QScanner Report Formats
QScanner generates a vulnerability report that includes inventory, metadata, vulnerability, and policy evaluation information. It can generate a report in the following formats.
- SARIF
- Table
- JSON
By default, QScanner generates its report in SARIF and Tabular format. You can also generate report in JSON format using --report-format
flag.
To generate QScanner report in a specific format/s, run this command - --report-format <sarif/table/json>.
JSON Report
Here is a sample QScanner report in JSON format.
{
"SchemaVersion": 6,
"Inventory": {
"SchemaVersion": 5,
"QScannerVersion": "4.2.0-3-dev",
"ScansPerformed": [
{
"ScanType": "metadata",
"ScanDuration": 2140065,
"Status": "SUCCESS"
},
{
"ScanType": "os",
"Status": "SUCCESS"
},
{
"ScanType": "sca",
"Status": "SUCCESS"
}
],
"PackageInfos": [
{
"Packages": [
{
"ID": "acl@2.2.52-2",
"Name": "acl",
"Version": "2.2.52-2",
"SrcName": "acl",
"SrcVersion": "2.2.52-2",
"Arch": "amd64",
"Layer": {
"Digest": "sha256:75a822cd7888e394c49828b951061402d31745f596b1f502758570f2d0ee79e2",
"DiffID": "sha256:b6ca02dfe5e62c58dacb1dec16eb42ed35761c15562485f9da9364bb7c90b9b3"
},
"Licenses": [
"LGPL-2.1",
"GPL-3.0"
]
},
{
"ID": "adduser@3.113+nmu3",
"Name": "adduser",
"Version": "3.113+nmu3",
"SrcName": "adduser",
"SrcVersion": "3.113+nmu3",
"Arch": "all",
"Layer": {
"Digest": "sha256:75a822cd7888e394c49828b951061402d31745f596b1f502758570f2d0ee79e2",
"DiffID": "sha256:b6ca02dfe5e62c58dacb1dec16eb42ed35761c15562485f9da9364bb7c90b9b3"
},
"Licenses": [
"GPL-2.0"
]
},
{
"ID": "apt@1.0.9.8.4",
"Name": "apt",
"Version": "1.0.9.8.4",
"SrcName": "apt",
"SrcVersion": "1.0.9.8.4",
"Arch": "amd64",
"Layer": {
"Digest": "sha256:75a822cd7888e394c49828b951061402d31745f596b1f502758570f2d0ee79e2",
"DiffID": "sha256:b6ca02dfe5e62c58dacb1dec16eb42ed35761c15562485f9da9364bb7c90b9b3"
},
"Licenses": [
"GPL-2.0"
]
},
{
"ID": "autoconf@2.69-8",
"Name": "autoconf",
"Version": "2.69-8",
"SrcName": "autoconf",
"SrcVersion": "2.69-8",
"Arch": "all",
"Layer": {
"Digest": "sha256:871436ab7225503e9e951a7acb7b1689a91a60d033bf8cbabcd40fe5ca4cfc87",
"DiffID": "sha256:0a5e2b2ddeaa749d95730bad9be3e3a472ff6f80544da0082a99ba569df34ff3"
},
"Licenses": [
"GPL-3.0",
"GPL-3.0-with-autoconf-exception",
"permissive-short-disclaimer",
"permissive-long-disclaimer",
"permissive-without-disclaimer",
"permissive-without-notices-or-disclaimer",
"GPL-2.0-with-autoconf-exception",
"GPL-2.0",
"MIT-X-Consortium",
"GPL-3+ with Texinfo exception",
"GFDL-1.3+",
"GFDL-1.3",
"no-modification",
"permissive",
"other"
]
},
{
"ID": "libharfbuzz0b:amd64@0.9.35-2",
"Name": "libharfbuzz0b:amd64",
"Version": "0.9.35-2",
"SrcName": "harfbuzz",
"SrcVersion": "0.9.35-2",
"Arch": "amd64",
"Layer": {
"Digest": "sha256:871436ab7225503e9e951a7acb7b1689a91a60d033bf8cbabcd40fe5ca4cfc87",
"DiffID": "sha256:0a5e2b2ddeaa749d95730bad9be3e3a472ff6f80544da0082a99ba569df34ff3"
},
"Licenses": [
"MIT"
]
},
{
"ID": "libhogweed2:amd64@2.7.1-5+deb8u1",
"Name": "libhogweed2:amd64",
"Version": "2.7.1-5+deb8u1",
"SrcName": "nettle",
"SrcVersion": "2.7.1-5+deb8u1",
"Arch": "amd64",
"Layer": {
"Digest": "sha256:57de64c72267e88e952b064236cb906c7626f7c07a1a2d5900cf6953e72632b3",
"DiffID": "sha256:60a0858edcd5aad240966e33389850e4328de4cfb5282977eddda56bffc7f95f"
}
},
{
"ID": "mercurial-common@3.1.2-2+deb8u3",
"Name": "mercurial-common",
"Version": "3.1.2-2+deb8u3",
"SrcName": "mercurial",
"SrcVersion": "3.1.2-2+deb8u3",
"Arch": "all",
"Layer": {
"Digest": "sha256:4306be1e8943b446026b96c2ef7b3ab8471c760774fd1cd11334df7084fed57b",
"DiffID": "sha256:53c779688d06353f7ba4fd7ce1d43ce146ad0278ebead0feea1846383c730024"
},
"Licenses": [
"GPL-2.0"
]
},
]
}
],
"SCAData": {
"LanguagesDetected": {
"Ruby": -3737145078316984679
},
"Applications": [
{
"Language": "Ruby",
"Type": "gemspec",
"Libraries": [
{
"Name": "actioncable",
"Version": "5.0.1",
"FilePath": "usr/local/bundle/specifications/actioncable-5.0.1.gemspec",
"Layer": {
"Digest": "sha256:4cd427c44fca003d57c5ad391bc709131ed308bc8468d9b1331db3f5571bac74",
"DiffID": "sha256:10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d"
},
"Licenses": [
"MIT"
]
},
{
"Name": "actionmailer",
"Version": "5.0.1",
"FilePath": "usr/local/bundle/specifications/actionmailer-5.0.1.gemspec",
"Layer": {
"Digest": "sha256:4cd427c44fca003d57c5ad391bc709131ed308bc8468d9b1331db3f5571bac74",
"DiffID": "sha256:10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d"
},
"Licenses": [
"MIT"
]
},
{
"Name": "bigdecimal",
"Version": "1.2.8",
"FilePath": "usr/local/lib/ruby/gems/2.3.0/specifications/default/bigdecimal-1.2.8.gemspec",
"Layer": {
"Digest": "sha256:c2807e33cf8416989005a833f0b1cf36ccb635a9c1df5b00dbc1862dfd01330c",
"DiffID": "sha256:8449699b33dfd82ec80bce25b7b0fede858df3e907b5d1e2b8fb879ccaf1dc1d"
},
"Licenses": [
"Ruby"
]
},
{
"Name": "builder",
"Version": "3.2.2",
"FilePath": "usr/local/bundle/specifications/builder-3.2.2.gemspec",
"Layer": {
"Digest": "sha256:4cd427c44fca003d57c5ad391bc709131ed308bc8468d9b1331db3f5571bac74",
"DiffID": "sha256:10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d"
},
"Licenses": [
"MIT"
]
},
{
"Name": "bundler",
"Version": "1.13.7",
"FilePath": "usr/local/lib/ruby/gems/2.3.0/specifications/bundler-1.13.7.gemspec",
"Layer": {
"Digest": "sha256:7025772f9b601093d0f4d16474bab88bca8f180d1e3efcb47899fac48a62c86f",
"DiffID": "sha256:2a5f7e9a33c2eaa1168499f77b012c0cad4a313db430c953ae4e36a6daab807b"
},
"Licenses": [
"MIT"
]
},
{
"Name": "concurrent-ruby",
"Version": "1.0.4",
"FilePath": "usr/local/bundle/specifications/concurrent-ruby-1.0.4.gemspec",
"Layer": {
"Digest": "sha256:4cd427c44fca003d57c5ad391bc709131ed308bc8468d9b1331db3f5571bac74",
"DiffID": "sha256:10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d"
},
"Licenses": [
"MIT"
]
},
{
"Name": "mime-types-data",
"Version": "3.2016.0521",
"FilePath": "usr/local/bundle/specifications/mime-types-data-3.2016.0521.gemspec",
"Layer": {
"Digest": "sha256:4cd427c44fca003d57c5ad391bc709131ed308bc8468d9b1331db3f5571bac74",
"DiffID": "sha256:10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d"
},
"Licenses": [
"MIT"
]
},
{
"Name": "mini_portile2",
"Version": "2.1.0",
"FilePath": "usr/local/bundle/specifications/mini_portile2-2.1.0.gemspec",
"Layer": {
"Digest": "sha256:4cd427c44fca003d57c5ad391bc709131ed308bc8468d9b1331db3f5571bac74",
"DiffID": "sha256:10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d"
},
"Licenses": [
"MIT"
]
},
{
"Name": "minitest",
"Version": "5.8.5",
"FilePath": "usr/local/lib/ruby/gems/2.3.0/specifications/minitest-5.8.5.gemspec",
"Layer": {
"Digest": "sha256:c2807e33cf8416989005a833f0b1cf36ccb635a9c1df5b00dbc1862dfd01330c",
"DiffID": "sha256:8449699b33dfd82ec80bce25b7b0fede858df3e907b5d1e2b8fb879ccaf1dc1d"
},
"Licenses": [
"MIT"
]
},
{
"Name": "net-telnet",
"Version": "0.1.1",
"FilePath": "usr/local/lib/ruby/gems/2.3.0/specifications/net-telnet-0.1.1.gemspec",
"Layer": {
"Digest": "sha256:c2807e33cf8416989005a833f0b1cf36ccb635a9c1df5b00dbc1862dfd01330c",
"DiffID": "sha256:8449699b33dfd82ec80bce25b7b0fede858df3e907b5d1e2b8fb879ccaf1dc1d"
}
},
{
"Name": "websocket-driver",
"Version": "0.6.4",
"FilePath": "usr/local/bundle/specifications/websocket-driver-0.6.4.gemspec",
"Layer": {
"Digest": "sha256:4cd427c44fca003d57c5ad391bc709131ed308bc8468d9b1331db3f5571bac74",
"DiffID": "sha256:10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d"
},
"Licenses": [
"MIT"
]
},
{
"Name": "websocket-extensions",
"Version": "0.1.2",
"FilePath": "usr/local/bundle/specifications/websocket-extensions-0.1.2.gemspec",
"Layer": {
"Digest": "sha256:4cd427c44fca003d57c5ad391bc709131ed308bc8468d9b1331db3f5571bac74",
"DiffID": "sha256:10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d"
},
"Licenses": [
"MIT"
]
}
]
}
]
},
"Metadata": {
"OS": {
"Family": "debian",
"Name": "Debian Linux 8.6"
},
"Architecture": "amd64",
"ImageMetadata": {
"ImageID": "sha256:660f41442a278fab36077eaad1cb0bce5e0842b5ad5e34d0e3bb9ccf995391d3",
"RepoTags": [
"rails:latest"
],
"RepoDigests": [
"rails@sha256:aec52fe81ff0e99d64174001fbdf44c3bc9e1869756dec05c447f52a0fe637e7"
],
"LayerInventory": {
"LayerNumberMap": {
"0a5e2b2ddeaa749d95730bad9be3e3a472ff6f80544da0082a99ba569df34ff3": 5,
"0abbaea09fe5ffd3a390647936ff184cecd514c7a9ff7c90a900b790a1e1899e": 6,
"10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d": 22,
"2a5f7e9a33c2eaa1168499f77b012c0cad4a313db430c953ae4e36a6daab807b": 13,
"53c779688d06353f7ba4fd7ce1d43ce146ad0278ebead0feea1846383c730024": 4,
"60a0858edcd5aad240966e33389850e4328de4cfb5282977eddda56bffc7f95f": 3,
"8449699b33dfd82ec80bce25b7b0fede858df3e907b5d1e2b8fb879ccaf1dc1d": 11,
"b6ca02dfe5e62c58dacb1dec16eb42ed35761c15562485f9da9364bb7c90b9b3": 1,
"c3460377cc14bf15a8c5513180821f8867660765dc466341c15c121b49df20b8": 17,
"ed649c99dc69fe0bce1cad0ffd0794cbaf7cd70caaa4ae8c783d7463bdd79c82": 20,
"ee7406cd987dac9f2cf5d2aa06a6be4cc3b5b4ade08508680b9378b930174c1c": 19
},
"LayerInfoList": [
{
"LayerNum": 1,
"LayerContentHash": "b6ca02dfe5e62c58dacb1dec16eb42ed35761c15562485f9da9364bb7c90b9b3",
"Command": "ADD file:1d214d2782eaccc743b8d683ccecf2f87f12a0ecdfbcd6fdf4943ce616f23870 in / ",
"CreatedAt": 1481667059102
},
{
"LayerNum": 2,
"IsEmpty": true,
"Command": "CMD [\"/bin/bash\"]",
"CreatedAt": 1481667059712
},
{
"LayerNum": 3,
"LayerContentHash": "60a0858edcd5aad240966e33389850e4328de4cfb5282977eddda56bffc7f95f",
"Command": "RUN apt-get update \u0026\u0026 apt-get install -y --no-install-recommends \t\tca-certificates \t\tcurl \t\twget \t\u0026\u0026 rm -rf /var/lib/apt/lists/*",
"CreatedAt": 1481670011852
},
{
"LayerNum": 4,
"LayerContentHash": "53c779688d06353f7ba4fd7ce1d43ce146ad0278ebead0feea1846383c730024",
"Command": "RUN apt-get update \u0026\u0026 apt-get install -y --no-install-recommends \t\tbzr \t\tgit \t\tmercurial \t\topenssh-client \t\tsubversion \t\t\t\tprocps \t\u0026\u0026 rm -rf /var/lib/apt/lists/*",
"CreatedAt": 1481670033748
},
{
"LayerNum": 5,
"LayerContentHash": "0a5e2b2ddeaa749d95730bad9be3e3a472ff6f80544da0082a99ba569df34ff3",
"Command": "RUN apt-get update \u0026\u0026 apt-get install -y --no-install-recommends \t\tautoconf \t\tautomake \t\tbzip2 \t\tfile \t\tg++ \t\tgcc \t\timagemagick \t\tlibbz2-dev \t\tlibc6-dev \t\tlibcurl4-openssl-dev \t\tlibdb-dev \t\tlibevent-dev \t\tlibffi-dev \t\tlibgdbm-dev \t\tlibgeoip-dev \t\tlibglib2.0-dev \t\tlibjpeg-dev \t\tlibkrb5-dev \t\tliblzma-dev \t\tlibmagickcore-dev \t\tlibmagickwand-dev \t\tlibmysqlclient-dev \t\tlibncurses-dev \t\tlibpng-dev \t\tlibpq-dev \t\tlibreadline-dev \t\tlibsqlite3-dev \t\tlibssl-dev \t\tlibtool \t\tlibwebp-dev \t\tlibxml2-dev \t\tlibxslt-dev \t\tlibyaml-dev \t\tmake \t\tpatch \t\txz-utils \t\tzlib1g-dev \t\u0026\u0026 rm -rf /var/lib/apt/lists/*",
"CreatedAt": 1481828353028
},
{
"LayerNum": 6,
"LayerContentHash": "0abbaea09fe5ffd3a390647936ff184cecd514c7a9ff7c90a900b790a1e1899e",
"Command": "RUN mkdir -p /usr/local/etc \t\u0026\u0026 { \t\techo 'install: --no-document'; \t\techo 'update: --no-document'; \t} \u003e\u003e /usr/local/etc/gemrc",
"CreatedAt": 1481859043700
},
{
"LayerNum": 7,
"IsEmpty": true,
"Command": "ENV RUBY_MAJOR=2.3",
"CreatedAt": 1481859044009
},
{
"LayerNum": 8,
"IsEmpty": true,
"Command": "ENV RUBY_VERSION=2.3.3",
"CreatedAt": 1481859044199
},
{
"LayerNum": 9,
"IsEmpty": true,
"Command": "ENV RUBY_DOWNLOAD_SHA256=1a4fa8c2885734ba37b97ffdb4a19b8fba0e8982606db02d936e65bac07419dc",
"CreatedAt": 1483566560999
},
{
"LayerNum": 10,
"IsEmpty": true,
"Command": "ENV RUBYGEMS_VERSION=2.6.8",
"CreatedAt": 1483566561319
},
{
"LayerNum": 11,
"LayerContentHash": "8449699b33dfd82ec80bce25b7b0fede858df3e907b5d1e2b8fb879ccaf1dc1d",
"Command": "RUN set -ex \t\t\u0026\u0026 buildDeps=' \t\tbison \t\tlibgdbm-dev \t\truby \t\txz-utils \t' \t\u0026\u0026 apt-get update \t\u0026\u0026 apt-get install -y --no-install-recommends $buildDeps \t\u0026\u0026 rm -rf /var/lib/apt/lists/* \t\t\u0026\u0026 wget -O ruby.tar.xz \"https://cache.ruby-lang.org/pub/ruby/${RUBY_MAJOR%-rc}/ruby-$RUBY_VERSION.tar.xz\" \t\u0026\u0026 echo \"$RUBY_DOWNLOAD_SHA256 *ruby.tar.xz\" | sha256sum -c - \t\t\u0026\u0026 mkdir -p /usr/src/ruby \t\u0026\u0026 tar -xJf ruby.tar.xz -C /usr/src/ruby --strip-components=1 \t\u0026\u0026 rm ruby.tar.xz \t\t\u0026\u0026 cd /usr/src/ruby \t\t\u0026\u0026 { \t\techo '#define ENABLE_PATH_CHECK 0'; \t\techo; \t\tcat file.c; \t} \u003e file.c.new \t\u0026\u0026 mv file.c.new file.c \t\t\u0026\u0026 autoconf \t\u0026\u0026 ./configure --disable-install-doc --enable-shared \t\u0026\u0026 make -j\"$(nproc)\" \t\u0026\u0026 make install \t\t\u0026\u0026 apt-get purge -y --auto-remove $buildDeps \t\u0026\u0026 cd / \t\u0026\u0026 rm -r /usr/src/ruby \t\t\u0026\u0026 gem update --system \"$RUBYGEMS_VERSION\"",
"CreatedAt": 1483566705990
},
{
"LayerNum": 12,
"IsEmpty": true,
"Command": "ENV BUNDLER_VERSION=1.13.7",
"CreatedAt": 1483566706367
},
{
"LayerNum": 13,
"LayerContentHash": "2a5f7e9a33c2eaa1168499f77b012c0cad4a313db430c953ae4e36a6daab807b",
"Command": "RUN gem install bundler --version \"$BUNDLER_VERSION\"",
"CreatedAt": 1483566707755
},
{
"LayerNum": 14,
"IsEmpty": true,
"Command": "ENV GEM_HOME=/usr/local/bundle",
"CreatedAt": 1483566708059
},
{
"LayerNum": 15,
"IsEmpty": true,
"Command": "ENV BUNDLE_PATH=/usr/local/bundle BUNDLE_BIN=/usr/local/bundle/bin BUNDLE_SILENCE_ROOT_WARNING=1 BUNDLE_APP_CONFIG=/usr/local/bundle",
"CreatedAt": 1483566708315
},
{
"LayerNum": 16,
"IsEmpty": true,
"Command": "ENV PATH=/usr/local/bundle/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
"CreatedAt": 1483566708567
},
{
"LayerNum": 17,
"LayerContentHash": "c3460377cc14bf15a8c5513180821f8867660765dc466341c15c121b49df20b8",
"Command": "RUN mkdir -p \"$GEM_HOME\" \"$BUNDLE_BIN\" \t\u0026\u0026 chmod 777 \"$GEM_HOME\" \"$BUNDLE_BIN\"",
"CreatedAt": 1483566709447
},
{
"LayerNum": 18,
"IsEmpty": true,
"Command": "CMD [\"irb\"]",
"CreatedAt": 1483566709751
},
{
"LayerNum": 19,
"LayerContentHash": "ee7406cd987dac9f2cf5d2aa06a6be4cc3b5b4ade08508680b9378b930174c1c",
"Command": "RUN apt-get update \u0026\u0026 apt-get install -y nodejs --no-install-recommends \u0026\u0026 rm -rf /var/lib/apt/lists/*",
"CreatedAt": 1483729497149
},
{
"LayerNum": 20,
"LayerContentHash": "ed649c99dc69fe0bce1cad0ffd0794cbaf7cd70caaa4ae8c783d7463bdd79c82",
"Command": "RUN apt-get update \u0026\u0026 apt-get install -y mysql-client postgresql-client sqlite3 --no-install-recommends \u0026\u0026 rm -rf /var/lib/apt/lists/*",
"CreatedAt": 1483729504482
},
{
"LayerNum": 21,
"IsEmpty": true,
"Command": "ENV RAILS_VERSION=5.0.1",
"CreatedAt": 1483729505007
},
{
"LayerNum": 22,
"LayerContentHash": "10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d",
"Command": "RUN gem install rails --version \"$RAILS_VERSION\"",
"CreatedAt": 1483729557372
}
]
},
"InspectInfo": {
"architecture": "amd64",
"container": "9a2376ffdcf4184380a0c876e9278c09874fd84a8e51131b8432b4ff6d65e05e",
"created": "2017-01-06T19:05:57.372008848Z",
"docker_version": "1.12.3",
"history": [
{
"created": "2016-12-13T22:10:59.102721199Z",
"created_by": "/bin/sh -c #(nop) ADD file:1d214d2782eaccc743b8d683ccecf2f87f12a0ecdfbcd6fdf4943ce616f23870 in / "
},
{
"created": "2016-12-13T22:10:59.712034744Z",
"created_by": "/bin/sh -c #(nop) CMD [\"/bin/bash\"]",
"empty_layer": true
},
{
"created": "2016-12-13T23:00:11.852536913Z",
"created_by": "/bin/sh -c apt-get update \u0026\u0026 apt-get install -y --no-install-recommends \t\tca-certificates \t\tcurl \t\twget \t\u0026\u0026 rm -rf /var/lib/apt/lists/*"
},
{
"created": "2016-12-13T23:00:33.748130352Z",
"created_by": "/bin/sh -c apt-get update \u0026\u0026 apt-get install -y --no-install-recommends \t\tbzr \t\tgit \t\tmercurial \t\topenssh-client \t\tsubversion \t\t\t\tprocps \t\u0026\u0026 rm -rf /var/lib/apt/lists/*"
},
{
"created": "2016-12-15T18:59:13.02815109Z",
"created_by": "/bin/sh -c apt-get update \u0026\u0026 apt-get install -y --no-install-recommends \t\tautoconf \t\tautomake \t\tbzip2 \t\tfile \t\tg++ \t\tgcc \t\timagemagick \t\tlibbz2-dev \t\tlibc6-dev \t\tlibcurl4-openssl-dev \t\tlibdb-dev \t\tlibevent-dev \t\tlibffi-dev \t\tlibgdbm-dev \t\tlibgeoip-dev \t\tlibglib2.0-dev \t\tlibjpeg-dev \t\tlibkrb5-dev \t\tliblzma-dev \t\tlibmagickcore-dev \t\tlibmagickwand-dev \t\tlibmysqlclient-dev \t\tlibncurses-dev \t\tlibpng-dev \t\tlibpq-dev \t\tlibreadline-dev \t\tlibsqlite3-dev \t\tlibssl-dev \t\tlibtool \t\tlibwebp-dev \t\tlibxml2-dev \t\tlibxslt-dev \t\tlibyaml-dev \t\tmake \t\tpatch \t\txz-utils \t\tzlib1g-dev \t\u0026\u0026 rm -rf /var/lib/apt/lists/*"
},
{
"created": "2016-12-16T03:30:43.700704853Z",
"created_by": "/bin/sh -c mkdir -p /usr/local/etc \t\u0026\u0026 { \t\techo 'install: --no-document'; \t\techo 'update: --no-document'; \t} \u003e\u003e /usr/local/etc/gemrc"
},
{
"created": "2016-12-16T03:30:44.009782264Z",
"created_by": "/bin/sh -c #(nop) ENV RUBY_MAJOR=2.3",
"empty_layer": true
},
{
"created": "2016-12-16T03:30:44.199887515Z",
"created_by": "/bin/sh -c #(nop) ENV RUBY_VERSION=2.3.3",
"empty_layer": true
},
{
"created": "2017-01-04T21:49:20.999830706Z",
"created_by": "/bin/sh -c #(nop) ENV RUBY_DOWNLOAD_SHA256=1a4fa8c2885734ba37b97ffdb4a19b8fba0e8982606db02d936e65bac07419dc",
"empty_layer": true
},
{
"created": "2017-01-04T21:49:21.31987929Z",
"created_by": "/bin/sh -c #(nop) ENV RUBYGEMS_VERSION=2.6.8",
"empty_layer": true
},
{
"created": "2017-01-04T21:51:45.990117975Z",
"created_by": "/bin/sh -c set -ex \t\t\u0026\u0026 buildDeps=' \t\tbison \t\tlibgdbm-dev \t\truby \t\txz-utils \t' \t\u0026\u0026 apt-get update \t\u0026\u0026 apt-get install -y --no-install-recommends $buildDeps \t\u0026\u0026 rm -rf /var/lib/apt/lists/* \t\t\u0026\u0026 wget -O ruby.tar.xz \"https://cache.ruby-lang.org/pub/ruby/${RUBY_MAJOR%-rc}/ruby-$RUBY_VERSION.tar.xz\" \t\u0026\u0026 echo \"$RUBY_DOWNLOAD_SHA256 *ruby.tar.xz\" | sha256sum -c - \t\t\u0026\u0026 mkdir -p /usr/src/ruby \t\u0026\u0026 tar -xJf ruby.tar.xz -C /usr/src/ruby --strip-components=1 \t\u0026\u0026 rm ruby.tar.xz \t\t\u0026\u0026 cd /usr/src/ruby \t\t\u0026\u0026 { \t\techo '#define ENABLE_PATH_CHECK 0'; \t\techo; \t\tcat file.c; \t} \u003e file.c.new \t\u0026\u0026 mv file.c.new file.c \t\t\u0026\u0026 autoconf \t\u0026\u0026 ./configure --disable-install-doc --enable-shared \t\u0026\u0026 make -j\"$(nproc)\" \t\u0026\u0026 make install \t\t\u0026\u0026 apt-get purge -y --auto-remove $buildDeps \t\u0026\u0026 cd / \t\u0026\u0026 rm -r /usr/src/ruby \t\t\u0026\u0026 gem update --system \"$RUBYGEMS_VERSION\""
},
{
"created": "2017-01-04T21:51:46.367746702Z",
"created_by": "/bin/sh -c #(nop) ENV BUNDLER_VERSION=1.13.7",
"empty_layer": true
},
{
"created": "2017-01-04T21:51:47.755081709Z",
"created_by": "/bin/sh -c gem install bundler --version \"$BUNDLER_VERSION\""
},
{
"created": "2017-01-04T21:51:48.059346175Z",
"created_by": "/bin/sh -c #(nop) ENV GEM_HOME=/usr/local/bundle",
"empty_layer": true
},
{
"created": "2017-01-04T21:51:48.315736309Z",
"created_by": "/bin/sh -c #(nop) ENV BUNDLE_PATH=/usr/local/bundle BUNDLE_BIN=/usr/local/bundle/bin BUNDLE_SILENCE_ROOT_WARNING=1 BUNDLE_APP_CONFIG=/usr/local/bundle",
"empty_layer": true
},
{
"created": "2017-01-04T21:51:48.567797564Z",
"created_by": "/bin/sh -c #(nop) ENV PATH=/usr/local/bundle/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
"empty_layer": true
},
{
"created": "2017-01-04T21:51:49.447907783Z",
"created_by": "/bin/sh -c mkdir -p \"$GEM_HOME\" \"$BUNDLE_BIN\" \t\u0026\u0026 chmod 777 \"$GEM_HOME\" \"$BUNDLE_BIN\""
},
{
"created": "2017-01-04T21:51:49.751764585Z",
"created_by": "/bin/sh -c #(nop) CMD [\"irb\"]",
"empty_layer": true
},
{
"created": "2017-01-06T19:04:57.149262279Z",
"created_by": "/bin/sh -c apt-get update \u0026\u0026 apt-get install -y nodejs --no-install-recommends \u0026\u0026 rm -rf /var/lib/apt/lists/*"
},
{
"created": "2017-01-06T19:05:04.482531966Z",
"created_by": "/bin/sh -c apt-get update \u0026\u0026 apt-get install -y mysql-client postgresql-client sqlite3 --no-install-recommends \u0026\u0026 rm -rf /var/lib/apt/lists/*"
},
{
"created": "2017-01-06T19:05:05.00780109Z",
"created_by": "/bin/sh -c #(nop) ENV RAILS_VERSION=5.0.1",
"empty_layer": true
},
{
"created": "2017-01-06T19:05:57.372008848Z",
"created_by": "/bin/sh -c gem install rails --version \"$RAILS_VERSION\""
}
],
"os": "linux",
"rootfs": {
"type": "layers",
"diff_ids": [
"sha256:b6ca02dfe5e62c58dacb1dec16eb42ed35761c15562485f9da9364bb7c90b9b3",
"sha256:60a0858edcd5aad240966e33389850e4328de4cfb5282977eddda56bffc7f95f",
"sha256:53c779688d06353f7ba4fd7ce1d43ce146ad0278ebead0feea1846383c730024",
"sha256:0a5e2b2ddeaa749d95730bad9be3e3a472ff6f80544da0082a99ba569df34ff3",
"sha256:0abbaea09fe5ffd3a390647936ff184cecd514c7a9ff7c90a900b790a1e1899e",
"sha256:8449699b33dfd82ec80bce25b7b0fede858df3e907b5d1e2b8fb879ccaf1dc1d",
"sha256:2a5f7e9a33c2eaa1168499f77b012c0cad4a313db430c953ae4e36a6daab807b",
"sha256:c3460377cc14bf15a8c5513180821f8867660765dc466341c15c121b49df20b8",
"sha256:ee7406cd987dac9f2cf5d2aa06a6be4cc3b5b4ade08508680b9378b930174c1c",
"sha256:ed649c99dc69fe0bce1cad0ffd0794cbaf7cd70caaa4ae8c783d7463bdd79c82",
"sha256:10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d"
]
},
"config": {
"Cmd": [
"irb"
],
"Env": [
"PATH=/usr/local/bundle/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
"RUBY_MAJOR=2.3",
"RUBY_VERSION=2.3.3",
"RUBY_DOWNLOAD_SHA256=1a4fa8c2885734ba37b97ffdb4a19b8fba0e8982606db02d936e65bac07419dc",
"RUBYGEMS_VERSION=2.6.8",
"BUNDLER_VERSION=1.13.7",
"GEM_HOME=/usr/local/bundle",
"BUNDLE_PATH=/usr/local/bundle",
"BUNDLE_BIN=/usr/local/bundle/bin",
"BUNDLE_SILENCE_ROOT_WARNING=1",
"BUNDLE_APP_CONFIG=/usr/local/bundle",
"RAILS_VERSION=5.0.1"
],
"Hostname": "45f28166fed1",
"Image": "sha256:ed982bb95826ed2370350badb2b3a5759314e4991ced8770138945fda5e41984",
"ArgsEscaped": true
}
}
}
}
},
"VulnerabilityReport": {
"Status": "279 vulnerabilities found!",
"details": [
{
"title": "Debian Security Update for curl (DLA 1498-1)",
"qid": 177125,
"cveids": [
"CVE-2018-14618"
],
"cvssInfo": {
"baseScore": "10.0",
"temporalScore": "7.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 5,
"customerSeverity": 5,
"risk": 50,
"software": [
{
"name": "libcurl3-gnutls:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u12"
},
{
"name": "libcurl4-openssl-dev:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u12"
},
{
"name": "libcurl3:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u12"
