@2:3.3.15-2 > procps/libprocps7@2:3.3.15-2 >
systemd/libsystemd0@241-7~deb10u5 > lz4/[email protected]
✗ Low severity vulnerability found in libtasn1-6
Description: Resource Management Errors
Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBTASN16-339585
Introduced through: [email protected], [email protected]+deb10u1
From: [email protected] > [email protected]
From: [email protected] > p11-kit/[email protected] > [email protected]
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4 >
gnutls28/[email protected]+deb10u5 > [email protected]
✗ Low severity vulnerability found in libssh2/libssh2-1
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBSSH2-474372
Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
libssh2/[email protected]
From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1 >
libssh2/[email protected]
✗ Low severity vulnerability found in libseccomp/libseccomp2
Description: Access Restriction Bypass
Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBSECCOMP-341044
Introduced through: libseccomp/[email protected], [email protected]
From: libseccomp/[email protected]
From: [email protected] > libseccomp/[email protected]
✗ Low severity vulnerability found in libpng1.6/libpng16-16
Description: Resource Management Errors
Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBPNG16-296440
Introduced through: [email protected]
From: [email protected] > fontconfig/[email protected] >
freetype/[email protected]+deb10u2 > libpng1.6/[email protected]
✗ Low severity vulnerability found in libpng1.6/libpng16-16
Description: Memory Leak
Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBPNG16-296468
Introduced through: [email protected]
From: [email protected] > fontconfig/[email protected] >
freetype/[email protected]+deb10u2 > libpng1.6/[email protected]
✗ Low severity vulnerability found in libpng1.6/libpng16-16
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBPNG16-296471
Introduced through: [email protected]
From: [email protected] > fontconfig/[email protected] >
freetype/[email protected]+deb10u2 > libpng1.6/[email protected]
✗ Low severity vulnerability found in libgcrypt20
Description: Use of a Broken or Risky Cryptographic Algorithm
Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBGCRYPT20-391902
Introduced through: gnupg2/[email protected]+deb10u1,
gnupg2/[email protected]+deb10u1, procps@2:3.3.15-2, [email protected]+deb10u1
From: gnupg2/[email protected]+deb10u1 > [email protected]
From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
[email protected]
From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
[email protected]
and 8 more...
✗ Low severity vulnerability found in krb5/libkrb5support0
Description: CVE-2004-0971
Info: https://snyk.io/vuln/SNYK-DEBIAN10-KRB5-395883
Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3,
openssh/openssh-client@1:7.9p1-10+deb10u2, [email protected]+deb10u1
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
krb5/[email protected]+deb10u1 > krb5/[email protected]+deb10u1
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
krb5/[email protected]+deb10u1 > krb5/[email protected]+deb10u1 >
krb5/[email protected]+deb10u1
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
krb5/[email protected]+deb10u1 > krb5/[email protected]+deb10u1 >
krb5/[email protected]+deb10u1
and 11 more...
✗ Low severity vulnerability found in krb5/libkrb5support0
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN10-KRB5-395955
Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3,
openssh/openssh-client@1:7.9p1-10+deb10u2, [email protected]+deb10u1
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
krb5/[email protected]+deb10u1 > krb5/[email protected]+deb10u1
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
krb5/[email protected]+deb10u1 > krb5/[email protected]+deb10u1 >
krb5/[email protected]+deb10u1
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
krb5/[email protected]+deb10u1 > krb5/[email protected]+deb10u1 >
krb5/[email protected]+deb10u1
and 11 more...
✗ Low severity vulnerability found in iptables/libxtables12
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN10-IPTABLES-287323
Introduced through: [email protected]
From: [email protected] > iptables/[email protected]
✗ Low severity vulnerability found in iptables/libxtables12
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN10-IPTABLES-451768
Introduced through: [email protected]
From: [email protected] > iptables/[email protected]
✗ Low severity vulnerability found in gnutls28/libgnutls30
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GNUTLS28-340755
Introduced through: [email protected], gnupg2/[email protected]+deb10u1,
[email protected], git@1:2.20.1-2+deb10u3, [email protected]+deb10u1
From: [email protected] > gnutls28/[email protected]+deb10u5
From: gnupg2/[email protected]+deb10u1 > gnutls28/[email protected]+deb10u5
From: [email protected] > gnutls28/[email protected]+deb10u5
and 3 more...