},
{
"name": "curl",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u12"
}
],
"category": "Debian",
"firstFound": "1726223192965",
"lastFound": "1726570859883",
"published": 1566210023000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true,
"highDataLoss": true,
"highLateralMovement": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-fr52-4hqw-p27f)",
"qid": 988643,
"cveids": [
"CVE-2016-4658"
],
"cvssInfo": {
"baseScore": "10.0",
"temporalScore": "7.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 5,
"customerSeverity": 5,
"risk": 50,
"software": [
{
"name": "nokogiri",
"version": "1.7.0.1",
"fixVersion": "1.7.1",
"packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860488",
"lastFound": "1726570860488",
"published": 1667826873000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true,
"highDataLoss": true,
"highLateralMovement": true
}
},
{
"title": "Debian Security Update for mercurial (DLA 1414-1)",
"qid": 177178,
"cveids": [
"CVE-2017-9462",
"CVE-2017-17458",
"CVE-2018-1000132",
"CVE-2018-13346",
"CVE-2018-13347",
"CVE-2018-13348"
],
"cvssInfo": {
"baseScore": "10.0",
"temporalScore": "7.8",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 5,
"customerSeverity": 5,
"risk": 50,
"software": [
{
"name": "mercurial-common",
"version": "3.1.2-2+deb8u3",
"fixVersion": "3.1.2-2+deb8u5"
},
{
"name": "mercurial",
"version": "3.1.2-2+deb8u3",
"fixVersion": "3.1.2-2+deb8u5"
}
],
"category": "Debian",
"firstFound": "1726223192967",
"lastFound": "1726570859885",
"published": 1566210023000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true,
"highDataLoss": true,
"highLateralMovement": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for apt (DLA 1637-1)",
"qid": 176713,
"cveids": [
"CVE-2019-3462"
],
"cvssInfo": {
"baseScore": "9.3",
"temporalScore": "6.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.1",
"temporalScore": "7.1"
},
"severity": 5,
"customerSeverity": 5,
"risk": 50,
"software": [
{
"name": "apt",
"version": "1.0.9.8.4",
"fixVersion": "1.0.9.8.5"
},
{
"name": "libapt-pkg4.12:amd64",
"version": "1.0.9.8.4",
"fixVersion": "1.0.9.8.5"
}
],
"category": "Debian",
"firstFound": "1726223192949",
"lastFound": "1726570859868",
"published": 1553546619000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"highDataLoss": true,
"highLateralMovement": true
}
},
{
"title": "Debian Security Update for mercurial (DLA 1414-2)",
"qid": 177255,
"cveids": [
"CVE-2017-17458"
],
"cvssInfo": {
"baseScore": "10.0",
"temporalScore": "7.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 5,
"customerSeverity": 5,
"risk": 50,
"software": [
{
"name": "mercurial-common",
"version": "3.1.2-2+deb8u3",
"fixVersion": "3.1.2-2+deb8u6"
},
{
"name": "mercurial",
"version": "3.1.2-2+deb8u3",
"fixVersion": "3.1.2-2+deb8u6"
}
],
"category": "Debian",
"firstFound": "1726223192969",
"lastFound": "1726570859887",
"published": 1566210024000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true,
"highDataLoss": true,
"highLateralMovement": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for actionview (GHSA-m63j-wh5w-c252)",
"qid": 988313,
"cveids": [
"CVE-2019-5419"
],
"cvssInfo": {
"baseScore": "7.8",
"temporalScore": "6.1",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 5,
"customerSeverity": 5,
"risk": 50,
"software": [
{
"name": "actionview",
"version": "5.0.1",
"fixVersion": "5.0.7.2",
"packagePath": "usr/local/bundle/specifications/actionview-5.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860239",
"lastFound": "1726570860239",
"published": 1666790957000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for activesupport (GHSA-2p68-f74v-9wc6)",
"qid": 988041,
"cveids": [
"CVE-2020-8165"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 5,
"customerSeverity": 5,
"risk": 50,
"software": [
{
"name": "activesupport",
"version": "5.0.1",
"fixVersion": "5.2.4.3",
"packagePath": "usr/local/bundle/specifications/activesupport-5.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860124",
"lastFound": "1726570860124",
"published": 1665668563000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for libssh2 (DLA 1730-1)",
"qid": 176757,
"cveids": [
"CVE-2019-3855",
"CVE-2019-3856",
"CVE-2019-3857",
"CVE-2019-3858",
"CVE-2019-3859",
"CVE-2019-3860",
"CVE-2019-3861",
"CVE-2019-3862",
"CVE-2019-3863"
],
"cvssInfo": {
"baseScore": "9.3",
"temporalScore": "6.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.1",
"temporalScore": "7.9"
},
"severity": 5,
"customerSeverity": 5,
"risk": 50,
"software": [
{
"name": "libssh2-1:amd64",
"version": "1.4.3-4.1+deb8u1",
"fixVersion": "1.4.3-4.1+deb8u2"
}
],
"category": "Debian",
"firstFound": "1726223192952",
"lastFound": "1726570859871",
"published": 1554375138000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"highDataLoss": true,
"highLateralMovement": true
}
},
{
"title": "Debian Security Update for git (DLA 2059-1)",
"qid": 177613,
"cveids": [
"CVE-2019-1348",
"CVE-2019-1349",
"CVE-2019-1352",
"CVE-2019-1353",
"CVE-2019-1387"
],
"cvssInfo": {
"baseScore": "9.3",
"temporalScore": "6.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 5,
"customerSeverity": 5,
"risk": 50,
"software": [
{
"name": "git-man",
"version": "1:2.1.4-2.1+deb8u2",
"fixVersion": "1:2.1.4-2.1+deb8u8"
},
{
"name": "git",
"version": "1:2.1.4-2.1+deb8u2",
"fixVersion": "1:2.1.4-2.1+deb8u8"
}
],
"category": "Debian",
"firstFound": "1726223192978",
"lastFound": "1726570859896",
"published": 1580987657000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"highDataLoss": true,
"highLateralMovement": true
}
},
{
"title": "Debian Security Update for inetutils (DLA 2176-1)",
"qid": 177817,
"cveids": [
"CVE-2020-10188"
],
"cvssInfo": {
"baseScore": "10.0",
"temporalScore": "7.8",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 5,
"customerSeverity": 5,
"risk": 50,
"software": [
{
"name": "inetutils-ping",
"version": "2:1.9.2.39.3a460-3",
"fixVersion": "2:1.9.2.39.3a460-3+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192981",
"lastFound": "1726570859899",
"published": 1592829964000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true,
"highDataLoss": true,
"highLateralMovement": true,
"publicExploit": true
}
},
{
"title": "EOL/Obsolete Operating System: Debian 8.x Detected",
"qid": 650049,
"cvssInfo": {
"baseScore": "10.0",
"temporalScore": "8.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.4",
"temporalScore": "8.6"
},
"severity": 5,
"customerSeverity": 5,
"risk": 50,
"category": "Security Policy",
"firstFound": "1726223192985",
"lastFound": "1726570859903",
"published": 1622639074000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true,
"highDataLoss": true,
"highLateralMovement": true,
"noPatch": true
}
},
{
"title": "Debian Security Update for libssh2 (DLA 1730-3)",
"qid": 177064,
"cveids": [
"CVE-2019-3859",
"CVE-2019-13115",
"CVE-2019-3855"
],
"cvssInfo": {
"baseScore": "9.3",
"temporalScore": "7.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.1",
"temporalScore": "8.2"
},
"severity": 5,
"customerSeverity": 5,
"risk": 50,
"software": [
{
"name": "libssh2-1:amd64",
"version": "1.4.3-4.1+deb8u1",
"fixVersion": "1.4.3-4.1+deb8u4"
}
],
"category": "Debian",
"firstFound": "1726223192962",
"lastFound": "1726570859881",
"published": 1564398029000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"highDataLoss": true,
"highLateralMovement": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for apt (DLA 1637-1)",
"qid": 177380,
"cveids": [
"CVE-2019-3462"
],
"cvssInfo": {
"baseScore": "9.3",
"temporalScore": "6.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.1",
"temporalScore": "7.1"
},
"severity": 5,
"customerSeverity": 5,
"risk": 50,
"software": [
{
"name": "apt",
"version": "1.0.9.8.4",
"fixVersion": "1.0.9.8.5"
},
{
"name": "libapt-pkg4.12:amd64",
"version": "1.0.9.8.4",
"fixVersion": "1.0.9.8.5"
}
],
"category": "Debian",
"firstFound": "1726223192973",
"lastFound": "1726570859891",
"published": 1571137810000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"highDataLoss": true,
"highLateralMovement": true
}
},
{
"title": "Debian Security Update for systemd (DLA 1580-1)",
"qid": 176823,
"cveids": [
"CVE-2018-1049",
"CVE-2018-15686",
"CVE-2018-15688"
],
"cvssInfo": {
"baseScore": "7.2",
"temporalScore": "5.6",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.9"
},
"severity": 5,
"customerSeverity": 5,
"risk": 50,
"software": [
{
"name": "udev",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u8"
},
{
"name": "libsystemd0:amd64",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u8"
},
{
"name": "systemd-sysv",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u8"
},
{
"name": "libudev1:amd64",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u8"
},
{
"name": "systemd",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u8"
}
],
"category": "Debian",
"firstFound": "1726223192955",
"lastFound": "1726570859874",
"published": 1554890301000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true,
"highDataLoss": true,
"highLateralMovement": true,
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-6qvp-r6r3-9p7h)",
"qid": 988211,
"cveids": [
"CVE-2018-14404"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "nokogiri",
"version": "1.7.0.1",
"fixVersion": "1.8.5",
"packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860236",
"lastFound": "1726570860236",
"published": 1666790954000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for rack (GHSA-5f9h-9pjv-v6j7)",
"qid": 988344,
"cveids": [
"CVE-2020-8161"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.6",
"temporalScore": "7.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "rack",
"version": "2.0.1",
"fixVersion": "2.1.3",
"packagePath": "usr/local/bundle/specifications/rack-2.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860316",
"lastFound": "1726570860316",
"published": 1666790957000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for rails-html-sanitizer (GHSA-5x79-w82f-gw8w)",
"qid": 991339,
"cveids": [
"CVE-2022-23517"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "rails-html-sanitizer",
"version": "1.0.3",
"fixVersion": "1.4.4",
"packagePath": "usr/local/bundle/specifications/rails-html-sanitizer-1.0.3.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860627",
"lastFound": "1726570860627",
"published": 1672837009000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for mysql-5.5 (DSA 4091-1)",
"qid": 176271,
"cveids": [
"CVE-2018-2562",
"CVE-2018-2622",
"CVE-2018-2640",
"CVE-2018-2665",
"CVE-2018-2668"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.1",
"temporalScore": "6.2"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "libmysqlclient18:amd64",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.59-0+deb8u1"
},
{
"name": "mysql-client",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.59-0+deb8u1"
},
{
"name": "mysql-client-5.5",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.59-0+deb8u1"
},
{
"name": "libmysqlclient-dev",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.59-0+deb8u1"
},
{
"name": "mysql-common",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.59-0+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192939",
"lastFound": "1726570859860",
"published": 1516876340000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for actionview (GHSA-86g5-2wh3-gc9j)",
"qid": 987995,
"cveids": [
"CVE-2019-5418"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "actionview",
"version": "5.0.1",
"fixVersion": "5.0.7.2",
"packagePath": "usr/local/bundle/specifications/actionview-5.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860008",
"lastFound": "1726570860008",
"published": 1665668559000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for libbsd (DLA 2052-1)",
"qid": 177560,
"cveids": [
"CVE-2016-2090"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "libbsd0:amd64",
"version": "0.7.0-2",
"fixVersion": "0.7.0-2+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192977",
"lastFound": "1726570859895",
"published": 1578572917000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for imagemagick (DLA 2049-1)",
"qid": 177558,
"cveids": [
"CVE-2019-19948",
"CVE-2019-19949"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "libmagickcore-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "libmagickcore-6-arch-config:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "libmagickcore-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "libmagickcore-6.q16-2-extra:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "libmagickwand-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "imagemagick-6.q16",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "imagemagick",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "libmagickwand-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "libmagickwand-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "imagemagick-common",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "libmagickcore-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "libmagickwand-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "libmagickcore-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
}
],
"category": "Debian",
"firstFound": "1726223192976",
"lastFound": "1726570859894",
"published": 1578572917000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for rack (GHSA-j6w9-fv6q-3q52)",
"qid": 988024,
"cveids": [
"CVE-2020-8184"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "rack",
"version": "2.0.1",
"fixVersion": "2.1.4",
"packagePath": "usr/local/bundle/specifications/rack-2.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860091",
"lastFound": "1726570860091",
"published": 1665668561000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for rdoc (GHSA-ggxm-pgc9-g7fp)",
"qid": 988400,
"cveids": [
"CVE-2021-31799"
],
"cvssInfo": {
"baseScore": "4.4",
"temporalScore": "3.3",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "7.0",
"temporalScore": "6.1"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "rdoc",
"version": "4.2.1",
"fixVersion": "6.3.1",
"packagePath": "usr/local/lib/ruby/gems/2.3.0/specifications/default/rdoc-4.2.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860463",
"lastFound": "1726570860463",
"published": 1666790958000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Rubygems (Rubygems) Security Update for actionpack (GHSA-hjg4-8q5f-x6fm)",
"qid": 988055,
"cveids": [
"CVE-2021-22885"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "actionpack",
"version": "5.0.1",
"fixVersion": "5.2.4.6",
"packagePath": "usr/local/bundle/specifications/actionpack-5.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860181",
"lastFound": "1726570860181",
"published": 1665668565000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-cr5j-953j-xw5p)",
"qid": 988040,
"cveids": [
"CVE-2019-5477"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "nokogiri",
"version": "1.7.0.1",
"fixVersion": "1.10.4",
"packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860121",
"lastFound": "1726570860121",
"published": 1665668563000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for actionpack (GHSA-8727-m6gj-mc37)",
"qid": 988386,
"cveids": [
"CVE-2020-8164"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "actionpack",
"version": "5.0.1",
"fixVersion": "5.2.4.3",
"packagePath": "usr/local/bundle/specifications/actionpack-5.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860446",
"lastFound": "1726570860446",
"published": 1666790958000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-gx8x-g87m-h5q6)",
"qid": 988390,
"cveids": [
"CVE-2022-24839"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "nokogiri",
"version": "1.7.0.1",
"fixVersion": "1.13.4",
"packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860447",
"lastFound": "1726570860447",
"published": 1666790958000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-7553-jr98-vx47)",
"qid": 988210,
"cveids": [
"CVE-2020-7595"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "nokogiri",
"version": "1.7.0.1",
"fixVersion": "1.10.8",
"packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860214",
"lastFound": "1726570860214",
"published": 1666790954000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Ruby (rubygems) Security Update for nokogiri (GHSA-xh29-r2w5-wx8m)",
"qid": 987466,
"cveids": [
"CVE-2022-29181"
],
"cvssInfo": {
"baseScore": "6.4",
"temporalScore": "5.0",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.2",
"temporalScore": "7.4"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "nokogiri",
"version": "1.7.0.1",
"fixVersion": "1.13.6",
"packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570859908",
"lastFound": "1726570859908",
"published": 1663677763000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Ruby (rubygems) Security Update for nokogiri (GHSA-crjr-9rc5-ghw8)",
"qid": 987471,
"cveids": [
"CVE-2022-24836"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "nokogiri",
"version": "1.7.0.1",
"fixVersion": "1.13.4",
"packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570859952",
"lastFound": "1726570859952",
"published": 1663677763000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for rubygems-update (GHSA-fr32-gr5c-xq5c)",
"qid": 987992,
"cveids": [
"CVE-2019-8321"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "rubygems-update",
"version": "2.6.8",
"fixVersion": "2.7.9",
"packagePath": "usr/local/lib/ruby/gems/2.3.0/specifications/rubygems-update-2.6.8.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570859974",
"lastFound": "1726570859974",
"published": 1665668559000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for json (GHSA-jphg-qwrw-7w9g)",
"qid": 987999,
"cveids": [
"CVE-2020-10663"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "json",
"version": "1.8.3",
"fixVersion": "2.3.0",
"packagePath": "usr/local/lib/ruby/gems/2.3.0/specifications/default/json-1.8.3.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860049",
"lastFound": "1726570860049",
"published": 1665668559000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for rubygems-update (GHSA-4wm8-fjv7-j774)",
"qid": 988054,
"cveids": [
"CVE-2019-8325"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "rubygems-update",
"version": "2.6.8",
"fixVersion": "2.7.9",
"packagePath": "usr/local/lib/ruby/gems/2.3.0/specifications/rubygems-update-2.6.8.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860179",
"lastFound": "1726570860179",
"published": 1665668565000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for rack (GHSA-wq4h-7r42-5hrr)",
"qid": 988319,
"cveids": [
"CVE-2022-30123"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "10.0",
"temporalScore": "8.7"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "rack",
"version": "2.0.1",
"fixVersion": "2.0.9.1",
"packagePath": "usr/local/bundle/specifications/rack-2.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860269",
"lastFound": "1726570860269",
"published": 1666790957000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for harfbuzz (DLA 2040-1)",
"qid": 177889,
"cveids": [
"CVE-2015-8947"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.6",
"temporalScore": "6.6"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "libharfbuzz0b:amd64",
"version": "0.9.35-2",
"fixVersion": "0.9.35-2+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192984",
"lastFound": "1726570859902",
"published": 1607521476000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for actionpack (GHSA-7wjx-3g7j-8584)",
"qid": 988038,
"cveids": [
"CVE-2021-22904"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "actionpack",
"version": "5.0.1",
"fixVersion": "5.2.4.6",
"packagePath": "usr/local/bundle/specifications/actionpack-5.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860117",
"lastFound": "1726570860117",
"published": 1665668563000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for websocket-extensions (GHSA-g6wq-qcwm-j5g2)",
"qid": 987991,
"cveids": [
"CVE-2020-7663"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "websocket-extensions",
"version": "0.1.2",
"fixVersion": "0.1.5",
"packagePath": "usr/local/bundle/specifications/websocket-extensions-0.1.2.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570859972",
"lastFound": "1726570859972",
"published": 1665668559000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for openssh (DLA 1500-1)",
"qid": 177126,
"cveids": [
"CVE-2015-5352",
"CVE-2015-5600",
"CVE-2015-6563",
"CVE-2015-6564",
"CVE-2016-1908",
"CVE-2016-3115",
"CVE-2016-6515",
"CVE-2016-10009",
"CVE-2016-10011",
"CVE-2016-10012",
"CVE-2016-10708",
"CVE-2017-15906"
],
"cvssInfo": {
"baseScore": "8.5",
"temporalScore": "6.6",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "openssh-client",
"version": "1:6.7p1-5+deb8u3",
"fixVersion": "1:6.7p1-5+deb8u6"
}
],
"category": "Debian",
"firstFound": "1726223192966",
"lastFound": "1726570859883",
"published": 1566210023000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for i18n (GHSA-34hf-g744-jw64)",
"qid": 988381,
"cveids": [
"CVE-2014-10077"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "i18n",
"version": "0.7.0",
"fixVersion": "0.8.0",
"packagePath": "usr/local/bundle/specifications/i18n-0.7.0.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860386",
"lastFound": "1726570860386",
"published": 1666790958000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for activejob (GHSA-q2qw-rmrh-vv42)",
"qid": 989204,
"cveids": [
"CVE-2018-16476"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "activejob",
"version": "5.0.1",
"fixVersion": "5.0.7.1",
"packagePath": "usr/local/bundle/specifications/activejob-5.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860570",
"lastFound": "1726570860570",
"published": 1668088074000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for rubygems-update (GHSA-mh37-8c3g-3fgc)",
"qid": 988027,
"cveids": [
"CVE-2019-8322"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "rubygems-update",
"version": "2.6.8",
"fixVersion": "2.7.9",
"packagePath": "usr/local/lib/ruby/gems/2.3.0/specifications/rubygems-update-2.6.8.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860094",
"lastFound": "1726570860094",
"published": 1665668562000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for imagemagick (DLA 2049-1)",
"qid": 177896,
"cveids": [
"CVE-2019-19948",
"CVE-2019-19949"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "libmagickcore-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "libmagickcore-6-arch-config:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "libmagickcore-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "libmagickcore-6.q16-2-extra:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "libmagickwand-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "imagemagick-6.q16",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "imagemagick",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "libmagickwand-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "libmagickwand-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "imagemagick-common",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "libmagickcore-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "libmagickwand-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
},
{
"name": "libmagickcore-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u19"
}
],
"category": "Debian",
"firstFound": "1726223192984",
"lastFound": "1726570859902",
"published": 1592829965000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for freetype (DLA 1887-1)",
"qid": 177099,
"cveids": [
"CVE-2015-9290"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "libfreetype6:amd64",
"version": "2.5.2-3+deb8u1",
"fixVersion": "2.5.2-3+deb8u3"
},
{
"name": "libfreetype6-dev",
"version": "2.5.2-3+deb8u1",
"fixVersion": "2.5.2-3+deb8u3"
}
],
"category": "Debian",
"firstFound": "1726223192964",
"lastFound": "1726570859882",
"published": 1567076424000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for curl (DLA 1917-1)",
"qid": 177315,
"cveids": [
"CVE-2019-5482"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "libcurl3-gnutls:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u16"
},
{
"name": "libcurl4-openssl-dev:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u16"
},
{
"name": "libcurl3:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u16"
},
{
"name": "curl",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u16"
}
],
"category": "Debian",
"firstFound": "1726223192971",
"lastFound": "1726570859888",
"published": 1569235400000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for libvpx (DSA 4132-1)",
"qid": 176314,
"cveids": [
"CVE-2017-13194"
],
"cvssInfo": {
"baseScore": "7.8",
"temporalScore": "5.8",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "libvpx1:amd64",
"version": "1.3.0-3",
"fixVersion": "1.3.0-3+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192940",
"lastFound": "1726570859861",
"published": 1520424687000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-pf6m-fxpq-fg8v)",
"qid": 988662,
"cveids": [
"CVE-2017-5029"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.0",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.7"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "nokogiri",
"version": "1.7.0.1",
"fixVersion": "1.7.2",
"packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860504",
"lastFound": "1726570860504",
"published": 1667826874000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-2rr5-8q37-2w7h)",
"qid": 988050,
"cveids": [
"CVE-2021-41098"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "nokogiri",
"version": "1.7.0.1",
"fixVersion": "1.12.5",
"packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860129",
"lastFound": "1726570860129",
"published": 1665668564000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for bzip2 (DLA 1833-1)",
"qid": 177020,
"cveids": [
"CVE-2016-3189",
"CVE-2019-12900"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "libbz2-dev:amd64",
"version": "1.0.6-7+b3",
"fixVersion": "1.0.6-7+deb8u1"
},
{
"name": "libbz2-1.0:amd64",
"version": "1.0.6-7+b3",
"fixVersion": "1.0.6-7+deb8u1"
},
{
"name": "bzip2",
"version": "1.0.6-7+b3",
"fixVersion": "1.0.6-7+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192961",
"lastFound": "1726570859879",
"published": 1563274190000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for perl (DLA 1601-1)",
"qid": 176849,
"cveids": [
"CVE-2018-18311"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "perl",
"version": "5.20.2-3+deb8u6",
"fixVersion": "5.20.2-3+deb8u12"
},
{
"name": "perl-modules",
"version": "5.20.2-3+deb8u6",
"fixVersion": "5.20.2-3+deb8u12"
},
{
"name": "perl-base",
"version": "5.20.2-3+deb8u6",
"fixVersion": "5.20.2-3+deb8u12"
}
],
"category": "Debian",
"firstFound": "1726223192957",
"lastFound": "1726570859875",
"published": 1554890302000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for sqlite3 (DLA 1633-1)",
"qid": 176711,
"cveids": [
"CVE-2017-2518",
"CVE-2017-2519",
"CVE-2017-2520",
"CVE-2017-10989",
"CVE-2018-8740"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "libsqlite3-dev:amd64",
"version": "3.8.7.1-1+deb8u2",
"fixVersion": "3.8.7.1-1+deb8u4"
},
{
"name": "libsqlite3-0:amd64",
"version": "3.8.7.1-1+deb8u2",
"fixVersion": "3.8.7.1-1+deb8u4"
},
{
"name": "sqlite3",
"version": "3.8.7.1-1+deb8u2",
"fixVersion": "3.8.7.1-1+deb8u4"
}
],
"category": "Debian",
"firstFound": "1726223192949",
"lastFound": "1726570859868",
"published": 1553546619000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for activerecord (GHSA-8hc4-xxm3-5ppp)",
"qid": 988337,
"cveids": [
"CVE-2021-22880"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "activerecord",
"version": "5.0.1",
"fixVersion": "5.2.4.5",
"packagePath": "usr/local/bundle/specifications/activerecord-5.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860301",
"lastFound": "1726570860301",
"published": 1666790957000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for glib2.0 (DLA 1826-1)",
"qid": 177012,
"cveids": [
"CVE-2019-12450"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "libglib2.0-dev",
"version": "2.42.1-1+b1",
"fixVersion": "2.42.1-1+deb8u1"
},
{
"name": "libglib2.0-data",
"version": "2.42.1-1",
"fixVersion": "2.42.1-1+deb8u1"
},
{
"name": "libglib2.0-bin",
"version": "2.42.1-1+b1",
"fixVersion": "2.42.1-1+deb8u1"
},
{
"name": "libglib2.0-0:amd64",
"version": "2.42.1-1+b1",
"fixVersion": "2.42.1-1+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192961",
"lastFound": "1726570859879",
"published": 1563274189000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for libxslt (DLA 1860-1)",
"qid": 177060,
"cveids": [
"CVE-2016-4609",
"CVE-2016-4610",
"CVE-2019-13117",
"CVE-2019-13118"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "libxslt1-dev:amd64",
"version": "1.1.28-2+deb8u2",
"fixVersion": "1.1.28-2+deb8u5"
},
{
"name": "libxslt1.1:amd64",
"version": "1.1.28-2+deb8u2",
"fixVersion": "1.1.28-2+deb8u5"
}
],
"category": "Debian",
"firstFound": "1726223192962",
"lastFound": "1726570859880",
"published": 1564398028000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for curl (DLA 1672-1)",
"qid": 176667,
"cveids": [
"CVE-2018-16890",
"CVE-2019-3822",
"CVE-2019-3823"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "libcurl3-gnutls:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u14"
},
{
"name": "libcurl4-openssl-dev:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u14"
},
{
"name": "libcurl3:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u14"
},
{
"name": "curl",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u14"
}
],
"category": "Debian",
"firstFound": "1726223192947",
"lastFound": "1726570859866",
"published": 1553546619000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for file (DLA 1969-1)",
"qid": 177425,
"cveids": [
"CVE-2019-18218"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.8",
"temporalScore": "7.0"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "libmagic1:amd64",
"version": "1:5.22+15-2+deb8u2",
"fixVersion": "1:5.22+15-2+deb8u6"
},
{
"name": "file",
"version": "1:5.22+15-2+deb8u2",
"fixVersion": "1:5.22+15-2+deb8u6"
}
],
"category": "Debian",
"firstFound": "1726223192974",
"lastFound": "1726570859892",
"published": 1572345060000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for openssh (DLA 1500-2)",
"qid": 177130,
"cveids": [
"CVE-2016-1908"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "openssh-client",
"version": "1:6.7p1-5+deb8u3",
"fixVersion": "1:6.7p1-5+deb8u7"
}
],
"category": "Debian",
"firstFound": "1726223192966",
"lastFound": "1726570859884",
"published": 1566210023000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for imagemagick (DLA 1785-1)",
"qid": 176900,
"cveids": [
"CVE-2017-9500",
"CVE-2017-11446",
"CVE-2017-11523",
"CVE-2017-11537",
"CVE-2017-12140",
"CVE-2017-12430",
"CVE-2017-12432",
"CVE-2017-12435",
"CVE-2017-12563",
"CVE-2017-12587",
"CVE-2017-12643",
"CVE-2017-12670",
"CVE-2017-12674",
"CVE-2017-12691",
"CVE-2017-12692",
"CVE-2017-12693",
"CVE-2017-12875",
"CVE-2017-13133",
"CVE-2017-13142",
"CVE-2017-13145",
"CVE-2017-13658",
"CVE-2017-13768",
"CVE-2017-14060",
"CVE-2017-14172",
"CVE-2017-14173",
"CVE-2017-14174",
"CVE-2017-14175",
"CVE-2017-14249",
"CVE-2017-14341",
"CVE-2017-14400",
"CVE-2017-14505",
"CVE-2017-14532",
"CVE-2017-14624",
"CVE-2017-14625",
"CVE-2017-14626",
"CVE-2017-14739",
"CVE-2017-14741",
"CVE-2017-15015",
"CVE-2017-15017",
"CVE-2017-15281",
"CVE-2017-17682",
"CVE-2017-17914",
"CVE-2017-18271",
"CVE-2017-18273",
"CVE-2017-1000445",
"CVE-2017-1000476",
"CVE-2019-9956",
"CVE-2019-10650",
"CVE-2019-11597",
"CVE-2019-11598"
],
"cvssInfo": {
"baseScore": "7.8",
"temporalScore": "6.1",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "libmagickcore-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u16"
},
{
"name": "libmagickcore-6-arch-config:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u16"
},
{
"name": "libmagickcore-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u16"
},
{
"name": "libmagickcore-6.q16-2-extra:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u16"
},
{
"name": "libmagickwand-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u16"
},
{
"name": "imagemagick-6.q16",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u16"
},
{
"name": "imagemagick",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u16"
},
{
"name": "libmagickwand-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u16"
},
{
"name": "libmagickwand-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u16"
},
{
"name": "imagemagick-common",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u16"
},
{
"name": "libmagickcore-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u16"
},
{
"name": "libmagickwand-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u16"
},
{
"name": "libmagickcore-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u16"
}
],
"category": "Debian",
"firstFound": "1726223192959",
"lastFound": "1726570859877",
"published": 1558005825000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-8c56-cpmw-89x7)",
"qid": 988663,
"cveids": [
"CVE-2017-9050"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "nokogiri",
"version": "1.7.0.1",
"fixVersion": "1.8.1",
"packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860562",
"lastFound": "1726570860562",
"published": 1667826874000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for glib2.0 (DLA 1866-1)",
"qid": 177079,
"cveids": [
"CVE-2018-16428",
"CVE-2018-16429",
"CVE-2019-13012",
"CVE-2019-12450"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "libglib2.0-dev",
"version": "2.42.1-1+b1",
"fixVersion": "2.42.1-1+deb8u2"
},
{
"name": "libglib2.0-data",
"version": "2.42.1-1",
"fixVersion": "2.42.1-1+deb8u2"
},
{
"name": "libglib2.0-bin",
"version": "2.42.1-1+b1",
"fixVersion": "2.42.1-1+deb8u2"
},
{
"name": "libglib2.0-0:amd64",
"version": "2.42.1-1+b1",
"fixVersion": "2.42.1-1+deb8u2"
}
],
"category": "Debian",
"firstFound": "1726223192963",
"lastFound": "1726570859881",
"published": 1566210022000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for activerecord (GHSA-3hhc-qp5v-9p2j)",
"qid": 988314,
"cveids": [
"CVE-2022-32224"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "activerecord",
"version": "5.0.1",
"fixVersion": "5.2.8.1",
"packagePath": "usr/local/bundle/specifications/activerecord-5.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860252",
"lastFound": "1726570860252",
"published": 1666790957000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for libidn (DLA 1447-1)",
"qid": 177254,
"cveids": [
"CVE-2017-14062"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "libidn11:amd64",
"version": "1.29-1+deb8u2",
"fixVersion": "1.29-1+deb8u3"
}
],
"category": "Debian",
"firstFound": "1726223192969",
"lastFound": "1726570859887",
"published": 1566210024000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for curl (DLA 1568-1)",
"qid": 176814,
"cveids": [
"CVE-2016-7141",
"CVE-2016-7167",
"CVE-2016-9586",
"CVE-2018-16839",
"CVE-2018-16842",
"CVE-2016-5420"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "libcurl3-gnutls:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u13"
},
{
"name": "libcurl4-openssl-dev:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u13"
},
{
"name": "libcurl3:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u13"
},
{
"name": "curl",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u13"
}
],
"category": "Debian",
"firstFound": "1726223192955",
"lastFound": "1726570859873",
"published": 1554890301000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-fq42-c5rg-92c2)",
"qid": 988008,
"cveids": [
"CVE-2021-30560",
"CVE-2022-23308"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.0",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.7"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "nokogiri",
"version": "1.7.0.1",
"fixVersion": "1.13.2",
"packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860051",
"lastFound": "1726570860051",
"published": 1665668560000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for libxslt (DLA 1756-1)",
"qid": 176862,
"cveids": [
"CVE-2019-11068"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "libxslt1-dev:amd64",
"version": "1.1.28-2+deb8u2",
"fixVersion": "1.1.28-2+deb8u4"
},
{
"name": "libxslt1.1:amd64",
"version": "1.1.28-2+deb8u2",
"fixVersion": "1.1.28-2+deb8u4"
}
],
"category": "Debian",
"firstFound": "1726223192957",
"lastFound": "1726570859876",
"published": 1556190374000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-cgx6-hpwq-fhv5)",
"qid": 988037,
"cveids": [
"CVE-2022-29824"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.5",
"temporalScore": "5.9"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "nokogiri",
"version": "1.7.0.1",
"fixVersion": "1.13.5",
"packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860114",
"lastFound": "1726570860114",
"published": 1665668563000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for actionpack (GHSA-wh98-p28r-vrc9)",
"qid": 988036,
"cveids": [
"CVE-2022-23633"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.2",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.9",
"temporalScore": "5.2"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "actionpack",
"version": "5.0.1",
"fixVersion": "5.2.6.2",
"packagePath": "usr/local/bundle/specifications/actionpack-5.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860111",
"lastFound": "1726570860111",
"published": 1665668563000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Rubygems (Rubygems) Security Update for loofah (GHSA-486f-hjj9-9vhh)",
"qid": 990944,
"cveids": [
"CVE-2022-23514"
],
"cvssInfo": {
"baseScore": "5.4",
"temporalScore": "4.0",
"accessVector": "Adjacent Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "loofah",
"version": "2.0.3",
"fixVersion": "2.19.1",
"packagePath": "usr/local/bundle/specifications/loofah-2.0.3.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860583",
"lastFound": "1726570860583",
"published": 1672923995000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"highLateralMovement": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for rubygems-update (GHSA-76wm-422q-92mq)",
"qid": 988339,
"cveids": [
"CVE-2019-8324"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.0",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.7"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "rubygems-update",
"version": "2.6.8",
"fixVersion": "2.7.9",
"packagePath": "usr/local/lib/ruby/gems/2.3.0/specifications/rubygems-update-2.6.8.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860314",
"lastFound": "1726570860314",
"published": 1666790957000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for libvpx (DLA 2136-1)",
"qid": 177684,
"cveids": [
"CVE-2020-0034"
],
"cvssInfo": {
"baseScore": "7.8",
"temporalScore": "5.8",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "libvpx1:amd64",
"version": "1.3.0-3",
"fixVersion": "1.3.0-3+deb8u3"
}
],
"category": "Debian",
"firstFound": "1726223192979",
"lastFound": "1726570859897",
"published": 1584442208000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"highDataLoss": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for rubygems-update (GHSA-3h4r-pjv6-cph9)",
"qid": 988049,
"cveids": [
"CVE-2019-8323"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "rubygems-update",
"version": "2.6.8",
"fixVersion": "2.7.9",
"packagePath": "usr/local/lib/ruby/gems/2.3.0/specifications/rubygems-update-2.6.8.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860126",
"lastFound": "1726570860126",
"published": 1665668564000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for zlib (DLA 2085-1)",
"qid": 177622,
"cveids": [
"CVE-2016-9840",
"CVE-2016-9841",
"CVE-2016-9842",
"CVE-2016-9843"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "zlib1g-dev:amd64",
"version": "1:1.2.8.dfsg-2+b1",
"fixVersion": "1:1.2.8.dfsg-2+deb8u1"
},
{
"name": "zlib1g:amd64",
"version": "1:1.2.8.dfsg-2+b1",
"fixVersion": "1:1.2.8.dfsg-2+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192979",
"lastFound": "1726570859897",
"published": 1580987657000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Ruby (rubygems) Security Update for tzinfo (GHSA-5cm2-9h8c-rvfx)",
"qid": 987467,
"cveids": [
"CVE-2022-31163"
],
"cvssInfo": {
"baseScore": "5.4",
"temporalScore": "4.3",
"accessVector": "Adjacent Network"
},
"cvss3Info": {
"baseScore": "8.1",
"temporalScore": "7.3"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "tzinfo",
"version": "1.2.2",
"fixVersion": "1.2.10",
"packagePath": "usr/local/bundle/specifications/tzinfo-1.2.2.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570859910",
"lastFound": "1726570859910",
"published": 1663677763000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"highLateralMovement": true,
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for sprockets (GHSA-pr3h-jjhj-573x)",
"qid": 988563,
"cveids": [
"CVE-2018-3760"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "sprockets",
"version": "3.7.1",
"fixVersion": "3.7.2",
"packagePath": "usr/local/bundle/specifications/sprockets-3.7.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860484",
"lastFound": "1726570860484",
"published": 1667826869000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for libgd2 (DLA 1651-1)",
"qid": 176725,
"cveids": [
"CVE-2018-5711",
"CVE-2018-1000222",
"CVE-2019-6977",
"CVE-2019-6978"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "libgd3:amd64",
"version": "2.1.0-5+deb8u7",
"fixVersion": "2.1.0-5+deb8u12"
}
],
"category": "Debian",
"firstFound": "1726223192951",
"lastFound": "1726570859869",
"published": 1553546619000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-v6gp-9mmm-c6p5)",
"qid": 988328,
"cveids": [
"CVE-2018-25032"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 4,
"customerSeverity": 4,
"risk": 40,
"software": [
{
"name": "nokogiri",
"version": "1.7.0.1",
"fixVersion": "1.13.4",
"packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860283",
"lastFound": "1726570860283",
"published": 1666790957000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for patch (DLA 1856-1)",
"qid": 177056,
"cveids": [
"CVE-2019-13636"
],
"cvssInfo": {
"baseScore": "5.8",
"temporalScore": "4.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.9",
"temporalScore": "5.3"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "patch",
"version": "2.7.5-1",
"fixVersion": "2.7.5-1+deb8u2"
}
],
"category": "Debian",
"firstFound": "1726223192962",
"lastFound": "1726570859880",
"published": 1564398028000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for openldap (DSA 3868-1)",
"qid": 176046,
"cveids": [
"CVE-2017-9287"
],
"cvssInfo": {
"baseScore": "4.0",
"temporalScore": "3.1",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.5",
"temporalScore": "5.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libldap-2.4-2:amd64",
"version": "2.4.40+dfsg-1+deb8u2",
"fixVersion": "2.4.40+dfsg-1+deb8u3"
}
],
"category": "Debian",
"firstFound": "1726223192925",
"lastFound": "1726570859849",
"published": 1496311197000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for python2.7 (DLA 1834-1)",
"qid": 177021,
"cveids": [
"CVE-2018-14647",
"CVE-2019-5010",
"CVE-2019-9636",
"CVE-2019-9740",
"CVE-2019-9947",
"CVE-2019-9948",
"CVE-2019-10160"
],
"cvssInfo": {
"baseScore": "6.4",
"temporalScore": "5.0",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libpython2.7-stdlib:amd64",
"version": "2.7.9-2+deb8u1",
"fixVersion": "2.7.9-2+deb8u3"
},
{
"name": "python2.7-minimal",
"version": "2.7.9-2+deb8u1",
"fixVersion": "2.7.9-2+deb8u3"
},
{
"name": "libpython2.7-minimal:amd64",
"version": "2.7.9-2+deb8u1",
"fixVersion": "2.7.9-2+deb8u3"
},
{
"name": "python2.7",
"version": "2.7.9-2+deb8u1",
"fixVersion": "2.7.9-2+deb8u3"
}
],
"category": "Debian",
"firstFound": "1726223192961",
"lastFound": "1726570859880",
"published": 1563274190000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for jasper (DSA 3785-1)",
"qid": 175961,
"cveids": [
"CVE-2016-1867",
"CVE-2016-8654",
"CVE-2016-8691",
"CVE-2016-8692",
"CVE-2016-8693",
"CVE-2016-8882",
"CVE-2016-9560"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.8",
"temporalScore": "7.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libjasper-dev",
"version": "1.900.1-debian1-2.4+deb8u1",
"fixVersion": "1.900.1-debian1-2.4+deb8u2"
},
{
"name": "libjasper1:amd64",
"version": "1.900.1-debian1-2.4+deb8u1",
"fixVersion": "1.900.1-debian1-2.4+deb8u2"
}
],
"category": "Debian",
"firstFound": "1726223192920",
"lastFound": "1726570859845",
"published": 1487580890000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "glibc ld.so Memory Leak and Buffer Overflow Vulnerabilities - Zero Day",
"qid": 370680,
"cveids": [
"CVE-2017-1000408",