✗ Low severity vulnerability found in gnupg2/gpgv
Description: Use of a Broken or Risky Cryptographic Algorithm
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GNUPG2-535553
Introduced through: [email protected], gnupg2/[email protected]+deb10u1,
gnupg2/[email protected]+deb10u1
From: [email protected] > gnupg2/[email protected]+deb10u1
From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1
From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1
and 18 more...
✗ Low severity vulnerability found in glibc/libc-bin
Description: Double Free
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-1078993
Introduced through: glibc/[email protected], meta-common-packages@meta
From: glibc/[email protected]
From: meta-common-packages@meta > glibc/[email protected]
✗ Low severity vulnerability found in glibc/libc-bin
Description: Uncontrolled Recursion
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-338106
Introduced through: glibc/[email protected], meta-common-packages@meta
From: glibc/[email protected]
From: meta-common-packages@meta > glibc/[email protected]
✗ Low severity vulnerability found in glibc/libc-bin
Description: Uncontrolled Recursion
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-338163
Introduced through: glibc/[email protected], meta-common-packages@meta
From: glibc/[email protected]
From: meta-common-packages@meta > glibc/[email protected]
✗ Low severity vulnerability found in glibc/libc-bin
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-356371
Introduced through: glibc/[email protected], meta-common-packages@meta
From: glibc/[email protected]
From: meta-common-packages@meta > glibc/[email protected]
✗ Low severity vulnerability found in glibc/libc-bin
Description: Resource Management Errors
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-356671
Introduced through: glibc/[email protected], meta-common-packages@meta
From: glibc/[email protected]
From: meta-common-packages@meta > glibc/[email protected]
✗ Low severity vulnerability found in glibc/libc-bin
Description: Resource Management Errors
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-356735
Introduced through: glibc/[email protected], meta-common-packages@meta
From: glibc/[email protected]
From: meta-common-packages@meta > glibc/[email protected]
✗ Low severity vulnerability found in glibc/libc-bin
Description: CVE-2010-4051
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-356875
Introduced through: glibc/[email protected], meta-common-packages@meta
From: glibc/[email protected]
From: meta-common-packages@meta > glibc/[email protected]
✗ Low severity vulnerability found in glibc/libc-bin
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-452228
Introduced through: glibc/[email protected], meta-common-packages@meta
From: glibc/[email protected]
From: meta-common-packages@meta > glibc/[email protected]
✗ Low severity vulnerability found in glibc/libc-bin
Description: Access Restriction Bypass
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-452267
Introduced through: glibc/[email protected], meta-common-packages@meta
From: glibc/[email protected]
From: meta-common-packages@meta > glibc/[email protected]
✗ Low severity vulnerability found in glibc/libc-bin
Description: Use of Insufficiently Random Values
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-453375
Introduced through: glibc/[email protected], meta-common-packages@meta
From: glibc/[email protected]
From: meta-common-packages@meta > glibc/[email protected]
✗ Low severity vulnerability found in glibc/libc-bin
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-453640
Introduced through: glibc/[email protected], meta-common-packages@meta
From: glibc/[email protected]
From: meta-common-packages@meta > glibc/[email protected]
✗ Low severity vulnerability found in glibc/libc-bin
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-534995
Introduced through: glibc/[email protected], meta-common-packages@meta
From: glibc/[email protected]
From: meta-common-packages@meta > glibc/[email protected]
✗ Low severity vulnerability found in glibc/libc-bin
Description: Integer Underflow
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-564233
Introduced through: glibc/[email protected], meta-common-packages@meta
From: glibc/[email protected]
From: meta-common-packages@meta > glibc/[email protected]
✗ Low severity vulnerability found in git/git-man
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GIT-340854
Introduced through: git@1:2.20.1-2+deb10u3
From: git@1:2.20.1-2+deb10u3 > git/git-man@1:2.20.1-2+deb10u3
From: git@1:2.20.1-2+deb10u3
✗ Low severity vulnerability found in expat/libexpat1
Description: XML External Entity (XXE) Injection
Info: https://snyk.io/vuln/SNYK-DEBIAN10-EXPAT-358079
Introduced through: git@1:2.20.1-2+deb10u3, [email protected],
[email protected]+deb10u1, [email protected]+deb10u1
From: git@1:2.20.1-2+deb10u3 > expat/[email protected]+deb10u1
From: [email protected] > fontconfig/[email protected] >
expat/[email protected]+deb10u1
From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 >
expat/[email protected]+deb10u1
and 2 more...