"CVE-2017-1000409"
],
"cvssInfo": {
"baseScore": "7.2",
"temporalScore": "6.8",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "7.8",
"temporalScore": "7.6"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libc6-dev:amd64",
"version": "2.19-18+deb8u6",
"fixVersion": "2.19-18+deb8u10"
},
{
"name": "libc-dev-bin",
"version": "2.19-18+deb8u6",
"fixVersion": "2.19-18+deb8u10"
},
{
"name": "libc6:amd64",
"version": "2.19-18+deb8u6",
"fixVersion": "2.19-18+deb8u10"
},
{
"name": "libc-bin",
"version": "2.19-18+deb8u6",
"fixVersion": "2.19-18+deb8u10"
},
{
"name": "multiarch-support",
"version": "2.19-18+deb8u6",
"fixVersion": "2.19-18+deb8u10"
}
],
"category": "Local",
"firstFound": "1726570859903",
"lastFound": "1726570859903",
"published": 1513046523000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"activeAttacks": true,
"denialOfService": true,
"easyExploit": true,
"highDataLoss": true,
"highLateralMovement": true,
"noPatch": true,
"publicExploit": true,
"zeroDay": true
}
},
{
"title": "Debian Security Update for openssl (DSA 3773-1)",
"qid": 175949,
"cveids": [
"CVE-2016-7056",
"CVE-2016-8610",
"CVE-2017-3731"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libssl1.0.0:amd64",
"version": "1.0.1t-1+deb8u5",
"fixVersion": "1.0.1t-1+deb8u6"
},
{
"name": "libssl-dev:amd64",
"version": "1.0.1t-1+deb8u5",
"fixVersion": "1.0.1t-1+deb8u6"
},
{
"name": "openssl",
"version": "1.0.1t-1+deb8u5",
"fixVersion": "1.0.1t-1+deb8u6"
}
],
"category": "Debian",
"firstFound": "1726223192919",
"lastFound": "1726570859844",
"published": 1485778379000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for pixman (DLA 1587-1)",
"qid": 176829,
"cveids": [
"CVE-2015-5297"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libpixman-1-dev",
"version": "0.32.6-3",
"fixVersion": "0.32.6-3+deb8u1"
},
{
"name": "libpixman-1-0:amd64",
"version": "0.32.6-3",
"fixVersion": "0.32.6-3+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192955",
"lastFound": "1726570859874",
"published": 1554890301000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for ca-certificates (DLA-1417-1)",
"qid": 177181,
"cvssInfo": {
"baseScore": "6.0",
"temporalScore": "4.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.0",
"temporalScore": "4.4"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "ca-certificates",
"version": "20141019+deb8u1",
"fixVersion": "20141019+deb8u4"
}
],
"category": "Debian",
"firstFound": "1726223192968",
"lastFound": "1726570859885",
"published": 1567076424000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Rubygems (Rubygems) Security Update for loofah (GHSA-x7rv-cr6v-4vm4)",
"qid": 988647,
"cveids": [
"CVE-2018-8048"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.2",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.1",
"temporalScore": "5.3"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "loofah",
"version": "2.0.3",
"fixVersion": "2.2.1",
"packagePath": "usr/local/bundle/specifications/loofah-2.0.3.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860489",
"lastFound": "1726570860489",
"published": 1667826873000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for libgd2 (DSA 3938-1)",
"qid": 176113,
"cveids": [
"CVE-2017-7890"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.2",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.5",
"temporalScore": "5.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libgd3:amd64",
"version": "2.1.0-5+deb8u7",
"fixVersion": "2.1.0-5+deb8u10"
}
],
"category": "Debian",
"firstFound": "1726223192931",
"lastFound": "1726570859854",
"published": 1502964196000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for postgresql-9.4 (DLA 1642-1)",
"qid": 176718,
"cvssInfo": {
"baseScore": "6.0",
"temporalScore": "4.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.0",
"temporalScore": "4.4"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libpq-dev",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.20-0+deb8u1"
},
{
"name": "postgresql-client-9.4",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.20-0+deb8u1"
},
{
"name": "libpq5:amd64",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.20-0+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192950",
"lastFound": "1726570859869",
"published": 1553546619000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for libjpeg-turbo (DLA 1638-1)",
"qid": 176714,
"cveids": [
"CVE-2016-3616",
"CVE-2018-1152",
"CVE-2018-11212",
"CVE-2018-11213",
"CVE-2018-11214"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libjpeg62-turbo:amd64",
"version": "1:1.3.1-12",
"fixVersion": "1:1.3.1-12+deb8u1"
},
{
"name": "libjpeg-dev",
"version": "1:1.3.1-12",
"fixVersion": "1:1.3.1-12+deb8u1"
},
{
"name": "libjpeg62-turbo-dev:amd64",
"version": "1:1.3.1-12",
"fixVersion": "1:1.3.1-12+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192950",
"lastFound": "1726570859868",
"published": 1553546619000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for mysql-5.5 (DSA 3834-1)",
"qid": 176016,
"cveids": [
"CVE-2017-3302",
"CVE-2017-3305",
"CVE-2017-3308",
"CVE-2017-3309",
"CVE-2017-3329",
"CVE-2017-3453",
"CVE-2017-3456",
"CVE-2017-3461",
"CVE-2017-3462",
"CVE-2017-3463",
"CVE-2017-3464",
"CVE-2017-3600"
],
"cvssInfo": {
"baseScore": "6.3",
"temporalScore": "4.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.7",
"temporalScore": "6.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libmysqlclient18:amd64",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.55-0+deb8u1"
},
{
"name": "mysql-client",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.55-0+deb8u1"
},
{
"name": "mysql-client-5.5",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.55-0+deb8u1"
},
{
"name": "libmysqlclient-dev",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.55-0+deb8u1"
},
{
"name": "mysql-common",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.55-0+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192922",
"lastFound": "1726570859847",
"published": 1493681039000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"highDataLoss": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-882p-jqgm-f45g)",
"qid": 988679,
"cveids": [
"CVE-2017-18258"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.2",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.5",
"temporalScore": "5.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "nokogiri",
"version": "1.7.0.1",
"fixVersion": "1.8.2",
"packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860564",
"lastFound": "1726570860564",
"published": 1667826874000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for shadow (DSA 3793-1)",
"qid": 175969,
"cveids": [
"CVE-2016-6252",
"CVE-2017-2616"
],
"cvssInfo": {
"baseScore": "4.7",
"temporalScore": "3.5",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "7.8",
"temporalScore": "6.8"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "login",
"version": "1:4.2-3+deb8u1",
"fixVersion": "1:4.2-3+deb8u3"
},
{
"name": "passwd",
"version": "1:4.2-3+deb8u1",
"fixVersion": "1:4.2-3+deb8u3"
}
],
"category": "Debian",
"firstFound": "1726223192921",
"lastFound": "1726570859845",
"published": 1488361496000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true
}
},
{
"title": "Debian Security Update for djvulibre (DLA 1985-1)",
"qid": 177524,
"cveids": [
"CVE-2019-18804"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libdjvulibre-dev:amd64",
"version": "3.5.25.4-4+b1",
"fixVersion": "3.5.25.4-4+deb8u2"
},
{
"name": "libdjvulibre-text",
"version": "3.5.25.4-4",
"fixVersion": "3.5.25.4-4+deb8u2"
},
{
"name": "libdjvulibre21:amd64",
"version": "3.5.25.4-4+b1",
"fixVersion": "3.5.25.4-4+deb8u2"
}
],
"category": "Debian",
"firstFound": "1726223192975",
"lastFound": "1726570859893",
"published": 1577703921000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for rake (GHSA-jppv-gw3r-w3q8)",
"qid": 988399,
"cveids": [
"CVE-2020-8130"
],
"cvssInfo": {
"baseScore": "6.9",
"temporalScore": "5.4",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "6.4",
"temporalScore": "5.8"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "rake",
"version": "10.4.2",
"fixVersion": "12.3.3",
"packagePath": "usr/local/lib/ruby/gems/2.3.0/specifications/rake-10.4.2.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860459",
"lastFound": "1726570860459",
"published": 1666790958000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"highDataLoss": true,
"highLateralMovement": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for mercurial (DLA 1764-1)",
"qid": 176921,
"cveids": [
"CVE-2019-3902"
],
"cvssInfo": {
"baseScore": "5.8",
"temporalScore": "4.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.9",
"temporalScore": "5.2"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "mercurial-common",
"version": "3.1.2-2+deb8u3",
"fixVersion": "3.1.2-2+deb8u7"
},
{
"name": "mercurial",
"version": "3.1.2-2+deb8u3",
"fixVersion": "3.1.2-2+deb8u7"
}
],
"category": "Debian",
"firstFound": "1726223192959",
"lastFound": "1726570859878",
"published": 1560767369000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for perl (DSA 4172-1)",
"qid": 176355,
"cveids": [
"CVE-2018-6797",
"CVE-2018-6798",
"CVE-2018-6913"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "perl",
"version": "5.20.2-3+deb8u6",
"fixVersion": "5.20.2-3+deb8u10"
},
{
"name": "perl-modules",
"version": "5.20.2-3+deb8u6",
"fixVersion": "5.20.2-3+deb8u10"
},
{
"name": "perl-base",
"version": "5.20.2-3+deb8u6",
"fixVersion": "5.20.2-3+deb8u10"
}
],
"category": "Debian",
"firstFound": "1726223192942",
"lastFound": "1726570859862",
"published": 1524468872000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for openldap (DLA 1891-1)",
"qid": 177291,
"cveids": [
"CVE-2019-13057",
"CVE-2019-13565"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libldap-2.4-2:amd64",
"version": "2.4.40+dfsg-1+deb8u2",
"fixVersion": "2.4.40+dfsg-1+deb8u5"
}
],
"category": "Debian",
"firstFound": "1726223192970",
"lastFound": "1726570859888",
"published": 1569235400000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for mercurial (DSA 3963-1)",
"qid": 176140,
"cveids": [
"CVE-2017-9462",
"CVE-2017-1000115",
"CVE-2017-1000116"
],
"cvssInfo": {
"baseScore": "10.0",
"temporalScore": "7.8",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "mercurial-common",
"version": "3.1.2-2+deb8u3",
"fixVersion": "3.1.2-2+deb8u4"
},
{
"name": "mercurial",
"version": "3.1.2-2+deb8u3",
"fixVersion": "3.1.2-2+deb8u4"
}
],
"category": "Debian",
"firstFound": "1726223192932",
"lastFound": "1726570859854",
"published": 1505381043000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true,
"highDataLoss": true,
"highLateralMovement": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for icu (DSA 3830-1)",
"qid": 176013,
"cveids": [
"CVE-2017-7867",
"CVE-2017-7868"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libicu52:amd64",
"version": "52.1-8+deb8u4",
"fixVersion": "52.1-8+deb8u5"
}
],
"category": "Debian",
"firstFound": "1726223192922",
"lastFound": "1726570859847",
"published": 1493030824000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for actionview (GHSA-xq5j-gw7f-jgj8)",
"qid": 988064,
"cveids": [
"CVE-2020-8167"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.5",
"temporalScore": "5.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "actionview",
"version": "5.0.1",
"fixVersion": "5.2.4.3",
"packagePath": "usr/local/bundle/specifications/actionview-5.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860187",
"lastFound": "1726570860187",
"published": 1665668566000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for imagemagick (DSA 3914-1)",
"qid": 176093,
"cveids": [
"CVE-2017-9439",
"CVE-2017-9440",
"CVE-2017-9500",
"CVE-2017-9501",
"CVE-2017-10928",
"CVE-2017-11141",
"CVE-2017-11170",
"CVE-2017-11360",
"CVE-2017-11188",
"CVE-2017-11447",
"CVE-2017-11448",
"CVE-2017-11449",
"CVE-2017-11450",
"CVE-2017-11478",
"CVE-2017-11505",
"CVE-2017-11524",
"CVE-2017-11525",
"CVE-2017-11526",
"CVE-2017-11527",
"CVE-2017-11528",
"CVE-2017-11529",
"CVE-2017-11530"
],
"cvssInfo": {
"baseScore": "7.8",
"temporalScore": "6.1",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libmagickcore-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u10"
},
{
"name": "libmagickcore-6-arch-config:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u10"
},
{
"name": "libmagickcore-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u10"
},
{
"name": "libmagickcore-6.q16-2-extra:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u10"
},
{
"name": "libmagickwand-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u10"
},
{
"name": "imagemagick-6.q16",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u10"
},
{
"name": "imagemagick",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u10"
},
{
"name": "libmagickwand-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u10"
},
{
"name": "libmagickwand-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u10"
},
{
"name": "imagemagick-common",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u10"
},
{
"name": "libmagickcore-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u10"
},
{
"name": "libmagickwand-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u10"
},
{
"name": "libmagickcore-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u10"
}
],
"category": "Debian",
"firstFound": "1726223192929",
"lastFound": "1726570859853",
"published": 1501492610000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for libevent (DSA 3789-1)",
"qid": 175965,
"cveids": [
"CVE-2016-10195",
"CVE-2016-10196",
"CVE-2016-10197"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "6.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "9.4"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libevent-2.0-5:amd64",
"version": "2.0.21-stable-2",
"fixVersion": "2.0.21-stable-2+deb8u1"
},
{
"name": "libevent-extra-2.0-5:amd64",
"version": "2.0.21-stable-2",
"fixVersion": "2.0.21-stable-2+deb8u1"
},
{
"name": "libevent-core-2.0-5:amd64",
"version": "2.0.21-stable-2",
"fixVersion": "2.0.21-stable-2+deb8u1"
},
{
"name": "libevent-dev",
"version": "2.0.21-stable-2",
"fixVersion": "2.0.21-stable-2+deb8u1"
},
{
"name": "libevent-pthreads-2.0-5:amd64",
"version": "2.0.21-stable-2",
"fixVersion": "2.0.21-stable-2+deb8u1"
},
{
"name": "libevent-openssl-2.0-5:amd64",
"version": "2.0.21-stable-2",
"fixVersion": "2.0.21-stable-2+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192920",
"lastFound": "1726570859845",
"published": 1487580890000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"exploitKit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for tiff (DLA 2009-1)",
"qid": 177506,
"cveids": [
"CVE-2017-17095",
"CVE-2018-12900",
"CVE-2018-18661",
"CVE-2019-6128",
"CVE-2019-17546"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libtiff5:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u10"
},
{
"name": "libtiff5-dev:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u10"
},
{
"name": "libtiffxx5:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u10"
}
],
"category": "Debian",
"firstFound": "1726223192975",
"lastFound": "1726570859893",
"published": 1577703921000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for gnupg (DSA 4224-1)",
"qid": 176407,
"cveids": [
"CVE-2018-12020"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "gpgv",
"version": "1.4.18-7+deb8u3",
"fixVersion": "1.4.18-7+deb8u5"
},
{
"name": "gnupg",
"version": "1.4.18-7+deb8u3",
"fixVersion": "1.4.18-7+deb8u5"
}
],
"category": "Debian",
"firstFound": "1726223192945",
"lastFound": "1726570859865",
"published": 1528888111000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for sensible-utils (DSA 4071-1)",
"qid": 176257,
"cveids": [
"CVE-2017-17512"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "sensible-utils",
"version": "0.0.9",
"fixVersion": "0.0.9+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192938",
"lastFound": "1726570859859",
"published": 1516616911000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for libffi (DSA 3889-1) (Stack Clash)",
"qid": 176068,
"cveids": [
"CVE-2017-1000376"
],
"cvssInfo": {
"baseScore": "6.9",
"temporalScore": "5.1",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "7.0",
"temporalScore": "6.1"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libffi6:amd64",
"version": "3.1-2+b2",
"fixVersion": "3.1-2+deb8u1"
},
{
"name": "libffi-dev:amd64",
"version": "3.1-2+b2",
"fixVersion": "3.1-2+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192927",
"lastFound": "1726570859851",
"published": 1497920001000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"highDataLoss": true,
"highLateralMovement": true
}
},
{
"title": "Debian Security Update for libtasn1-6 (DLA 2255-1)",
"qid": 177913,
"cveids": [
"CVE-2017-10790"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libtasn1-6:amd64",
"version": "4.2-3+deb8u2",
"fixVersion": "4.2-3+deb8u4"
}
],
"category": "Debian",
"firstFound": "1726223192985",
"lastFound": "1726570859903",
"published": 1594643880000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for curl (DSA 4051-1)",
"qid": 176231,
"cveids": [
"CVE-2017-8816",
"CVE-2017-8817"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libcurl3-gnutls:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u8"
},
{
"name": "libcurl4-openssl-dev:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u8"
},
{
"name": "libcurl3:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u8"
},
{
"name": "curl",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u8"
}
],
"category": "Debian",
"firstFound": "1726223192937",
"lastFound": "1726570859858",
"published": 1513153124000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for curl (DSA 4098-1)",
"qid": 176277,
"cveids": [
"CVE-2018-1000005",
"CVE-2018-1000007"
],
"cvssInfo": {
"baseScore": "6.4",
"temporalScore": "4.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libcurl3-gnutls:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u9"
},
{
"name": "libcurl4-openssl-dev:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u9"
},
{
"name": "libcurl3:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u9"
},
{
"name": "curl",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u9"
}
],
"category": "Debian",
"firstFound": "1726223192939",
"lastFound": "1726570859860",
"published": 1517913327000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for sqlite3 (DLA 2203-1)",
"qid": 177831,
"cveids": [
"CVE-2020-11655"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libsqlite3-dev:amd64",
"version": "3.8.7.1-1+deb8u2",
"fixVersion": "3.8.7.1-1+deb8u5"
},
{
"name": "libsqlite3-0:amd64",
"version": "3.8.7.1-1+deb8u2",
"fixVersion": "3.8.7.1-1+deb8u5"
},
{
"name": "sqlite3",
"version": "3.8.7.1-1+deb8u2",
"fixVersion": "3.8.7.1-1+deb8u5"
}
],
"category": "Debian",
"firstFound": "1726223192982",
"lastFound": "1726570859901",
"published": 1592829964000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for curl (DSA 4136-1)",
"qid": 176318,
"cveids": [
"CVE-2018-1000120",
"CVE-2018-1000121",
"CVE-2018-1000122"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libcurl3-gnutls:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u10"
},
{
"name": "libcurl4-openssl-dev:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u10"
},
{
"name": "libcurl3:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u10"
},
{
"name": "curl",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u10"
}
],
"category": "Debian",
"firstFound": "1726223192940",
"lastFound": "1726570859862",
"published": 1521541865000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for perl (DSA 3982-1)",
"qid": 176161,
"cveids": [
"CVE-2017-12837",
"CVE-2017-12883"
],
"cvssInfo": {
"baseScore": "6.4",
"temporalScore": "4.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.1",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "perl",
"version": "5.20.2-3+deb8u6",
"fixVersion": "5.20.2-3+deb8u9"
},
{
"name": "perl-modules",
"version": "5.20.2-3+deb8u6",
"fixVersion": "5.20.2-3+deb8u9"
},
{
"name": "perl-base",
"version": "5.20.2-3+deb8u6",
"fixVersion": "5.20.2-3+deb8u9"
}
],
"category": "Debian",
"firstFound": "1726223192934",
"lastFound": "1726570859855",
"published": 1506335286000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for imagemagick (DLA 1968-1)",
"qid": 177421,
"cveids": [
"CVE-2019-11470",
"CVE-2019-14981",
"CVE-2019-15139",
"CVE-2019-15140"
],
"cvssInfo": {
"baseScore": "7.1",
"temporalScore": "5.6",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libmagickcore-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u18"
},
{
"name": "libmagickcore-6-arch-config:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u18"
},
{
"name": "libmagickcore-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u18"
},
{
"name": "libmagickcore-6.q16-2-extra:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u18"
},
{
"name": "libmagickwand-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u18"
},
{
"name": "imagemagick-6.q16",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u18"
},
{
"name": "imagemagick",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u18"
},
{
"name": "libmagickwand-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u18"
},
{
"name": "libmagickwand-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u18"
},
{
"name": "imagemagick-common",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u18"
},
{
"name": "libmagickcore-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u18"
},
{
"name": "libmagickwand-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u18"
},
{
"name": "libmagickcore-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u18"
}
],
"category": "Debian",
"firstFound": "1726223192974",
"lastFound": "1726570859891",
"published": 1572345060000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for imagemagick (DLA 1888-1)",
"qid": 177288,
"cveids": [
"CVE-2019-12974",
"CVE-2019-13135",
"CVE-2019-13295",
"CVE-2019-13297",
"CVE-2019-13304",
"CVE-2019-13305",
"CVE-2019-13306"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libmagickcore-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u17"
},
{
"name": "libmagickcore-6-arch-config:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u17"
},
{
"name": "libmagickcore-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u17"
},
{
"name": "libmagickcore-6.q16-2-extra:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u17"
},
{
"name": "libmagickwand-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u17"
},
{
"name": "imagemagick-6.q16",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u17"
},
{
"name": "imagemagick",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u17"
},
{
"name": "libmagickwand-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u17"
},
{
"name": "libmagickwand-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u17"
},
{
"name": "imagemagick-common",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u17"
},
{
"name": "libmagickcore-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u17"
},
{
"name": "libmagickwand-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u17"
},
{
"name": "libmagickcore-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u17"
}
],
"category": "Debian",
"firstFound": "1726223192970",
"lastFound": "1726570859887",
"published": 1569235399000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for mysql-5.5 (DLA 1566-1)",
"qid": 176813,
"cveids": [
"CVE-2018-2767",
"CVE-2018-3058",
"CVE-2018-3063",
"CVE-2018-3066",
"CVE-2018-3070",
"CVE-2018-3081",
"CVE-2018-3133",
"CVE-2018-3174",
"CVE-2018-3282"
],
"cvssInfo": {
"baseScore": "4.9",
"temporalScore": "3.6",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.5",
"temporalScore": "5.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libmysqlclient18:amd64",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.62-0+deb8u1"
},
{
"name": "mysql-client",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.62-0+deb8u1"
},
{
"name": "mysql-client-5.5",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.62-0+deb8u1"
},
{
"name": "libmysqlclient-dev",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.62-0+deb8u1"
},
{
"name": "mysql-common",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.62-0+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192954",
"lastFound": "1726570859873",
"published": 1554890301000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for procps (DSA 4208-1)",
"qid": 176389,
"cveids": [
"CVE-2018-1122",
"CVE-2018-1123",
"CVE-2018-1124",
"CVE-2018-1125",
"CVE-2018-1126"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "procps",
"version": "2:3.3.9-9",
"fixVersion": "2:3.3.9-9+deb8u1"
},
{
"name": "libprocps3:amd64",
"version": "2:3.3.9-9",
"fixVersion": "2:3.3.9-9+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192944",
"lastFound": "1726570859864",
"published": 1527154171000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for libgd2 (DSA 3777-1)",
"qid": 175953,
"cveids": [
"CVE-2016-6906",
"CVE-2016-6912",
"CVE-2016-9317",
"CVE-2016-10166",
"CVE-2016-10167",
"CVE-2016-10168"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libgd3:amd64",
"version": "2.1.0-5+deb8u7",
"fixVersion": "2.1.0-5+deb8u9"
}
],
"category": "Debian",
"firstFound": "1726223192920",
"lastFound": "1726570859845",
"published": 1486381420000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for tiff (DSA 4100-1)",
"qid": 176278,
"cveids": [
"CVE-2017-9935",
"CVE-2017-11335",
"CVE-2017-12944",
"CVE-2017-13726",
"CVE-2017-13727",
"CVE-2017-18013"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libtiff5:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u5"
},
{
"name": "libtiff5-dev:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u5"
},
{
"name": "libtiffxx5:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u5"
}
],
"category": "Debian",
"firstFound": "1726223192939",
"lastFound": "1726570859860",
"published": 1517913327000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for libssh2 (DLA 1991-1)",
"qid": 177495,
"cveids": [
"CVE-2019-17498"
],
"cvssInfo": {
"baseScore": "5.8",
"temporalScore": "4.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.1",
"temporalScore": "7.3"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libssh2-1:amd64",
"version": "1.4.3-4.1+deb8u1",
"fixVersion": "1.4.3-4.1+deb8u6"
}
],
"category": "Debian",
"firstFound": "1726223192975",
"lastFound": "1726570859892",
"published": 1577703921000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for shadow (DSA 3793-2)",
"qid": 176034,
"cvssInfo": {
"baseScore": "6.0",
"temporalScore": "4.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "0.0",
"temporalScore": "0.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "login",
"version": "1:4.2-3+deb8u1",
"fixVersion": "1:4.2-3+deb8u4"
},
{
"name": "passwd",
"version": "1:4.2-3+deb8u1",
"fixVersion": "1:4.2-3+deb8u4"
}
],
"category": "Debian",
"firstFound": "1726223192924",
"lastFound": "1726570859849",
"published": 1495448011000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for curl (DLA 1804-1)",
"qid": 176946,
"cveids": [
"CVE-2019-5436"
],
"cvssInfo": {
"baseScore": "4.6",
"temporalScore": "3.6",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "7.8",
"temporalScore": "7.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libcurl3-gnutls:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u15"
},
{
"name": "libcurl4-openssl-dev:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u15"
},
{
"name": "libcurl3:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u15"
},
{
"name": "curl",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u15"
}
],
"category": "Debian",
"firstFound": "1726223192960",
"lastFound": "1726570859879",
"published": 1560767370000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for jquery (DLA 1777-1)",
"qid": 176892,
"cveids": [
"CVE-2019-11358"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.1",
"temporalScore": "5.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libjs-jquery",
"version": "1.7.2+dfsg-3.2",
"fixVersion": "1.7.2+dfsg-3.2+deb8u6"
}
],
"category": "Debian",
"firstFound": "1726223192958",
"lastFound": "1726570859877",
"published": 1558005825000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for gdk-pixbuf (DSA 3978-1)",
"qid": 176158,
"cveids": [
"CVE-2017-2862"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.8",
"temporalScore": "7.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "gir1.2-gdkpixbuf-2.0",
"version": "2.31.1-2+deb8u5",
"fixVersion": "2.31.1-2+deb8u6"
},
{
"name": "libgdk-pixbuf2.0-dev",
"version": "2.31.1-2+deb8u5",
"fixVersion": "2.31.1-2+deb8u6"
},
{
"name": "libgdk-pixbuf2.0-0:amd64",
"version": "2.31.1-2+deb8u5",
"fixVersion": "2.31.1-2+deb8u6"
},
{
"name": "libgdk-pixbuf2.0-common",
"version": "2.31.1-2+deb8u5",
"fixVersion": "2.31.1-2+deb8u6"
}
],
"category": "Debian",
"firstFound": "1726223192933",
"lastFound": "1726570859855",
"published": 1506335286000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for icu (DLA 2151-1)",
"qid": 177701,
"cveids": [
"CVE-2020-10531"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.0",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libicu52:amd64",
"version": "52.1-8+deb8u4",
"fixVersion": "52.1-8+deb8u8"
}
],
"category": "Debian",
"firstFound": "1726223192980",
"lastFound": "1726570859898",
"published": 1585568825000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for imagemagick (DSA 4204-1)",
"qid": 176386,
"cveids": [
"CVE-2017-10995",
"CVE-2017-11533",
"CVE-2017-11535",
"CVE-2017-11639",
"CVE-2017-13143",
"CVE-2017-17504",
"CVE-2017-17879",
"CVE-2018-5248"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libmagickcore-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u12"
},
{
"name": "libmagickcore-6-arch-config:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u12"
},
{
"name": "libmagickcore-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u12"
},
{
"name": "libmagickcore-6.q16-2-extra:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u12"
},
{
"name": "libmagickwand-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u12"
},
{
"name": "imagemagick-6.q16",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u12"
},
{
"name": "imagemagick",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u12"
},
{
"name": "libmagickwand-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u12"
},
{
"name": "libmagickwand-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u12"
},
{
"name": "imagemagick-common",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u12"
},
{
"name": "libmagickcore-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u12"
},
{
"name": "libmagickwand-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u12"
},
{
"name": "libmagickcore-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u12"
}
],
"category": "Debian",
"firstFound": "1726223192944",
"lastFound": "1726570859864",
"published": 1527154171000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for jasper (DLA 1628-1)",
"qid": 176706,
"cveids": [
"CVE-2018-18873",
"CVE-2018-19139",
"CVE-2018-19539",
"CVE-2018-19540",
"CVE-2018-19541",
"CVE-2018-19542",
"CVE-2018-20570",
"CVE-2018-20584",
"CVE-2018-20622"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libjasper-dev",
"version": "1.900.1-debian1-2.4+deb8u1",
"fixVersion": "1.900.1-debian1-2.4+deb8u5"
},
{
"name": "libjasper1:amd64",
"version": "1.900.1-debian1-2.4+deb8u1",
"fixVersion": "1.900.1-debian1-2.4+deb8u5"
}
],
"category": "Debian",
"firstFound": "1726223192949",
"lastFound": "1726570859867",
"published": 1553602672000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for libssh2 (DLA 1730-2)",
"qid": 176775,
"cveids": [
"CVE-2019-3859"
],
"cvssInfo": {
"baseScore": "6.4",
"temporalScore": "4.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.1",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libssh2-1:amd64",
"version": "1.4.3-4.1+deb8u1",
"fixVersion": "1.4.3-4.1+deb8u3"
}
],
"category": "Debian",
"firstFound": "1726223192953",
"lastFound": "1726570859872",
"published": 1554375138000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for imagemagick (DSA 3799-1)",
"qid": 175977,
"cveids": [
"CVE-2016-8707",
"CVE-2016-10062",
"CVE-2016-10144",
"CVE-2016-10145",
"CVE-2016-10146",
"CVE-2017-5506",
"CVE-2017-5507",
"CVE-2017-5508",
"CVE-2017-5510",
"CVE-2017-5511"
],
"cvssInfo": {
"baseScore": "7.8",
"temporalScore": "6.1",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libmagickcore-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u7"
},
{
"name": "libmagickcore-6-arch-config:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u7"
},
{
"name": "libmagickcore-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u7"
},
{
"name": "libmagickcore-6.q16-2-extra:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u7"
},
{
"name": "libmagickwand-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u7"
},
{
"name": "imagemagick-6.q16",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u7"
},
{
"name": "imagemagick",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u7"
},
{
"name": "libmagickwand-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u7"
},
{
"name": "libmagickwand-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u7"
},
{
"name": "imagemagick-common",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u7"
},
{
"name": "libmagickcore-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u7"
},
{
"name": "libmagickwand-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u7"
},
{
"name": "libmagickcore-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u7"
}
],
"category": "Debian",
"firstFound": "1726223192921",
"lastFound": "1726570859846",
"published": 1488879780000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for gdk-pixbuf (DSA 4088-1)",
"qid": 176270,
"cveids": [
"CVE-2017-1000422",
"CVE-2017-6312",
"CVE-2017-6313",
"CVE-2017-6314"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "gir1.2-gdkpixbuf-2.0",
"version": "2.31.1-2+deb8u5",
"fixVersion": "2.31.1-2+deb8u7"
},
{
"name": "libgdk-pixbuf2.0-dev",
"version": "2.31.1-2+deb8u5",
"fixVersion": "2.31.1-2+deb8u7"
},
{
"name": "libgdk-pixbuf2.0-0:amd64",
"version": "2.31.1-2+deb8u5",
"fixVersion": "2.31.1-2+deb8u7"
},
{
"name": "libgdk-pixbuf2.0-common",
"version": "2.31.1-2+deb8u5",
"fixVersion": "2.31.1-2+deb8u7"
}
],
"category": "Debian",
"firstFound": "1726223192939",
"lastFound": "1726570859859",
"published": 1516270152000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for jasper (DLA 1628-2)",
"qid": 176868,
"cveids": [
"CVE-2018-19542"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.5",
"temporalScore": "5.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libjasper-dev",
"version": "1.900.1-debian1-2.4+deb8u1",
"fixVersion": "1.900.1-debian1-2.4+deb8u6"
},
{
"name": "libjasper1:amd64",
"version": "1.900.1-debian1-2.4+deb8u1",
"fixVersion": "1.900.1-debian1-2.4+deb8u6"
}
],
"category": "Debian",
"firstFound": "1726223192958",
"lastFound": "1726570859877",
"published": 1556535783000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for file (DLA 1698-1)",
"qid": 176692,
"cveids": [
"CVE-2019-8905",
"CVE-2019-8907"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libmagic1:amd64",
"version": "1:5.22+15-2+deb8u2",
"fixVersion": "1:5.22+15-2+deb8u5"
},
{
"name": "file",
"version": "1:5.22+15-2+deb8u2",
"fixVersion": "1:5.22+15-2+deb8u5"
}
],
"category": "Debian",
"firstFound": "1726223192948",
"lastFound": "1726570859867",
"published": 1553546619000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for bzr (DSA 4052-1)",
"qid": 176232,
"cveids": [
"CVE-2017-14176"
],
"cvssInfo": {
"baseScore": "9.3",
"temporalScore": "6.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "bzr",
"version": "2.6.0+bzr6595-6",
"fixVersion": "2.6.0+bzr6595-6+deb8u1"
},
{
"name": "python-bzrlib",
"version": "2.6.0+bzr6595-6",
"fixVersion": "2.6.0+bzr6595-6+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192937",
"lastFound": "1726570859858",
"published": 1513153124000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"highDataLoss": true,
"highLateralMovement": true
}
},
{
"title": "Rubygems (rubygems) Security Update for actionview (GHSA-ch3h-j2vf-95pv)",
"qid": 987667,
"cveids": [
"CVE-2022-27777"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.1",
"temporalScore": "5.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "actionview",
"version": "5.0.1",
"fixVersion": "5.2.7.1",
"packagePath": "usr/local/bundle/specifications/actionview-5.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570859970",
"lastFound": "1726570859970",
"published": 1663852806000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for tzdata (DLA 1744-1)",
"qid": 176771,
"cvssInfo": {
"baseScore": "6.0",
"temporalScore": "4.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.0",
"temporalScore": "4.4"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "tzdata",
"version": "2016j-0+deb8u1",
"fixVersion": "2019a-0+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192952",
"lastFound": "1726570859871",
"published": 1554375138000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for imagemagick (DLA 1394-1)",
"qid": 177204,
"cveids": [
"CVE-2018-11251",
"CVE-2018-12599",
"CVE-2018-12600"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libmagickcore-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u13"
},
{
"name": "libmagickcore-6-arch-config:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u13"
},
{
"name": "libmagickcore-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u13"
},
{
"name": "libmagickcore-6.q16-2-extra:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u13"
},
{
"name": "libmagickwand-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u13"
},
{
"name": "imagemagick-6.q16",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u13"
},
{
"name": "imagemagick",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u13"
},
{
"name": "libmagickwand-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u13"
},
{
"name": "libmagickwand-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u13"
},
{
"name": "imagemagick-common",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u13"
},
{
"name": "libmagickcore-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u13"
},
{
"name": "libmagickwand-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u13"
},
{
"name": "libmagickcore-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u13"
}
],
"category": "Debian",
"firstFound": "1726223192968",
"lastFound": "1726570859886",
"published": 1566210024000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for actionview (GHSA-65cv-r6x7-79hv)",
"qid": 988320,
"cveids": [
"CVE-2020-5267"
],
"cvssInfo": {
"baseScore": "3.5",
"temporalScore": "2.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "4.8",
"temporalScore": "4.3"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "actionview",
"version": "5.0.1",
"fixVersion": "5.2.4.2",
"packagePath": "usr/local/bundle/specifications/actionview-5.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860272",
"lastFound": "1726570860272",
"published": 1666790957000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for gdk-pixbuf (DLA 2043-1)",
"qid": 177554,
"cveids": [
"CVE-2016-6352",
"CVE-2017-2870",
"CVE-2017-6312",
"CVE-2017-6313",
"CVE-2017-6314"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.8",
"temporalScore": "7.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "gir1.2-gdkpixbuf-2.0",
"version": "2.31.1-2+deb8u5",
"fixVersion": "2.31.1-2+deb8u8"
},
{
"name": "libgdk-pixbuf2.0-dev",
"version": "2.31.1-2+deb8u5",
"fixVersion": "2.31.1-2+deb8u8"
},
{
"name": "libgdk-pixbuf2.0-0:amd64",
"version": "2.31.1-2+deb8u5",
"fixVersion": "2.31.1-2+deb8u8"
},
{
"name": "libgdk-pixbuf2.0-common",
"version": "2.31.1-2+deb8u5",
"fixVersion": "2.31.1-2+deb8u8"
}
],
"category": "Debian",
"firstFound": "1726223192976",
"lastFound": "1726570859894",
"published": 1578572917000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for postgresql-9.4 (DLA-1874-1)",
"qid": 177087,
"cveids": [
"CVE-2019-10208",
"CVE-2007-2138"
],
"cvssInfo": {
"baseScore": "6.5",
"temporalScore": "4.8",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libpq-dev",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.24-0+deb8u1"
},
{
"name": "postgresql-client-9.4",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.24-0+deb8u1"
},
{
"name": "libpq5:amd64",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.24-0+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192964",
"lastFound": "1726570859882",
"published": 1566210022000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for postgresql-9.4 (DLA 1784-1)",
"qid": 176898,
"cvssInfo": {
"baseScore": "6.0",
"temporalScore": "4.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.0",
"temporalScore": "4.4"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libpq-dev",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.22-0+deb8u1"
},
{
"name": "postgresql-client-9.4",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.22-0+deb8u1"
},
{
"name": "libpq5:amd64",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.22-0+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192958",
"lastFound": "1726570859877",
"published": 1558005825000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for tzdata (DLA 1625-1)",
"qid": 176704,
"cvssInfo": {
"baseScore": "6.0",
"temporalScore": "4.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.0",
"temporalScore": "4.4"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "tzdata",
"version": "2016j-0+deb8u1",
"fixVersion": "2018i-0+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192948",
"lastFound": "1726570859867",
"published": 1553546619000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for tzdata (DLA 1957-1)",
"qid": 177412,
"cvssInfo": {
"baseScore": "6.0",
"temporalScore": "4.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.0",
"temporalScore": "4.4"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "tzdata",
"version": "2016j-0+deb8u1",
"fixVersion": "2019c-0+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192974",
"lastFound": "1726570859891",
"published": 1572345060000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for jquery (DLA 1777-2)",
"qid": 176930,
"cvssInfo": {
"baseScore": "6.0",
"temporalScore": "4.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.0",
"temporalScore": "4.4"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libjs-jquery",
"version": "1.7.2+dfsg-3.2",
"fixVersion": "1.7.2+dfsg-3.2+deb8u7"
}
],
"category": "Debian",
"firstFound": "1726223192960",
"lastFound": "1726570859878",
"published": 1560767369000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for libgd2 (DSA 3961-1)",
"qid": 176149,
"cveids": [
"CVE-2017-6362"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libgd3:amd64",
"version": "2.1.0-5+deb8u7",
"fixVersion": "2.1.0-5+deb8u11"
}
],
"category": "Debian",
"firstFound": "1726223192933",
"lastFound": "1726570859855",
"published": 1505381043000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for graphite2 (DSA 3894-1)",
"qid": 176073,
"cveids": [
"CVE-2017-7771",
"CVE-2017-7772",
"CVE-2017-7773",
"CVE-2017-7774",
"CVE-2017-7776",
"CVE-2017-7777",
"CVE-2017-7778"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libgraphite2-3:amd64",
"version": "1.3.6-1~deb8u1",
"fixVersion": "1.3.10-1~deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192928",
"lastFound": "1726570859851",
"published": 1499075273000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for krb5 (DLA 1643-1)",
"qid": 176719,
"cveids": [
"CVE-2018-5729",
"CVE-2018-5730",
"CVE-2018-20217",
"CVE-2018-5710"
],
"cvssInfo": {
"baseScore": "6.5",
"temporalScore": "4.8",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.5",
"temporalScore": "5.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libgssapi-krb5-2:amd64",
"version": "1.12.1+dfsg-19+deb8u2",
"fixVersion": "1.12.1+dfsg-19+deb8u5"
},
{
"name": "libkrb5-3:amd64",
"version": "1.12.1+dfsg-19+deb8u2",
"fixVersion": "1.12.1+dfsg-19+deb8u5"
},
{
"name": "krb5-multidev",
"version": "1.12.1+dfsg-19+deb8u2",
"fixVersion": "1.12.1+dfsg-19+deb8u5"
},
{
"name": "libkadm5srv-mit9:amd64",
"version": "1.12.1+dfsg-19+deb8u2",
"fixVersion": "1.12.1+dfsg-19+deb8u5"
},
{
"name": "libkrb5support0:amd64",
"version": "1.12.1+dfsg-19+deb8u2",
"fixVersion": "1.12.1+dfsg-19+deb8u5"
},
{
"name": "libgssrpc4:amd64",
"version": "1.12.1+dfsg-19+deb8u2",
"fixVersion": "1.12.1+dfsg-19+deb8u5"
},
{
"name": "libkdb5-7:amd64",
"version": "1.12.1+dfsg-19+deb8u2",
"fixVersion": "1.12.1+dfsg-19+deb8u5"
},
{
"name": "libk5crypto3:amd64",
"version": "1.12.1+dfsg-19+deb8u2",
"fixVersion": "1.12.1+dfsg-19+deb8u5"
},
{
"name": "libkadm5clnt-mit9:amd64",