✗ Low severity vulnerability found in curl/libcurl4
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-1049501
Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
From: [email protected]+deb10u1
From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
Fixed in: 7.64.0-4+deb10u2
✗ Low severity vulnerability found in curl/libcurl4
Description: Authentication Bypass
Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-1089958
Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
From: [email protected]+deb10u1
From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
Fixed in: 7.64.0-4+deb10u2
✗ Low severity vulnerability found in curl/libcurl4
Description: CVE-2021-22898
Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-1296892
Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
From: [email protected]+deb10u1
From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
✗ Low severity vulnerability found in coreutils
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN10-COREUTILS-317465
Introduced through: [email protected]
From: [email protected] > fontconfig/[email protected] >
fontconfig/[email protected] > [email protected]+nmu1 > [email protected]
✗ Low severity vulnerability found in coreutils
Description: Race Condition
Info: https://snyk.io/vuln/SNYK-DEBIAN10-COREUTILS-317494
Introduced through: [email protected]
From: [email protected] > fontconfig/[email protected] >
fontconfig/[email protected] > [email protected]+nmu1 > [email protected]
✗ Low severity vulnerability found in bash
Description: Improper Check for Dropped Privileges
Info: https://snyk.io/vuln/SNYK-DEBIAN10-BASH-536280
Introduced through: [email protected]
From: [email protected]
✗ Low severity vulnerability found in apt/libapt-pkg5.0
Description: Improper Verification of Cryptographic Signature
Info: https://snyk.io/vuln/SNYK-DEBIAN10-APT-407502
Introduced through: apt/[email protected], [email protected]
From: apt/[email protected]
From: [email protected] > apt/[email protected]
From: [email protected]
✗ Medium severity vulnerability found in wget
Description: Open Redirect
Info: https://snyk.io/vuln/SNYK-DEBIAN10-WGET-1277612
Introduced through: [email protected]
From: [email protected]
✗ Medium severity vulnerability found in sqlite3/libsqlite3-0
Description: Uncontrolled Recursion
Info: https://snyk.io/vuln/SNYK-DEBIAN10-SQLITE3-537251
Introduced through: gnupg2/[email protected]+deb10u1,
[email protected]+deb10u1, [email protected]+deb10u1
From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
sqlite3/[email protected]+deb10u1
From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 >
sqlite3/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1 >
sqlite3/[email protected]+deb10u1
✗ Medium severity vulnerability found in sqlite3/libsqlite3-0
Description: Improper Handling of Exceptional Conditions
Info: https://snyk.io/vuln/SNYK-DEBIAN10-SQLITE3-539769
Introduced through: gnupg2/[email protected]+deb10u1,
[email protected]+deb10u1, [email protected]+deb10u1
From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
sqlite3/[email protected]+deb10u1
From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 >
sqlite3/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1 >
sqlite3/[email protected]+deb10u1
✗ Medium severity vulnerability found in sqlite3/libsqlite3-0
Description: CVE-2020-13631
Info: https://snyk.io/vuln/SNYK-DEBIAN10-SQLITE3-570487
Introduced through: gnupg2/[email protected]+deb10u1,
[email protected]+deb10u1, [email protected]+deb10u1
From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
sqlite3/[email protected]+deb10u1
From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 >
sqlite3/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1 >
sqlite3/[email protected]+deb10u1
✗ Medium severity vulnerability found in python2.7/libpython2.7-stdlib
Description: HTTP Request Smuggling
Info: https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-1085863
Introduced through: [email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
python-defaults/[email protected] >
python2.7/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
python-defaults/[email protected] >
python-defaults/[email protected] >
python2.7/[email protected]+deb10u1
and 7 more...