"version": "1.12.1+dfsg-19+deb8u2",
"fixVersion": "1.12.1+dfsg-19+deb8u5"
},
{
"name": "libkrb5-dev",
"version": "1.12.1+dfsg-19+deb8u2",
"fixVersion": "1.12.1+dfsg-19+deb8u5"
}
],
"category": "Debian",
"firstFound": "1726223192951",
"lastFound": "1726570859869",
"published": 1553546619000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for patch (DLA 1864-1)",
"qid": 177065,
"cveids": [
"CVE-2019-13638",
"CVE-2018-20969"
],
"cvssInfo": {
"baseScore": "9.3",
"temporalScore": "7.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.8",
"temporalScore": "7.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "patch",
"version": "2.7.5-1",
"fixVersion": "2.7.5-1+deb8u3"
}
],
"category": "Debian",
"firstFound": "1726223192963",
"lastFound": "1726570859881",
"published": 1564398029000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"highDataLoss": true,
"highLateralMovement": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for postgresql-9.4 (DLA 2105-1)",
"qid": 177663,
"cveids": [
"CVE-2020-1720"
],
"cvssInfo": {
"baseScore": "3.5",
"temporalScore": "2.6",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.5",
"temporalScore": "5.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libpq-dev",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.26-0+deb8u1"
},
{
"name": "postgresql-client-9.4",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.26-0+deb8u1"
},
{
"name": "libpq5:amd64",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.26-0+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192980",
"lastFound": "1726570859898",
"published": 1585568825000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for Open Secure Sockets Layer (OpenSSL) (DLA 1701-1)",
"qid": 176633,
"cveids": [
"CVE-2019-1559"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.2",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.9",
"temporalScore": "5.2"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libssl1.0.0:amd64",
"version": "1.0.1t-1+deb8u5",
"fixVersion": "1.0.1t-1+deb8u11"
},
{
"name": "libssl-dev:amd64",
"version": "1.0.1t-1+deb8u5",
"fixVersion": "1.0.1t-1+deb8u11"
},
{
"name": "openssl",
"version": "1.0.1t-1+deb8u5",
"fixVersion": "1.0.1t-1+deb8u11"
}
],
"category": "Debian",
"firstFound": "1726223192946",
"lastFound": "1726570859865",
"published": 1553546619000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Rubygems (Rubygems) Security Update for rack (GHSA-hrqr-hxpp-chr3)",
"qid": 987996,
"cveids": [
"CVE-2019-16782"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.2",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.9",
"temporalScore": "5.2"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "rack",
"version": "2.0.1",
"fixVersion": "2.0.8",
"packagePath": "usr/local/bundle/specifications/rack-2.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860212",
"lastFound": "1726570860212",
"published": 1665668559000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for postgresql-9.4 (DSA 3851-1)",
"qid": 176030,
"cveids": [
"CVE-2017-7484",
"CVE-2017-7485",
"CVE-2017-7486"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libpq-dev",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.12-0+deb8u1"
},
{
"name": "postgresql-client-9.4",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.12-0+deb8u1"
},
{
"name": "libpq5:amd64",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.12-0+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192924",
"lastFound": "1726570859848",
"published": 1495448011000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for freetype (DLA 1909-1)",
"qid": 177308,
"cveids": [
"CVE-2015-9381",
"CVE-2015-9382",
"CVE-2015-9383"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libfreetype6:amd64",
"version": "2.5.2-3+deb8u1",
"fixVersion": "2.5.2-3+deb8u4"
},
{
"name": "libfreetype6-dev",
"version": "2.5.2-3+deb8u1",
"fixVersion": "2.5.2-3+deb8u4"
}
],
"category": "Debian",
"firstFound": "1726223192971",
"lastFound": "1726570859888",
"published": 1569235400000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for tiff (DSA 3903-1)",
"qid": 176081,
"cveids": [
"CVE-2016-10095",
"CVE-2017-9147",
"CVE-2017-9403",
"CVE-2017-9404",
"CVE-2017-9936",
"CVE-2017-10688"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libtiff5:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u4"
},
{
"name": "libtiff5-dev:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u4"
},
{
"name": "libtiffxx5:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u4"
}
],
"category": "Debian",
"firstFound": "1726223192929",
"lastFound": "1726570859852",
"published": 1499682317000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for libgd2 (DLA 1817-1)",
"qid": 176988,
"cveids": [
"CVE-2019-11038"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.3",
"temporalScore": "4.8"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libgd3:amd64",
"version": "2.1.0-5+deb8u7",
"fixVersion": "2.1.0-5+deb8u13"
}
],
"category": "Debian",
"firstFound": "1726223192960",
"lastFound": "1726570859879",
"published": 1560943023000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for git (DSA 3984-1)",
"qid": 176164,
"cveids": [
"CVE-2017-14867"
],
"cvssInfo": {
"baseScore": "9.0",
"temporalScore": "6.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "git-man",
"version": "1:2.1.4-2.1+deb8u2",
"fixVersion": "1:2.1.4-2.1+deb8u5"
},
{
"name": "git",
"version": "1:2.1.4-2.1+deb8u2",
"fixVersion": "1:2.1.4-2.1+deb8u5"
}
],
"category": "Debian",
"firstFound": "1726223192934",
"lastFound": "1726570859855",
"published": 1507021692000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true,
"highDataLoss": true,
"highLateralMovement": true
}
},
{
"title": "Debian Security Update for cyrus-sasl2 (DLA 2044-1)",
"qid": 177564,
"cveids": [
"CVE-2019-19906"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libsasl2-modules-db:amd64",
"version": "2.1.26.dfsg1-13+deb8u1",
"fixVersion": "2.1.26.dfsg1-13+deb8u2"
},
{
"name": "libsasl2-2:amd64",
"version": "2.1.26.dfsg1-13+deb8u1",
"fixVersion": "2.1.26.dfsg1-13+deb8u2"
}
],
"category": "Debian",
"firstFound": "1726223192977",
"lastFound": "1726570859895",
"published": 1578572917000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for tiff (DSA 3762-1)",
"qid": 175938,
"cveids": [
"CVE-2016-3622",
"CVE-2016-3623",
"CVE-2016-3624",
"CVE-2016-3945",
"CVE-2016-3990",
"CVE-2016-3991",
"CVE-2016-5314",
"CVE-2016-5315",
"CVE-2016-5316",
"CVE-2016-5317",
"CVE-2016-5321",
"CVE-2016-5322",
"CVE-2016-5323",
"CVE-2016-5652",
"CVE-2016-6223",
"CVE-2016-9273",
"CVE-2016-9297",
"CVE-2016-9448",
"CVE-2016-9453",
"CVE-2016-9532",
"CVE-2016-9533",
"CVE-2016-9534",
"CVE-2016-9535",
"CVE-2016-9536",
"CVE-2016-9537",
"CVE-2016-9538",
"CVE-2016-9540",
"CVE-2016-10092",
"CVE-2016-10093",
"CVE-2016-10094",
"CVE-2016-10271",
"CVE-2016-10272"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libtiff5:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u2"
},
{
"name": "libtiff5-dev:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u2"
},
{
"name": "libtiffxx5:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u2"
}
],
"category": "Debian",
"firstFound": "1726223192918",
"lastFound": "1726570859843",
"published": 1484559036000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for apt (DLA 2210-1)",
"qid": 177832,
"cveids": [
"CVE-2020-3810"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.5",
"temporalScore": "5.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "apt",
"version": "1.0.9.8.4",
"fixVersion": "1.0.9.8.6"
},
{
"name": "libapt-pkg4.12:amd64",
"version": "1.0.9.8.4",
"fixVersion": "1.0.9.8.6"
}
],
"category": "Debian",
"firstFound": "1726223192983",
"lastFound": "1726570859901",
"published": 1595494992000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for libgcrypt20 (DLA 1931-2)",
"qid": 177571,
"cveids": [
"CVE-2019-13627"
],
"cvssInfo": {
"baseScore": "2.6",
"temporalScore": "1.9",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "6.3",
"temporalScore": "5.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libgcrypt20:amd64",
"version": "1.6.3-2+deb8u2",
"fixVersion": "1.6.3-2+deb8u8"
}
],
"category": "Debian",
"firstFound": "1726223192978",
"lastFound": "1726570859896",
"published": 1578572917000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for mysql-5.5 (DSA 3767-1)",
"qid": 175946,
"cveids": [
"CVE-2017-3238",
"CVE-2017-3243",
"CVE-2017-3244",
"CVE-2017-3258",
"CVE-2017-3265",
"CVE-2017-3291",
"CVE-2017-3312",
"CVE-2017-3313",
"CVE-2017-3317",
"CVE-2017-3318"
],
"cvssInfo": {
"baseScore": "4.9",
"temporalScore": "3.6",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.7",
"temporalScore": "5.8"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libmysqlclient18:amd64",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.54-0+deb8u1"
},
{
"name": "mysql-client",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.54-0+deb8u1"
},
{
"name": "mysql-client-5.5",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.54-0+deb8u1"
},
{
"name": "libmysqlclient-dev",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.54-0+deb8u1"
},
{
"name": "mysql-common",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.54-0+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192918",
"lastFound": "1726570859843",
"published": 1485337367000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for systemd (DLA 1762-1)",
"qid": 176866,
"cveids": [
"CVE-2017-18078",
"CVE-2019-3842"
],
"cvssInfo": {
"baseScore": "4.6",
"temporalScore": "3.6",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "7.8",
"temporalScore": "7.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "udev",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u12"
},
{
"name": "libsystemd0:amd64",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u12"
},
{
"name": "systemd-sysv",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u12"
},
{
"name": "libudev1:amd64",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u12"
},
{
"name": "systemd",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u12"
}
],
"category": "Debian",
"firstFound": "1726223192957",
"lastFound": "1726570859876",
"published": 1556190374000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for gcc-4.9 (DLA 1606-1)",
"qid": 176781,
"cvssInfo": {
"baseScore": "6.0",
"temporalScore": "4.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.0",
"temporalScore": "4.4"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libstdc++6:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u2"
},
{
"name": "libasan1:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u2"
},
{
"name": "libstdc++-4.9-dev:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u2"
},
{
"name": "libgomp1:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u2"
},
{
"name": "libubsan0:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u2"
},
{
"name": "gcc-4.9",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u2"
},
{
"name": "libgcc-4.9-dev:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u2"
},
{
"name": "libtsan0:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u2"
},
{
"name": "g++-4.9",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u2"
},
{
"name": "libatomic1:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u2"
},
{
"name": "libcilkrts5:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u2"
},
{
"name": "cpp-4.9",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u2"
},
{
"name": "gcc-4.9-base:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u2"
},
{
"name": "liblsan0:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u2"
},
{
"name": "libquadmath0:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u2"
},
{
"name": "libitm1:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u2"
}
],
"category": "Debian",
"firstFound": "1726223192953",
"lastFound": "1726570859872",
"published": 1554375138000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for postgresql-9.4 (DSA 4027-1)",
"qid": 176207,
"cveids": [
"CVE-2017-15098"
],
"cvssInfo": {
"baseScore": "5.5",
"temporalScore": "4.1",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.1",
"temporalScore": "7.1"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libpq-dev",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.15-0+deb8u1"
},
{
"name": "postgresql-client-9.4",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.15-0+deb8u1"
},
{
"name": "libpq5:amd64",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.15-0+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192936",
"lastFound": "1726570859857",
"published": 1510565039000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for rack (GHSA-5r2p-j47h-mhpg)",
"qid": 989142,
"cveids": [
"CVE-2018-16471"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.2",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.1",
"temporalScore": "5.3"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "rack",
"version": "2.0.1",
"fixVersion": "2.0.6",
"packagePath": "usr/local/bundle/specifications/rack-2.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860568",
"lastFound": "1726570860568",
"published": 1668088071000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for rtmpdump (DSA 3850-1)",
"qid": 176029,
"cveids": [
"CVE-2015-8270",
"CVE-2015-8271",
"CVE-2015-8272"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "librtmp1:amd64",
"version": "2.4+20150115.gita107cef-1",
"fixVersion": "2.4+20150115.gita107cef-1+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192923",
"lastFound": "1726570859848",
"published": 1495448011000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for rails-html-sanitizer (GHSA-mcvf-2q2m-x72m)",
"qid": 991021,
"cveids": [
"CVE-2022-23518"
],
"cvssInfo": {
"baseScore": "5.4",
"temporalScore": "4.3",
"accessVector": "Adjacent Network"
},
"cvss3Info": {
"baseScore": "6.1",
"temporalScore": "5.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "rails-html-sanitizer",
"version": "1.0.3",
"fixVersion": "1.4.4",
"packagePath": "usr/local/bundle/specifications/rails-html-sanitizer-1.0.3.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860606",
"lastFound": "1726570860606",
"published": 1672837005000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"highLateralMovement": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for mysql-5.5 (DSA 4176-1)",
"qid": 176359,
"cveids": [
"CVE-2018-2755",
"CVE-2018-2761",
"CVE-2018-2771",
"CVE-2018-2773",
"CVE-2018-2781",
"CVE-2018-2813",
"CVE-2018-2817",
"CVE-2018-2818",
"CVE-2018-2819"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.2",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.7",
"temporalScore": "6.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libmysqlclient18:amd64",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.60-0+deb8u1"
},
{
"name": "mysql-client",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.60-0+deb8u1"
},
{
"name": "mysql-client-5.5",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.60-0+deb8u1"
},
{
"name": "libmysqlclient-dev",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.60-0+deb8u1"
},
{
"name": "mysql-common",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.60-0+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192943",
"lastFound": "1726570859863",
"published": 1524468872000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for perl (DSA 4226-1)",
"qid": 176409,
"cveids": [
"CVE-2018-12015"
],
"cvssInfo": {
"baseScore": "6.4",
"temporalScore": "5.0",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "perl",
"version": "5.20.2-3+deb8u6",
"fixVersion": "5.20.2-3+deb8u11"
},
{
"name": "perl-modules",
"version": "5.20.2-3+deb8u6",
"fixVersion": "5.20.2-3+deb8u11"
},
{
"name": "perl-base",
"version": "5.20.2-3+deb8u6",
"fixVersion": "5.20.2-3+deb8u11"
}
],
"category": "Debian",
"firstFound": "1726223192945",
"lastFound": "1726570859865",
"published": 1529482921000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Ruby (rubygems) Security Update for nokogiri (GHSA-vr8q-g5c7-m54m)",
"qid": 987468,
"cveids": [
"CVE-2020-26247"
],
"cvssInfo": {
"baseScore": "4.0",
"temporalScore": "3.0",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "4.3",
"temporalScore": "3.8"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "nokogiri",
"version": "1.7.0.1",
"fixVersion": "1.11.0",
"packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570859949",
"lastFound": "1726570859949",
"published": 1663677763000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for jasper (DSA 3827-1)",
"qid": 176009,
"cveids": [
"CVE-2016-9591",
"CVE-2016-10249",
"CVE-2016-10251"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.8",
"temporalScore": "7.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libjasper-dev",
"version": "1.900.1-debian1-2.4+deb8u1",
"fixVersion": "1.900.1-debian1-2.4+deb8u3"
},
{
"name": "libjasper1:amd64",
"version": "1.900.1-debian1-2.4+deb8u1",
"fixVersion": "1.900.1-debian1-2.4+deb8u3"
}
],
"category": "Debian",
"firstFound": "1726223192922",
"lastFound": "1726570859846",
"published": 1491992844000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for libxml2 (DSA 4086-1)",
"qid": 176266,
"cveids": [
"CVE-2017-15412"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.0",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libxml2:amd64",
"version": "2.9.1+dfsg1-5+deb8u3",
"fixVersion": "2.9.1+dfsg1-5+deb8u6"
},
{
"name": "libxml2-dev:amd64",
"version": "2.9.1+dfsg1-5+deb8u3",
"fixVersion": "2.9.1+dfsg1-5+deb8u6"
}
],
"category": "Debian",
"firstFound": "1726223192938",
"lastFound": "1726570859859",
"published": 1516270152000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for systemd (DLA 1711-1)",
"qid": 176641,
"cveids": [
"CVE-2019-3815",
"CVE-2018-16864"
],
"cvssInfo": {
"baseScore": "4.6",
"temporalScore": "3.6",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "7.8",
"temporalScore": "7.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "udev",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u11"
},
{
"name": "libsystemd0:amd64",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u11"
},
{
"name": "systemd-sysv",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u11"
},
{
"name": "libudev1:amd64",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u11"
},
{
"name": "systemd",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u11"
}
],
"category": "Debian",
"firstFound": "1726223192946",
"lastFound": "1726570859866",
"published": 1553546619000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for bash (DLA 1726-1)",
"qid": 176754,
"cveids": [
"CVE-2016-9401",
"CVE-2019-9924"
],
"cvssInfo": {
"baseScore": "7.2",
"temporalScore": "5.3",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "7.8",
"temporalScore": "6.8"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "bash",
"version": "4.3-11+b1",
"fixVersion": "4.3-11+deb8u2"
}
],
"category": "Debian",
"firstFound": "1726223192951",
"lastFound": "1726570859870",
"published": 1554375137000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true,
"highDataLoss": true,
"highLateralMovement": true
}
},
{
"title": "Debian Security Update for wget (DLA 2086-1)",
"qid": 177623,
"cveids": [
"CVE-2016-7098"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.1",
"temporalScore": "7.3"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "wget",
"version": "1.16-1+deb8u1",
"fixVersion": "1.16-1+deb8u7"
}
],
"category": "Debian",
"firstFound": "1726223192979",
"lastFound": "1726570859897",
"published": 1580987657000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for gdk-pixbuf (DLA 2043-2)",
"qid": 177563,
"cveids": [
"CVE-2017-6314"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.5",
"temporalScore": "5.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "gir1.2-gdkpixbuf-2.0",
"version": "2.31.1-2+deb8u5",
"fixVersion": "2.31.1-2+deb8u9"
},
{
"name": "libgdk-pixbuf2.0-dev",
"version": "2.31.1-2+deb8u5",
"fixVersion": "2.31.1-2+deb8u9"
},
{
"name": "libgdk-pixbuf2.0-0:amd64",
"version": "2.31.1-2+deb8u5",
"fixVersion": "2.31.1-2+deb8u9"
},
{
"name": "libgdk-pixbuf2.0-common",
"version": "2.31.1-2+deb8u5",
"fixVersion": "2.31.1-2+deb8u9"
}
],
"category": "Debian",
"firstFound": "1726223192977",
"lastFound": "1726570859895",
"published": 1578572917000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for git (DSA 3848-1)",
"qid": 176027,
"cveids": [
"CVE-2017-8386"
],
"cvssInfo": {
"baseScore": "6.5",
"temporalScore": "5.1",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "git-man",
"version": "1:2.1.4-2.1+deb8u2",
"fixVersion": "1:2.1.4-2.1+deb8u3"
},
{
"name": "git",
"version": "1:2.1.4-2.1+deb8u2",
"fixVersion": "1:2.1.4-2.1+deb8u3"
}
],
"category": "Debian",
"firstFound": "1726223192923",
"lastFound": "1726570859848",
"published": 1494498198000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for git (DLA 2177-1)",
"qid": 177755,
"cveids": [
"CVE-2020-5260"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "git-man",
"version": "1:2.1.4-2.1+deb8u2",
"fixVersion": "1:2.1.4-2.1+deb8u9"
},
{
"name": "git",
"version": "1:2.1.4-2.1+deb8u2",
"fixVersion": "1:2.1.4-2.1+deb8u9"
}
],
"category": "Debian",
"firstFound": "1726223192981",
"lastFound": "1726570859899",
"published": 1588680879000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for libgd2 (DSA 3751-1)",
"qid": 175927,
"cveids": [
"CVE-2016-9933"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libgd3:amd64",
"version": "2.1.0-5+deb8u7",
"fixVersion": "2.1.0-5+deb8u8"
}
],
"category": "Debian",
"firstFound": "1726223192918",
"lastFound": "1726570859842",
"published": 1483955004000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for jasper (DLA 1583-1)",
"qid": 176838,
"cveids": [
"CVE-2015-5203",
"CVE-2015-5221",
"CVE-2016-8690",
"CVE-2017-13748",
"CVE-2017-14132",
"CVE-2016-8884",
"CVE-2016-8885"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libjasper-dev",
"version": "1.900.1-debian1-2.4+deb8u1",
"fixVersion": "1.900.1-debian1-2.4+deb8u4"
},
{
"name": "libjasper1:amd64",
"version": "1.900.1-debian1-2.4+deb8u1",
"fixVersion": "1.900.1-debian1-2.4+deb8u4"
}
],
"category": "Debian",
"firstFound": "1726223192956",
"lastFound": "1726570859875",
"published": 1554977888000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for tiff (DLA 1557-1)",
"qid": 177114,
"cveids": [
"CVE-2018-17100",
"CVE-2018-17101",