✗ Medium severity vulnerability found in pcre3/libpcre3
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN10-PCRE3-572367
Introduced through: meta-common-packages@meta
From: meta-common-packages@meta > pcre3/libpcre3@2:8.39-12
✗ Medium severity vulnerability found in p11-kit/libp11-kit0
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN10-P11KIT-1050832
Introduced through: [email protected], [email protected]+deb10u1
From: [email protected] > p11-kit/[email protected]
From: [email protected] > p11-kit/[email protected] >
p11-kit/[email protected]
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4 >
gnutls28/[email protected]+deb10u5 > p11-kit/[email protected]
and 2 more...
Fixed in: 0.23.15-2+deb10u1
✗ Medium severity vulnerability found in openssl/libssl1.1
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSL-1075330
Introduced through: openssl/[email protected]+deb10u4,
openssh/openssh-client@1:7.9p1-10+deb10u2, ca-certificates@20200601~deb10u1,
[email protected]+deb10u1, [email protected]+deb10u1, [email protected]+deb10u1
From: openssl/[email protected]+deb10u4
From: openssh/openssh-client@1:7.9p1-10+deb10u2 >
openssl/[email protected]+deb10u4
From: ca-certificates@20200601~deb10u1 > [email protected]+deb10u4 >
openssl/[email protected]+deb10u4
and 6 more...
Fixed in: 1.1.1d-0+deb10u5
✗ Medium severity vulnerability found in openssl/libssl1.1
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSL-1089177
Introduced through: openssl/[email protected]+deb10u4,
openssh/openssh-client@1:7.9p1-10+deb10u2, ca-certificates@20200601~deb10u1,
[email protected]+deb10u1, [email protected]+deb10u1, [email protected]+deb10u1
From: openssl/[email protected]+deb10u4
From: openssh/openssh-client@1:7.9p1-10+deb10u2 >
openssl/[email protected]+deb10u4
From: ca-certificates@20200601~deb10u1 > [email protected]+deb10u4 >
openssl/[email protected]+deb10u4
and 6 more...
Fixed in: 1.1.1d-0+deb10u6
✗ Medium severity vulnerability found in openssl/libssl1.1
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSL-536856
Introduced through: openssl/[email protected]+deb10u4,
openssh/openssh-client@1:7.9p1-10+deb10u2, ca-certificates@20200601~deb10u1,
[email protected]+deb10u1, [email protected]+deb10u1, [email protected]+deb10u1
From: openssl/[email protected]+deb10u4
From: openssh/openssh-client@1:7.9p1-10+deb10u2 >
openssl/[email protected]+deb10u4
From: ca-certificates@20200601~deb10u1 > [email protected]+deb10u4 >
openssl/[email protected]+deb10u4
and 6 more...
Fixed in: 1.1.1d-0+deb10u5
✗ Medium severity vulnerability found in libzstd/libzstd1
Description: Incorrect Default Permissions
Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBZSTD-1080893
Introduced through: libzstd/[email protected]+dfsg-3, [email protected]
From: libzstd/[email protected]+dfsg-3
From: [email protected] > apt/[email protected] > libzstd/[email protected]+dfsg-3
Fixed in: 1.3.8+dfsg-3+deb10u1
✗ Medium severity vulnerability found in libzstd/libzstd1
Description: Incorrect Default Permissions
Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBZSTD-1080899
Introduced through: libzstd/[email protected]+dfsg-3, [email protected]
From: libzstd/[email protected]+dfsg-3
From: [email protected] > apt/[email protected] > libzstd/[email protected]+dfsg-3
Fixed in: 1.3.8+dfsg-3+deb10u2
✗ Medium severity vulnerability found in libgcrypt20
Description: Race Condition
Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBGCRYPT20-460489
Introduced through: gnupg2/[email protected]+deb10u1,
gnupg2/[email protected]+deb10u1, procps@2:3.3.15-2, [email protected]+deb10u1
From: gnupg2/[email protected]+deb10u1 > [email protected]
From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
[email protected]
From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
[email protected]
and 8 more...
✗ Medium severity vulnerability found in iproute2
Description: Use After Free
Info: https://snyk.io/vuln/SNYK-DEBIAN10-IPROUTE2-568742
Introduced through: [email protected]
From: [email protected]
✗ Medium severity vulnerability found in glibc/libc-bin
Description: Loop with Unreachable Exit Condition ('Infinite Loop')
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-1035462
Introduced through: glibc/[email protected], meta-common-packages@meta
From: glibc/[email protected]
From: meta-common-packages@meta > glibc/[email protected]
✗ Medium severity vulnerability found in glibc/libc-bin
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-1055403
Introduced through: glibc/[email protected], meta-common-packages@meta
From: glibc/[email protected]
From: meta-common-packages@meta > glibc/[email protected]
✗ Medium severity vulnerability found in glibc/libc-bin
Description: Out-of-Bounds
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-559181
Introduced through: glibc/[email protected], meta-common-packages@meta
From: glibc/[email protected]
From: meta-common-packages@meta > glibc/[email protected]
✗ Medium severity vulnerability found in curl/libcurl4
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-1089952
Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
From: [email protected]+deb10u1
From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
Fixed in: 7.64.0-4+deb10u2
✗ High severity vulnerability found in systemd/libsystemd0
Description: Privilege Chaining
Info: https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-345386
Introduced through: util-linux/bsdutils@1:2.33.1-0.1, [email protected],
util-linux/[email protected], procps@2:3.3.15-2, systemd/libudev1@241-7~deb10u5
From: util-linux/bsdutils@1:2.33.1-0.1 > systemd/libsystemd0@241-7~deb10u5
From: [email protected] > apt/[email protected] >
systemd/libsystemd0@241-7~deb10u5
From: util-linux/[email protected] > [email protected] >
systemd/libsystemd0@241-7~deb10u5
and 4 more...
✗ High severity vulnerability found in systemd/libsystemd0
Description: Incorrect Privilege Assignment
Info: https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-345391
Introduced through: util-linux/bsdutils@1:2.33.1-0.1, [email protected],
util-linux/[email protected], procps@2:3.3.15-2, systemd/libudev1@241-7~deb10u5
From: util-linux/bsdutils@1:2.33.1-0.1 > systemd/libsystemd0@241-7~deb10u5
From: [email protected] > apt/[email protected] >
systemd/libsystemd0@241-7~deb10u5
From: util-linux/[email protected] > [email protected] >
systemd/libsystemd0@241-7~deb10u5
and 4 more...
✗ High severity vulnerability found in subversion/libsvn1
Description: NULL Pointer Dereference
Info: https://snyk.io/vuln/SNYK-DEBIAN10-SUBVERSION-1071814
Introduced through: [email protected]+deb10u1
From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1
From: [email protected]+deb10u1
Fixed in: 1.10.4-1+deb10u2
✗ High severity vulnerability found in sqlite3/libsqlite3-0
Description: CVE-2019-19603
Info: https://snyk.io/vuln/SNYK-DEBIAN10-SQLITE3-537598
Introduced through: gnupg2/[email protected]+deb10u1,
[email protected]+deb10u1, [email protected]+deb10u1
From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
sqlite3/[email protected]+deb10u1
From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 >
sqlite3/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1 >
sqlite3/[email protected]+deb10u1
✗ High severity vulnerability found in python2.7/libpython2.7-stdlib
Description: Buffer Overflow
Info: https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON27-1063178
Introduced through: [email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
python-defaults/[email protected] >
python2.7/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
[email protected]+deb10u1 > python2.7/[email protected]+deb10u1
From: [email protected]+deb10u1 > python-defaults/[email protected] >
python-defaults/[email protected] >
python-defaults/[email protected] >
python2.7/[email protected]+deb10u1
and 7 more...
✗ High severity vulnerability found in pcre2/libpcre2-8-0
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN10-PCRE2-548863
Introduced through: git@1:2.20.1-2+deb10u3, [email protected]
From: git@1:2.20.1-2+deb10u3 > pcre2/[email protected]
From: [email protected] > pcre2/[email protected]
✗ High severity vulnerability found in p11-kit/libp11-kit0
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN10-P11KIT-1050833
Introduced through: [email protected], [email protected]+deb10u1
From: [email protected] > p11-kit/[email protected]
From: [email protected] > p11-kit/[email protected] >
p11-kit/[email protected]
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4 >
gnutls28/[email protected]+deb10u5 > p11-kit/[email protected]
and 2 more...