"CVE-2018-18557"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libtiff5:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u7"
},
{
"name": "libtiff5-dev:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u7"
},
{
"name": "libtiffxx5:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u7"
}
],
"category": "Debian",
"firstFound": "1726223192965",
"lastFound": "1726570859883",
"published": 1566210023000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for python2.7 (DLA 1925-1)",
"qid": 177320,
"cveids": [
"CVE-2019-16056"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libpython2.7-stdlib:amd64",
"version": "2.7.9-2+deb8u1",
"fixVersion": "2.7.9-2+deb8u5"
},
{
"name": "python2.7-minimal",
"version": "2.7.9-2+deb8u1",
"fixVersion": "2.7.9-2+deb8u5"
},
{
"name": "libpython2.7-minimal:amd64",
"version": "2.7.9-2+deb8u1",
"fixVersion": "2.7.9-2+deb8u5"
},
{
"name": "python2.7",
"version": "2.7.9-2+deb8u1",
"fixVersion": "2.7.9-2+deb8u5"
}
],
"category": "Debian",
"firstFound": "1726223192971",
"lastFound": "1726570859889",
"published": 1569235400000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for libgd2 (DLA 2106-1)",
"qid": 177714,
"cveids": [
"CVE-2018-14553"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.2",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libgd3:amd64",
"version": "2.1.0-5+deb8u7",
"fixVersion": "2.1.0-5+deb8u14"
}
],
"category": "Debian",
"firstFound": "1726223192980",
"lastFound": "1726570859898",
"published": 1585568826000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for imagemagick (DSA 3808-1)",
"qid": 175988,
"cveids": [
"CVE-2017-6498",
"CVE-2017-6499",
"CVE-2017-6500",
"CVE-2016-10252"
],
"cvssInfo": {
"baseScore": "7.8",
"temporalScore": "5.8",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libmagickcore-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u8"
},
{
"name": "libmagickcore-6-arch-config:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u8"
},
{
"name": "libmagickcore-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u8"
},
{
"name": "libmagickcore-6.q16-2-extra:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u8"
},
{
"name": "libmagickwand-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u8"
},
{
"name": "imagemagick-6.q16",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u8"
},
{
"name": "imagemagick",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u8"
},
{
"name": "libmagickwand-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u8"
},
{
"name": "libmagickwand-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u8"
},
{
"name": "imagemagick-common",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u8"
},
{
"name": "libmagickcore-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u8"
},
{
"name": "libmagickwand-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u8"
},
{
"name": "libmagickcore-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u8"
}
],
"category": "Debian",
"firstFound": "1726223192921",
"lastFound": "1726570859846",
"published": 1490007711000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true
}
},
{
"title": "Debian Security Update for git (DSA 3934-1)",
"qid": 176109,
"cveids": [
"CVE-2017-1000117"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "git-man",
"version": "1:2.1.4-2.1+deb8u2",
"fixVersion": "1:2.1.4-2.1+deb8u4"
},
{
"name": "git",
"version": "1:2.1.4-2.1+deb8u2",
"fixVersion": "1:2.1.4-2.1+deb8u4"
}
],
"category": "Debian",
"firstFound": "1726223192930",
"lastFound": "1726570859853",
"published": 1502964196000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for bundler (GHSA-fj7f-vq84-fh43)",
"qid": 988317,
"cveids": [
"CVE-2021-43809"
],
"cvssInfo": {
"baseScore": "9.3",
"temporalScore": "7.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.3",
"temporalScore": "6.6"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "bundler",
"version": "1.13.7",
"fixVersion": "2.2.33",
"packagePath": "usr/local/lib/ruby/gems/2.3.0/specifications/bundler-1.13.7.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860265",
"lastFound": "1726570860265",
"published": 1666790957000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"highDataLoss": true,
"highLateralMovement": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for systemd (DLA 1762-2)",
"qid": 176923,
"cveids": [
"CVE-2017-18078"
],
"cvssInfo": {
"baseScore": "4.6",
"temporalScore": "3.6",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "7.8",
"temporalScore": "7.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "udev",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u13"
},
{
"name": "libsystemd0:amd64",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u13"
},
{
"name": "systemd-sysv",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u13"
},
{
"name": "libudev1:amd64",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u13"
},
{
"name": "systemd",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u13"
}
],
"category": "Debian",
"firstFound": "1726223192959",
"lastFound": "1726570859878",
"published": 1560767369000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for glib2.0 (DLA 1866-2)",
"qid": 177085,
"cveids": [
"CVE-2019-13012"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libglib2.0-dev",
"version": "2.42.1-1+b1",
"fixVersion": "2.42.1-1+deb8u3"
},
{
"name": "libglib2.0-data",
"version": "2.42.1-1",
"fixVersion": "2.42.1-1+deb8u3"
},
{
"name": "libglib2.0-bin",
"version": "2.42.1-1+b1",
"fixVersion": "2.42.1-1+deb8u3"
},
{
"name": "libglib2.0-0:amd64",
"version": "2.42.1-1+b1",
"fixVersion": "2.42.1-1+deb8u3"
}
],
"category": "Debian",
"firstFound": "1726223192964",
"lastFound": "1726570859882",
"published": 1566210022000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for gnutls28 (DLA 1560-1)",
"qid": 177117,
"cveids": [
"CVE-2018-10844",
"CVE-2018-10845",
"CVE-2018-10846"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.2",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.9",
"temporalScore": "5.2"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libgnutls-deb0-28:amd64",
"version": "3.3.8-6+deb8u3",
"fixVersion": "3.3.30-0+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192965",
"lastFound": "1726570859883",
"published": 1566210023000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for Open Secure Sockets Layer (OpenSSL) (DSA 4157-1)",
"qid": 176339,
"cveids": [
"CVE-2017-3738",
"CVE-2018-0739"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.2",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.5",
"temporalScore": "5.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libssl1.0.0:amd64",
"version": "1.0.1t-1+deb8u5",
"fixVersion": "1.0.1t-1+deb8u8"
},
{
"name": "libssl-dev:amd64",
"version": "1.0.1t-1+deb8u5",
"fixVersion": "1.0.1t-1+deb8u8"
},
{
"name": "openssl",
"version": "1.0.1t-1+deb8u5",
"fixVersion": "1.0.1t-1+deb8u8"
}
],
"category": "Debian",
"firstFound": "1726223192942",
"lastFound": "1726570859862",
"published": 1522655886000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for openldap (DLA 2199-1)",
"qid": 177829,
"cveids": [
"CVE-2020-12243"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libldap-2.4-2:amd64",
"version": "2.4.40+dfsg-1+deb8u2",
"fixVersion": "2.4.40+dfsg-1+deb8u6"
}
],
"category": "Debian",
"firstFound": "1726223192982",
"lastFound": "1726570859900",
"published": 1592829964000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for libssh2 (DLA 1730-4)",
"qid": 177078,
"cveids": [
"CVE-2019-3860"
],
"cvssInfo": {
"baseScore": "6.4",
"temporalScore": "4.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.1",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libssh2-1:amd64",
"version": "1.4.3-4.1+deb8u1",
"fixVersion": "1.4.3-4.1+deb8u5"
}
],
"category": "Debian",
"firstFound": "1726223192963",
"lastFound": "1726570859881",
"published": 1567076424000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for postgresql-9.4 (DSA 3935-1)",
"qid": 176110,
"cveids": [
"CVE-2017-7546",
"CVE-2017-7547",
"CVE-2017-7548"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libpq-dev",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.13-0+deb8u1"
},
{
"name": "postgresql-client-9.4",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.13-0+deb8u1"
},
{
"name": "libpq5:amd64",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.13-0+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192930",
"lastFound": "1726570859853",
"published": 1502964196000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for mysql-5.5 (DSA 4002-1)",
"qid": 176181,
"cveids": [
"CVE-2017-10268",
"CVE-2017-10378",
"CVE-2017-10379",
"CVE-2017-10384"
],
"cvssInfo": {
"baseScore": "4.0",
"temporalScore": "3.0",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.5",
"temporalScore": "5.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libmysqlclient18:amd64",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.58-0+deb8u1"
},
{
"name": "mysql-client",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.58-0+deb8u1"
},
{
"name": "mysql-client-5.5",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.58-0+deb8u1"
},
{
"name": "libmysqlclient-dev",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.58-0+deb8u1"
},
{
"name": "mysql-common",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.58-0+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192935",
"lastFound": "1726570859856",
"published": 1510565038000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for Open Secure Sockets Layer (OpenSSL) (DLA 1932-1)",
"qid": 177351,
"cveids": [
"CVE-2019-1547",
"CVE-2019-1563"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.2",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "4.7",
"temporalScore": "4.1"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libssl1.0.0:amd64",
"version": "1.0.1t-1+deb8u5",
"fixVersion": "1.0.1t-1+deb8u12"
},
{
"name": "libssl-dev:amd64",
"version": "1.0.1t-1+deb8u5",
"fixVersion": "1.0.1t-1+deb8u12"
},
{
"name": "openssl",
"version": "1.0.1t-1+deb8u5",
"fixVersion": "1.0.1t-1+deb8u12"
}
],
"category": "Debian",
"firstFound": "1726223192973",
"lastFound": "1726570859890",
"published": 1570056498000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for curl (DSA 3992-1)",
"qid": 176172,
"cveids": [
"CVE-2017-1000100",
"CVE-2017-1000101",
"CVE-2017-1000254"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libcurl3-gnutls:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u6"
},
{
"name": "libcurl4-openssl-dev:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u6"
},
{
"name": "libcurl3:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u6"
},
{
"name": "curl",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u6"
}
],
"category": "Debian",
"firstFound": "1726223192934",
"lastFound": "1726570859856",
"published": 1508229407000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for wget (DSA 4008-1)",
"qid": 176187,
"cveids": [
"CVE-2017-13089",
"CVE-2017-13090"
],
"cvssInfo": {
"baseScore": "9.3",
"temporalScore": "7.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "wget",
"version": "1.16-1+deb8u1",
"fixVersion": "1.16-1+deb8u4"
}
],
"category": "Debian",
"firstFound": "1726223192935",
"lastFound": "1726570859857",
"published": 1510565038000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"highDataLoss": true,
"highLateralMovement": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for expat (DSA 3898-1)",
"qid": 176077,
"cveids": [
"CVE-2016-9063",
"CVE-2017-9233"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libexpat1-dev:amd64",
"version": "2.1.0-6+deb8u3",
"fixVersion": "2.1.0-6+deb8u4"
},
{
"name": "libexpat1:amd64",
"version": "2.1.0-6+deb8u3",
"fixVersion": "2.1.0-6+deb8u4"
}
],
"category": "Debian",
"firstFound": "1726223192928",
"lastFound": "1726570859852",
"published": 1499333160000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for lcms2 (DLA 1496-1)",
"qid": 177225,
"cveids": [
"CVE-2018-16435"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.5",
"temporalScore": "5.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "liblcms2-2:amd64",
"version": "2.6-3+b3",
"fixVersion": "2.6-3+deb8u2"
},
{
"name": "liblcms2-dev:amd64",
"version": "2.6-3+b3",
"fixVersion": "2.6-3+deb8u2"
}
],
"category": "Debian",
"firstFound": "1726223192969",
"lastFound": "1726570859886",
"published": 1566210024000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for libtasn1-6 (DSA 3861-1)",
"qid": 176041,
"cveids": [
"CVE-2017-6891"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.0",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libtasn1-6:amd64",
"version": "4.2-3+deb8u2",
"fixVersion": "4.2-3+deb8u3"
}
],
"category": "Debian",
"firstFound": "1726223192925",
"lastFound": "1726570859849",
"published": 1496039362000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for libxpm (DSA 3772-1)",
"qid": 175947,
"cveids": [
"CVE-2016-10164"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libxpm4:amd64",
"version": "1:3.5.11-1+b1",
"fixVersion": "1:3.5.12-0+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192919",
"lastFound": "1726570859844",
"published": 1485778378000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Ruby (rubygems) Security Update for rails-html-sanitizer (GHSA-pg8v-g4xq-hww9)",
"qid": 987474,
"cveids": [
"CVE-2022-32209"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.1",
"temporalScore": "5.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "rails-html-sanitizer",
"version": "1.0.3",
"fixVersion": "1.4.3",
"packagePath": "usr/local/bundle/specifications/rails-html-sanitizer-1.0.3.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570859964",
"lastFound": "1726570859964",
"published": 1663677763000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for harfbuzz (DLA 2040-1)",
"qid": 177551,
"cveids": [
"CVE-2015-8947"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.6",
"temporalScore": "6.6"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libharfbuzz0b:amd64",
"version": "0.9.35-2",
"fixVersion": "0.9.35-2+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192976",
"lastFound": "1726570859894",
"published": 1578572917000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-2qc6-mcvw-92cw)",
"qid": 988554,
"cveids": [
"CVE-2022-2309",
"CVE-2022-40303",
"CVE-2022-40304"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.8",
"temporalScore": "7.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "nokogiri",
"version": "1.7.0.1",
"fixVersion": "1.13.9",
"packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860476",
"lastFound": "1726570860476",
"published": 1667826869000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for libxml2 (DSA 3744-1)",
"qid": 175920,
"cveids": [
"CVE-2016-4658",
"CVE-2016-5131"
],
"cvssInfo": {
"baseScore": "10.0",
"temporalScore": "7.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libxml2:amd64",
"version": "2.9.1+dfsg1-5+deb8u3",
"fixVersion": "2.9.1+dfsg1-5+deb8u4"
},
{
"name": "libxml2-dev:amd64",
"version": "2.9.1+dfsg1-5+deb8u3",
"fixVersion": "2.9.1+dfsg1-5+deb8u4"
}
],
"category": "Debian",
"firstFound": "1726223192917",
"lastFound": "1726570859841",
"published": 1482997806000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true,
"highDataLoss": true,
"highLateralMovement": true
}
},
{
"title": "Debian Security Update for libexif (DLA 2214-1)",
"qid": 177820,
"cveids": [
"CVE-2016-6328",
"CVE-2017-7544",
"CVE-2018-20030",
"CVE-2020-0093",
"CVE-2020-12767"
],
"cvssInfo": {
"baseScore": "7.8",
"temporalScore": "6.1",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.1",
"temporalScore": "8.2"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libexif-dev",
"version": "0.6.21-2",
"fixVersion": "0.6.21-2+deb8u2"
},
{
"name": "libexif12:amd64",
"version": "0.6.21-2",
"fixVersion": "0.6.21-2+deb8u2"
}
],
"category": "Debian",
"firstFound": "1726223192981",
"lastFound": "1726570859900",
"published": 1592829964000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for wget (DLA 1760-1)",
"qid": 176864,
"cveids": [
"CVE-2019-5953"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.5",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "wget",
"version": "1.16-1+deb8u1",
"fixVersion": "1.16-1+deb8u6"
}
],
"category": "Debian",
"firstFound": "1726223192957",
"lastFound": "1726570859876",
"published": 1556190374000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for openssh (DLA-1474-1)",
"qid": 177165,
"cveids": [
"CVE-2018-15473"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "4.1",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.3",
"temporalScore": "4.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "openssh-client",
"version": "1:6.7p1-5+deb8u3",
"fixVersion": "1:6.7p1-5+deb8u5"
}
],
"category": "Debian",
"firstFound": "1726223192967",
"lastFound": "1726570859884",
"published": 1566210023000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"activeAttacks": true,
"easyExploit": true,
"malware": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for Open Secure Sockets Layer (OpenSSL) (DLA 1586-1)",
"qid": 176828,
"cveids": [
"CVE-2018-0735",
"CVE-2018-5407"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.9",
"temporalScore": "5.3"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libssl1.0.0:amd64",
"version": "1.0.1t-1+deb8u5",
"fixVersion": "1.0.1t-1+deb8u10"
},
{
"name": "libssl-dev:amd64",
"version": "1.0.1t-1+deb8u5",
"fixVersion": "1.0.1t-1+deb8u10"
},
{
"name": "openssl",
"version": "1.0.1t-1+deb8u5",
"fixVersion": "1.0.1t-1+deb8u10"
}
],
"category": "Debian",
"firstFound": "1726223192955",
"lastFound": "1726570859874",
"published": 1554890301000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for rack (GHSA-hxqx-xwvh-44m2)",
"qid": 988310,
"cveids": [
"CVE-2022-30122"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "rack",
"version": "2.0.1",
"fixVersion": "2.0.9.1",
"packagePath": "usr/local/bundle/specifications/rack-2.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860238",
"lastFound": "1726570860238",
"published": 1666790957000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for libxml2 (DSA 3952-1)",
"qid": 176131,
"cveids": [
"CVE-2017-0663",
"CVE-2017-7375",
"CVE-2017-7376",
"CVE-2017-9047",
"CVE-2017-9048",
"CVE-2017-9049",
"CVE-2017-9050"
],
"cvssInfo": {
"baseScore": "10.0",
"temporalScore": "7.8",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libxml2:amd64",
"version": "2.9.1+dfsg1-5+deb8u3",
"fixVersion": "2.9.1+dfsg1-5+deb8u5"
},
{
"name": "libxml2-dev:amd64",
"version": "2.9.1+dfsg1-5+deb8u3",
"fixVersion": "2.9.1+dfsg1-5+deb8u5"
}
],
"category": "Debian",
"firstFound": "1726223192931",
"lastFound": "1726570859854",
"published": 1504042524000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true,
"highDataLoss": true,
"highLateralMovement": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for imagemagick (DSA 3863-1)",
"qid": 176047,
"cveids": [
"CVE-2017-7606",
"CVE-2017-7619",
"CVE-2017-7941",
"CVE-2017-7943",
"CVE-2017-8343",
"CVE-2017-8344",
"CVE-2017-8345",
"CVE-2017-8346",
"CVE-2017-8347",
"CVE-2017-8348",
"CVE-2017-8349",
"CVE-2017-8350",
"CVE-2017-8351",
"CVE-2017-8352",
"CVE-2017-8353",
"CVE-2017-8354",
"CVE-2017-8355",
"CVE-2017-8356",
"CVE-2017-8357",
"CVE-2017-8765",
"CVE-2017-8830",
"CVE-2017-9098",
"CVE-2017-9141",
"CVE-2017-9142",
"CVE-2017-9143",
"CVE-2017-9144"
],
"cvssInfo": {
"baseScore": "7.1",
"temporalScore": "5.6",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libmagickcore-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u9"
},
{
"name": "libmagickcore-6-arch-config:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u9"
},
{
"name": "libmagickcore-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u9"
},
{
"name": "libmagickcore-6.q16-2-extra:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u9"
},
{
"name": "libmagickwand-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u9"
},
{
"name": "imagemagick-6.q16",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u9"
},
{
"name": "imagemagick",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u9"
},
{
"name": "libmagickwand-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u9"
},
{
"name": "libmagickwand-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u9"
},
{
"name": "imagemagick-common",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u9"
},
{
"name": "libmagickcore-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u9"
},
{
"name": "libmagickwand-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u9"
},
{
"name": "libmagickcore-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u9"
}
],
"category": "Debian",
"firstFound": "1726223192926",
"lastFound": "1726570859849",
"published": 1496311197000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for libexif (DLA 2222-1)",
"qid": 177827,
"cveids": [
"CVE-2018-20030",
"CVE-2020-13112",
"CVE-2020-13113",
"CVE-2020-13114",
"CVE-2020-0093"
],
"cvssInfo": {
"baseScore": "7.8",
"temporalScore": "5.8",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.1",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libexif-dev",
"version": "0.6.21-2",
"fixVersion": "0.6.21-2+deb8u3"
},
{
"name": "libexif12:amd64",
"version": "0.6.21-2",
"fixVersion": "0.6.21-2+deb8u3"
}
],
"category": "Debian",
"firstFound": "1726223192982",
"lastFound": "1726570859900",
"published": 1592829964000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true
}
},
{
"title": "Debian Security Update for libxml2 (DLA 2048-1)",
"qid": 177566,
"cveids": [
"CVE-2019-19956"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libxml2:amd64",
"version": "2.9.1+dfsg1-5+deb8u3",
"fixVersion": "2.9.1+dfsg1-5+deb8u8"
},
{
"name": "libxml2-dev:amd64",
"version": "2.9.1+dfsg1-5+deb8u3",
"fixVersion": "2.9.1+dfsg1-5+deb8u8"
}
],
"category": "Debian",
"firstFound": "1726223192977",
"lastFound": "1726570859896",
"published": 1578572917000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for mysql-5.5 (DSA 3922-1)",
"qid": 176102,
"cveids": [
"CVE-2017-3635",
"CVE-2017-3636",
"CVE-2017-3641",
"CVE-2017-3648",
"CVE-2017-3651",
"CVE-2017-3652",
"CVE-2017-3653"
],
"cvssInfo": {
"baseScore": "4.9",
"temporalScore": "3.6",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.3",
"temporalScore": "4.6"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libmysqlclient18:amd64",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.57-0+deb8u1"
},
{
"name": "mysql-client",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.57-0+deb8u1"