Fixed in: 0.23.15-2+deb10u1
✗ High severity vulnerability found in p11-kit/libp11-kit0
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN10-P11KIT-1050836
Introduced through: [email protected], [email protected]+deb10u1
From: [email protected] > p11-kit/[email protected]
From: [email protected] > p11-kit/[email protected] >
p11-kit/[email protected]
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4 >
gnutls28/[email protected]+deb10u5 > p11-kit/[email protected]
and 2 more...
Fixed in: 0.23.15-2+deb10u1
✗ High severity vulnerability found in openssl/libssl1.1
Description: Integer Overflow or Wraparound
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSL-1075326
Introduced through: openssl/[email protected]+deb10u4,
openssh/openssh-client@1:7.9p1-10+deb10u2, ca-certificates@20200601~deb10u1,
[email protected]+deb10u1, [email protected]+deb10u1, [email protected]+deb10u1
From: openssl/[email protected]+deb10u4
From: openssh/openssh-client@1:7.9p1-10+deb10u2 >
openssl/[email protected]+deb10u4
From: ca-certificates@20200601~deb10u1 > [email protected]+deb10u4 >
openssl/[email protected]+deb10u4
and 6 more...
Fixed in: 1.1.1d-0+deb10u5
✗ High severity vulnerability found in openldap/libldap-common
Description: Reachable Assertion
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064721
Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4 >
openldap/[email protected]+dfsg-3+deb10u4
From: gnupg2/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
and 1 more...
Fixed in: 2.4.47+dfsg-3+deb10u5
✗ High severity vulnerability found in openldap/libldap-common
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064724
Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4 >
openldap/[email protected]+dfsg-3+deb10u4
From: gnupg2/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
and 1 more...
Fixed in: 2.4.47+dfsg-3+deb10u5
✗ High severity vulnerability found in openldap/libldap-common
Description: Integer Underflow
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064726
Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4 >
openldap/[email protected]+dfsg-3+deb10u4
From: gnupg2/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
and 1 more...
Fixed in: 2.4.47+dfsg-3+deb10u5
✗ High severity vulnerability found in openldap/libldap-common
Description: Release of Invalid Pointer or Reference
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064733
Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4 >
openldap/[email protected]+dfsg-3+deb10u4
From: gnupg2/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
and 1 more...
Fixed in: 2.4.47+dfsg-3+deb10u5
✗ High severity vulnerability found in openldap/libldap-common
Description: Double Free
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064737
Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4 >
openldap/[email protected]+dfsg-3+deb10u4
From: gnupg2/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
and 1 more...
Fixed in: 2.4.47+dfsg-3+deb10u5
✗ High severity vulnerability found in openldap/libldap-common
Description: Loop with Unreachable Exit Condition ('Infinite Loop')
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064742
Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4 >
openldap/[email protected]+dfsg-3+deb10u4
From: gnupg2/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
and 1 more...
Fixed in: 2.4.47+dfsg-3+deb10u5
✗ High severity vulnerability found in openldap/libldap-common
Description: CVE-2020-36226
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064744
Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4 >
openldap/[email protected]+dfsg-3+deb10u4
From: gnupg2/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
and 1 more...
Fixed in: 2.4.47+dfsg-3+deb10u5
✗ High severity vulnerability found in openldap/libldap-common
Description: Integer Underflow
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064746
Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4 >
openldap/[email protected]+dfsg-3+deb10u4
From: gnupg2/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
and 1 more...
Fixed in: 2.4.47+dfsg-3+deb10u5
✗ High severity vulnerability found in openldap/libldap-common
Description: Access of Resource Using Incompatible Type ('Type Confusion')
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064752
Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4 >
openldap/[email protected]+dfsg-3+deb10u4
From: gnupg2/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
and 1 more...
Fixed in: 2.4.47+dfsg-3+deb10u5
✗ High severity vulnerability found in openldap/libldap-common
Description: Reachable Assertion
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1064754
Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4 >
openldap/[email protected]+dfsg-3+deb10u4
From: gnupg2/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
and 1 more...
Fixed in: 2.4.47+dfsg-3+deb10u5
✗ High severity vulnerability found in openldap/libldap-common
Description: Reachable Assertion
Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-1074919
Introduced through: [email protected]+deb10u1, gnupg2/[email protected]+deb10u1,
git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4 >
openldap/[email protected]+dfsg-3+deb10u4
From: gnupg2/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
openldap/[email protected]+dfsg-3+deb10u4
and 1 more...
Fixed in: 2.4.47+dfsg-3+deb10u6
✗ High severity vulnerability found in nettle/libnettle6
Description: Use of a Broken or Risky Cryptographic Algorithm
Info: https://snyk.io/vuln/SNYK-DEBIAN10-NETTLE-1090205
Introduced through: iputils/iputils-ping@3:20180629-2+deb10u1,
[email protected], git@1:2.20.1-2+deb10u3, [email protected]+deb10u1
From: iputils/iputils-ping@3:20180629-2+deb10u1 > nettle/[email protected]
From: [email protected] > nettle/[email protected]
From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1 >
nettle/[email protected]
and 5 more...
✗ High severity vulnerability found in lz4/liblz4-1
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN10-LZ4-1277601
Introduced through: [email protected], [email protected]+deb10u1, procps@2:3.3.15-2
From: [email protected] > apt/[email protected] > lz4/[email protected]
From: [email protected]+deb10u1 > subversion/[email protected]+deb10u1 >
lz4/[email protected]
From: procps@2:3.3.15-2 > procps/libprocps7@2:3.3.15-2 >
systemd/libsystemd0@241-7~deb10u5 > lz4/[email protected]
Fixed in: 1.8.3-1+deb10u1
✗ High severity vulnerability found in libssh2/libssh2-1
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBSSH2-452460
Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
libssh2/[email protected]
From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1 >
libssh2/[email protected]
✗ High severity vulnerability found in libidn2/libidn2-0
Description: Improper Input Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBIDN2-474100
Introduced through: iputils/iputils-ping@3:20180629-2+deb10u1,
[email protected], [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
From: iputils/iputils-ping@3:20180629-2+deb10u1 >
libidn2/[email protected]+deb10u1
From: [email protected] > libidn2/[email protected]+deb10u1
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1 >
libidn2/[email protected]+deb10u1
and 3 more...
✗ High severity vulnerability found in libgcrypt20
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBGCRYPT20-1297893
Introduced through: gnupg2/[email protected]+deb10u1,
gnupg2/[email protected]+deb10u1, procps@2:3.3.15-2, [email protected]+deb10u1
From: gnupg2/[email protected]+deb10u1 > [email protected]
From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
[email protected]
From: gnupg2/[email protected]+deb10u1 > gnupg2/[email protected]+deb10u1 >
[email protected]
and 8 more...
✗ High severity vulnerability found in libbsd/libbsd0
Description: Out-of-bounds Read
Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBBSD-541041
Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
From: openssh/openssh-client@1:7.9p1-10+deb10u2 >
libedit/[email protected] > libbsd/[email protected]
Fixed in: 0.9.1-2+deb10u1
✗ High severity vulnerability found in gnutls28/libgnutls30
Description: Use After Free
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GNUTLS28-1085094
Introduced through: [email protected], gnupg2/[email protected]+deb10u1,
[email protected], git@1:2.20.1-2+deb10u3, [email protected]+deb10u1
From: [email protected] > gnutls28/[email protected]+deb10u5
From: gnupg2/[email protected]+deb10u1 > gnutls28/[email protected]+deb10u5
From: [email protected] > gnutls28/[email protected]+deb10u5
and 3 more...
✗ High severity vulnerability found in gnutls28/libgnutls30
Description: Use After Free
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GNUTLS28-1085097
Introduced through: [email protected], gnupg2/[email protected]+deb10u1,
[email protected], git@1:2.20.1-2+deb10u3, [email protected]+deb10u1
From: [email protected] > gnutls28/[email protected]+deb10u5
From: gnupg2/[email protected]+deb10u1 > gnutls28/[email protected]+deb10u5
From: [email protected] > gnutls28/[email protected]+deb10u5
and 3 more...
✗ High severity vulnerability found in gnutls28/libgnutls30
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GNUTLS28-609778
Introduced through: [email protected], gnupg2/[email protected]+deb10u1,
[email protected], git@1:2.20.1-2+deb10u3, [email protected]+deb10u1
From: [email protected] > gnutls28/[email protected]+deb10u5
From: gnupg2/[email protected]+deb10u1 > gnutls28/[email protected]+deb10u5
From: [email protected] > gnutls28/[email protected]+deb10u5
and 3 more...
✗ High severity vulnerability found in glibc/libc-bin
Description: Reachable Assertion
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-1065768
Introduced through: glibc/[email protected], meta-common-packages@meta
From: glibc/[email protected]
From: meta-common-packages@meta > glibc/[email protected]
✗ High severity vulnerability found in glibc/libc-bin
Description: Use After Free
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-1296899
Introduced through: glibc/[email protected], meta-common-packages@meta
From: glibc/[email protected]
From: meta-common-packages@meta > glibc/[email protected]
✗ High severity vulnerability found in glibc/libc-bin
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-559488
Introduced through: glibc/[email protected], meta-common-packages@meta
From: glibc/[email protected]
From: meta-common-packages@meta > glibc/[email protected]
✗ High severity vulnerability found in glibc/libc-bin
Description: Use After Free
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-559493
Introduced through: glibc/[email protected], meta-common-packages@meta
From: glibc/[email protected]
From: meta-common-packages@meta > glibc/[email protected]
✗ High severity vulnerability found in git/git-man
Description: Link Following
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GIT-1083853
Introduced through: git@1:2.20.1-2+deb10u3
From: git@1:2.20.1-2+deb10u3 > git/git-man@1:2.20.1-2+deb10u3
From: git@1:2.20.1-2+deb10u3
✗ High severity vulnerability found in gcc-8/libstdc++6
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GCC8-347558
Introduced through: gcc-8/[email protected], [email protected],
meta-common-packages@meta
From: gcc-8/[email protected]
From: [email protected] > gcc-8/[email protected]
From: [email protected] > apt/[email protected] > gcc-8/[email protected]
and 2 more...
✗ High severity vulnerability found in gcc-8/libstdc++6
Description: Insufficient Entropy
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GCC8-469413
Introduced through: gcc-8/[email protected], [email protected],
meta-common-packages@meta
From: gcc-8/[email protected]
From: [email protected] > gcc-8/[email protected]
From: [email protected] > apt/[email protected] > gcc-8/[email protected]
and 2 more...
✗ High severity vulnerability found in curl/libcurl4
Description: Out-of-bounds Write
Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-1049502
Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
From: [email protected]+deb10u1
From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
Fixed in: 7.64.0-4+deb10u2
✗ High severity vulnerability found in curl/libcurl4
Description: Improper Certificate Validation
Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-1049506
Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
From: [email protected]+deb10u1
From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
Fixed in: 7.64.0-4+deb10u2
✗ High severity vulnerability found in curl/libcurl4
Description: Arbitrary Code Injection
Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-573151
Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
From: [email protected]+deb10u1
From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
Fixed in: 7.64.0-4+deb10u2
✗ High severity vulnerability found in curl/libcurl4
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-573153
Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
From: [email protected]+deb10u1
From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
Fixed in: 7.64.0-4+deb10u2
✗ High severity vulnerability found in curl/libcurl4
Description: Use After Free
Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-608200
Introduced through: [email protected]+deb10u1, git@1:2.20.1-2+deb10u3
From: [email protected]+deb10u1 > curl/[email protected]+deb10u1
From: [email protected]+deb10u1
From: git@1:2.20.1-2+deb10u3 > curl/[email protected]+deb10u1
Fixed in: 7.64.0-4+deb10u2
Package manager: deb
Project name: docker-image|guacamole/guacamole
Docker image: guacamole/guacamole:1.3.0
Platform: linux/amd64
Tested 179 dependencies for known vulnerabilities, found 137 vulnerabilities.
For more free scans that keep your images secure, sign up to Snyk at
https://dockr.ly/3ePqVcp
tgates@MacBook-Pro ~
```
--
This message was sent by Atlassian Jira
(v8.3.4#803005)