},
{
"name": "mysql-client-5.5",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.57-0+deb8u1"
},
{
"name": "libmysqlclient-dev",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.57-0+deb8u1"
},
{
"name": "mysql-common",
"version": "5.5.53-0+deb8u1",
"fixVersion": "5.5.57-0+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192930",
"lastFound": "1726570859853",
"published": 1502101038000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for icu (DSA 4150-1)",
"qid": 176332,
"cveids": [
"CVE-2017-15422"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.2",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.5",
"temporalScore": "5.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libicu52:amd64",
"version": "52.1-8+deb8u4",
"fixVersion": "52.1-8+deb8u7"
}
],
"category": "Debian",
"firstFound": "1726223192942",
"lastFound": "1726570859862",
"published": 1522412258000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Rubygems (Rubygems) Security Update for loofah (GHSA-g4xq-jx4w-4cjv)",
"qid": 988691,
"cveids": [
"CVE-2018-16468"
],
"cvssInfo": {
"baseScore": "3.5",
"temporalScore": "2.6",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.4",
"temporalScore": "4.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "loofah",
"version": "2.0.3",
"fixVersion": "2.2.3",
"packagePath": "usr/local/bundle/specifications/loofah-2.0.3.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860566",
"lastFound": "1726570860566",
"published": 1667826875000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for libexif (DLA 2100-1)",
"qid": 177659,
"cveids": [
"CVE-2019-9278",
"CVE-2020-0181"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.0",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libexif-dev",
"version": "0.6.21-2",
"fixVersion": "0.6.21-2+deb8u1"
},
{
"name": "libexif12:amd64",
"version": "0.6.21-2",
"fixVersion": "0.6.21-2+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192979",
"lastFound": "1726570859897",
"published": 1585568825000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-xxx9-3xcr-gjj3)",
"qid": 988059,
"cveids": [
"CVE-2022-23437"
],
"cvssInfo": {
"baseScore": "7.1",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.5",
"temporalScore": "5.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "nokogiri",
"version": "1.7.0.1",
"fixVersion": "1.13.4",
"packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860183",
"lastFound": "1726570860183",
"published": 1665668565000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true
}
},
{
"title": "Debian Security Update for expat (DLA 1912-1)",
"qid": 177324,
"cveids": [
"CVE-2019-15903"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libexpat1-dev:amd64",
"version": "2.1.0-6+deb8u3",
"fixVersion": "2.1.0-6+deb8u6"
},
{
"name": "libexpat1:amd64",
"version": "2.1.0-6+deb8u3",
"fixVersion": "2.1.0-6+deb8u6"
}
],
"category": "Debian",
"firstFound": "1726223192972",
"lastFound": "1726570859889",
"published": 1569235400000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for curl (DSA 4202-1)",
"qid": 176381,
"cveids": [
"CVE-2018-1000301"
],
"cvssInfo": {
"baseScore": "6.4",
"temporalScore": "4.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.1",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libcurl3-gnutls:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u11"
},
{
"name": "libcurl4-openssl-dev:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u11"
},
{
"name": "libcurl3:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u11"
},
{
"name": "curl",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u11"
}
],
"category": "Debian",
"firstFound": "1726223192943",
"lastFound": "1726570859863",
"published": 1526899896000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for gdk-pixbuf (DLA 2043-1)",
"qid": 177892,
"cveids": [
"CVE-2016-6352",
"CVE-2017-2870",
"CVE-2017-6312",
"CVE-2017-6313",
"CVE-2017-6314"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.8",
"temporalScore": "7.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "gir1.2-gdkpixbuf-2.0",
"version": "2.31.1-2+deb8u5",
"fixVersion": "2.31.1-2+deb8u8"
},
{
"name": "libgdk-pixbuf2.0-dev",
"version": "2.31.1-2+deb8u5",
"fixVersion": "2.31.1-2+deb8u8"
},
{
"name": "libgdk-pixbuf2.0-0:amd64",
"version": "2.31.1-2+deb8u5",
"fixVersion": "2.31.1-2+deb8u8"
},
{
"name": "libgdk-pixbuf2.0-common",
"version": "2.31.1-2+deb8u5",
"fixVersion": "2.31.1-2+deb8u8"
}
],
"category": "Debian",
"firstFound": "1726223192984",
"lastFound": "1726570859902",
"published": 1592829965000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for libxml2 (DLA 1524-1)",
"qid": 177229,
"cveids": [
"CVE-2017-18258",
"CVE-2018-9251",
"CVE-2018-14404",
"CVE-2018-14567"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libxml2:amd64",
"version": "2.9.1+dfsg1-5+deb8u3",
"fixVersion": "2.9.1+dfsg1-5+deb8u7"
},
{
"name": "libxml2-dev:amd64",
"version": "2.9.1+dfsg1-5+deb8u3",
"fixVersion": "2.9.1+dfsg1-5+deb8u7"
}
],
"category": "Debian",
"firstFound": "1726223192969",
"lastFound": "1726570859886",
"published": 1566210024000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for git (DSA 4212-1)",
"qid": 176394,
"cveids": [
"CVE-2018-11235"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.8",
"temporalScore": "7.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "git-man",
"version": "1:2.1.4-2.1+deb8u2",
"fixVersion": "1:2.1.4-2.1+deb8u6"
},
{
"name": "git",
"version": "1:2.1.4-2.1+deb8u2",
"fixVersion": "1:2.1.4-2.1+deb8u6"
}
],
"category": "Debian",
"firstFound": "1726223192945",
"lastFound": "1726570859865",
"published": 1528111651000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for libgcrypt20 (DSA 3901-1)",
"qid": 176079,
"cveids": [
"CVE-2017-7526"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.2",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.8",
"temporalScore": "5.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libgcrypt20:amd64",
"version": "1.6.3-2+deb8u2",
"fixVersion": "1.6.3-2+deb8u4"
}
],
"category": "Debian",
"firstFound": "1726223192928",
"lastFound": "1726570859852",
"published": 1499682317000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for curl (DSA 4007-1)",
"qid": 176186,
"cveids": [
"CVE-2017-1000257"
],
"cvssInfo": {
"baseScore": "6.4",
"temporalScore": "4.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.1",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libcurl3-gnutls:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u7"
},
{
"name": "libcurl4-openssl-dev:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u7"
},
{
"name": "libcurl3:amd64",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u7"
},
{
"name": "curl",
"version": "7.38.0-4+deb8u5",
"fixVersion": "7.38.0-4+deb8u7"
}
],
"category": "Debian",
"firstFound": "1726223192935",
"lastFound": "1726570859856",
"published": 1510565038000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for imagemagick (DLA 1530-1)",
"qid": 177103,
"cveids": [
"CVE-2018-16412",
"CVE-2018-16413",
"CVE-2018-16642",
"CVE-2018-16643",
"CVE-2018-16644",
"CVE-2018-16645",
"CVE-2018-16749"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libmagickcore-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u14"
},
{
"name": "libmagickcore-6-arch-config:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u14"
},
{
"name": "libmagickcore-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u14"
},
{
"name": "libmagickcore-6.q16-2-extra:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u14"
},
{
"name": "libmagickwand-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u14"
},
{
"name": "imagemagick-6.q16",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u14"
},
{
"name": "imagemagick",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u14"
},
{
"name": "libmagickwand-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u14"
},
{
"name": "libmagickwand-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u14"
},
{
"name": "imagemagick-common",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u14"
},
{
"name": "libmagickcore-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u14"
},
{
"name": "libmagickwand-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u14"
},
{
"name": "libmagickcore-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u14"
}
],
"category": "Debian",
"firstFound": "1726223192964",
"lastFound": "1726570859882",
"published": 1566210022000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for tzdata (DLA 1563-1)",
"qid": 176809,
"cvssInfo": {
"baseScore": "6.0",
"temporalScore": "4.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.0",
"temporalScore": "4.4"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "tzdata",
"version": "2016j-0+deb8u1",
"fixVersion": "2018g-0+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192954",
"lastFound": "1726570859873",
"published": 1554890301000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Ruby (rubygems) Security Update for nokogiri (GHSA-7rrm-v45f-jp64)",
"qid": 987482,
"cveids": [
"CVE-2019-20388",
"CVE-2020-24977",
"CVE-2020-7595",
"CVE-2021-3516",
"CVE-2021-3517",
"CVE-2021-3518",
"CVE-2021-3537",
"CVE-2021-3541"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "nokogiri",
"version": "1.7.0.1",
"fixVersion": "1.11.4",
"packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570859967",
"lastFound": "1726570859967",
"published": 1663677763000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for gnutls28 (DSA 3884-1)",
"qid": 176065,
"cveids": [
"CVE-2017-7507"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libgnutls-deb0-28:amd64",
"version": "3.3.8-6+deb8u3",
"fixVersion": "3.3.8-6+deb8u6"
}
],
"category": "Debian",
"firstFound": "1726223192927",
"lastFound": "1726570859851",
"published": 1498130835000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for freetype (DSA 3839-1)",
"qid": 176017,
"cveids": [
"CVE-2016-10244",
"CVE-2017-8105",
"CVE-2017-8287"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libfreetype6:amd64",
"version": "2.5.2-3+deb8u1",
"fixVersion": "2.5.2-3+deb8u2"
},
{
"name": "libfreetype6-dev",
"version": "2.5.2-3+deb8u1",
"fixVersion": "2.5.2-3+deb8u2"
}
],
"category": "Debian",
"firstFound": "1726223192923",
"lastFound": "1726570859847",
"published": 1494411859000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for systemd (DLA 1684-1)",
"qid": 176686,
"cveids": [
"CVE-2019-6454"
],
"cvssInfo": {
"baseScore": "4.9",
"temporalScore": "3.9",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "5.5",
"temporalScore": "5.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "udev",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u10"
},
{
"name": "libsystemd0:amd64",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u10"
},
{
"name": "systemd-sysv",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u10"
},
{
"name": "libudev1:amd64",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u10"
},
{
"name": "systemd",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u10"
}
],
"category": "Debian",
"firstFound": "1726223192947",
"lastFound": "1726570859867",
"published": 1553546619000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for imagemagick (DLA 1574-1)",
"qid": 176836,
"cveids": [
"CVE-2018-18025"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.5",
"temporalScore": "5.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libmagickcore-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u15"
},
{
"name": "libmagickcore-6-arch-config:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u15"
},
{
"name": "libmagickcore-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u15"
},
{
"name": "libmagickcore-6.q16-2-extra:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u15"
},
{
"name": "libmagickwand-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u15"
},
{
"name": "imagemagick-6.q16",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u15"
},
{
"name": "imagemagick",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u15"
},
{
"name": "libmagickwand-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u15"
},
{
"name": "libmagickwand-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u15"
},
{
"name": "imagemagick-common",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u15"
},
{
"name": "libmagickcore-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u15"
},
{
"name": "libmagickwand-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u15"
},
{
"name": "libmagickcore-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u15"
}
],
"category": "Debian",
"firstFound": "1726223192956",
"lastFound": "1726570859875",
"published": 1554890301000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for actionview (GHSA-cfjv-5498-mph5)",
"qid": 988374,
"cveids": [
"CVE-2020-15169"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.2",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.1",
"temporalScore": "5.3"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "actionview",
"version": "5.0.1",
"fixVersion": "5.2.4.4",
"packagePath": "usr/local/bundle/specifications/actionview-5.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860320",
"lastFound": "1726570860320",
"published": 1666790958000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Rubygems (Rubygems) Security Update for rails-html-sanitizer (GHSA-px3r-jm9g-c8w8)",
"qid": 988608,
"cveids": [
"CVE-2018-3741"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.2",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.1",
"temporalScore": "5.3"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "rails-html-sanitizer",
"version": "1.0.3",
"fixVersion": "1.0.4",
"packagePath": "usr/local/bundle/specifications/rails-html-sanitizer-1.0.3.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860486",
"lastFound": "1726570860486",
"published": 1667826871000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for libgcrypt20 (DLA 1931-1)",
"qid": 177349,
"cveids": [
"CVE-2019-13627"
],
"cvssInfo": {
"baseScore": "2.6",
"temporalScore": "1.9",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "6.3",
"temporalScore": "5.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libgcrypt20:amd64",
"version": "1.6.3-2+deb8u2",
"fixVersion": "1.6.3-2+deb8u6"
}
],
"category": "Debian",
"firstFound": "1726223192973",
"lastFound": "1726570859890",
"published": 1570056498000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for gcc-4.9 (DSA 4117-1)",
"qid": 176298,
"cvssInfo": {
"baseScore": "6.0",
"temporalScore": "4.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "0.0",
"temporalScore": "0.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libstdc++6:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u1"
},
{
"name": "libasan1:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u1"
},
{
"name": "libstdc++-4.9-dev:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u1"
},
{
"name": "libgomp1:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u1"
},
{
"name": "libubsan0:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u1"
},
{
"name": "gcc-4.9",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u1"
},
{
"name": "libgcc-4.9-dev:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u1"
},
{
"name": "libtsan0:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u1"
},
{
"name": "g++-4.9",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u1"
},
{
"name": "libatomic1:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u1"
},
{
"name": "libcilkrts5:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u1"
},
{
"name": "cpp-4.9",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u1"
},
{
"name": "gcc-4.9-base:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u1"
},
{
"name": "liblsan0:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u1"
},
{
"name": "libquadmath0:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u1"
},
{
"name": "libitm1:amd64",
"version": "4.9.2-10",
"fixVersion": "4.9.2-10+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192940",
"lastFound": "1726570859861",
"published": 1519205533000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for wget (DSA 4195-1)",
"qid": 176375,
"cveids": [
"CVE-2018-0494"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.5",
"temporalScore": "5.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "wget",
"version": "1.16-1+deb8u1",
"fixVersion": "1.16-1+deb8u5"
}
],
"category": "Debian",
"firstFound": "1726223192943",
"lastFound": "1726570859863",
"published": 1525952240000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for djvulibre (DLA 1902-1)",
"qid": 177331,
"cveids": [
"CVE-2019-15142",
"CVE-2019-15143",
"CVE-2019-15144",
"CVE-2019-15145"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.5",
"temporalScore": "5.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libdjvulibre-dev:amd64",
"version": "3.5.25.4-4+b1",
"fixVersion": "3.5.25.4-4+deb8u1"
},
{
"name": "libdjvulibre-text",
"version": "3.5.25.4-4",
"fixVersion": "3.5.25.4-4+deb8u1"
},
{
"name": "libdjvulibre21:amd64",
"version": "3.5.25.4-4+b1",
"fixVersion": "3.5.25.4-4+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192972",
"lastFound": "1726570859889",
"published": 1569235400000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for libvpx (DLA 2012-1)",
"qid": 177877,
"cveids": [
"CVE-2019-9232",
"CVE-2019-9433"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libvpx1:amd64",
"version": "1.3.0-3",
"fixVersion": "1.3.0-3+deb8u2"
}
],
"category": "Debian",
"firstFound": "1726223192984",
"lastFound": "1726570859902",
"published": 1592829965000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for subversion (DLA 1903-1)",
"qid": 177301,
"cveids": [
"CVE-2018-11782",
"CVE-2019-0203"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "subversion",
"version": "1.8.10-6+deb8u4",
"fixVersion": "1.8.10-6+deb8u7"
},
{
"name": "libsvn1:amd64",
"version": "1.8.10-6+deb8u4",
"fixVersion": "1.8.10-6+deb8u7"
}
],
"category": "Debian",
"firstFound": "1726223192970",
"lastFound": "1726570859888",
"published": 1569235400000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for rails-html-sanitizer (GHSA-9h9g-93gc-623h)",
"qid": 990939,
"cveids": [
"CVE-2022-23519"
],
"cvssInfo": {
"baseScore": "5.4",
"temporalScore": "4.3",
"accessVector": "Adjacent Network"
},
"cvss3Info": {
"baseScore": "6.1",
"temporalScore": "5.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "rails-html-sanitizer",
"version": "1.0.3",
"fixVersion": "1.4.4",
"packagePath": "usr/local/bundle/specifications/rails-html-sanitizer-1.0.3.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860580",
"lastFound": "1726570860580",
"published": 1672837004000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"highLateralMovement": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for tiff (DLA 1897-1)",
"qid": 177330,
"cveids": [
"CVE-2019-14973"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.2",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.5",
"temporalScore": "5.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libtiff5:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u9"
},
{
"name": "libtiff5-dev:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u9"
},
{
"name": "libtiffxx5:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u9"
}
],
"category": "Debian",
"firstFound": "1726223192972",
"lastFound": "1726570859889",
"published": 1569235400000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for libjpeg-turbo (DLA 1719-1)",
"qid": 176652,
"cveids": [
"CVE-2018-14498"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.5",
"temporalScore": "5.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libjpeg62-turbo:amd64",
"version": "1:1.3.1-12",
"fixVersion": "1:1.3.1-12+deb8u2"
},
{
"name": "libjpeg-dev",
"version": "1:1.3.1-12",
"fixVersion": "1:1.3.1-12+deb8u2"
},
{
"name": "libjpeg62-turbo-dev:amd64",
"version": "1:1.3.1-12",
"fixVersion": "1:1.3.1-12+deb8u2"
}
],
"category": "Debian",
"firstFound": "1726223192947",
"lastFound": "1726570859866",
"published": 1553546619000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for libxslt (DLA 1973-1)",
"qid": 177429,
"cveids": [
"CVE-2019-18197"
],
"cvssInfo": {
"baseScore": "5.1",
"temporalScore": "3.8",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libxslt1-dev:amd64",
"version": "1.1.28-2+deb8u2",
"fixVersion": "1.1.28-2+deb8u6"
},
{
"name": "libxslt1.1:amd64",
"version": "1.1.28-2+deb8u2",
"fixVersion": "1.1.28-2+deb8u6"
}
],
"category": "Debian",
"firstFound": "1726223192974",
"lastFound": "1726570859892",
"published": 1572345060000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for perl (DSA 3873-1)",
"qid": 176052,
"cveids": [
"CVE-2017-6512"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.2",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.9",
"temporalScore": "5.2"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "perl",
"version": "5.20.2-3+deb8u6",
"fixVersion": "5.20.2-3+deb8u7"
},
{
"name": "perl-modules",
"version": "5.20.2-3+deb8u6",
"fixVersion": "5.20.2-3+deb8u7"
},
{
"name": "perl-base",
"version": "5.20.2-3+deb8u6",
"fixVersion": "5.20.2-3+deb8u7"
}
],
"category": "Debian",
"firstFound": "1726223192926",
"lastFound": "1726570859850",
"published": 1496913696000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for gnupg (DSA 3960-1)",
"qid": 176139,
"cveids": [
"CVE-2017-7526"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.2",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.8",
"temporalScore": "5.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "gpgv",
"version": "1.4.18-7+deb8u3",
"fixVersion": "1.4.18-7+deb8u4"
},
{
"name": "gnupg",
"version": "1.4.18-7+deb8u3",
"fixVersion": "1.4.18-7+deb8u4"
}
],
"category": "Debian",
"firstFound": "1726223192931",
"lastFound": "1726570859854",
"published": 1505381043000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for git (DLA 2182-1)",
"qid": 177759,
"cveids": [
"CVE-2020-11008"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "git-man",
"version": "1:2.1.4-2.1+deb8u2",
"fixVersion": "1:2.1.4-2.1+deb8u10"
},
{
"name": "git",
"version": "1:2.1.4-2.1+deb8u2",
"fixVersion": "1:2.1.4-2.1+deb8u10"
}
],
"category": "Debian",
"firstFound": "1726223192981",
"lastFound": "1726570859899",
"published": 1588680879000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for expat (DLA 1839-1)",
"qid": 177042,
"cveids": [
"CVE-2018-20843"
],
"cvssInfo": {
"baseScore": "7.8",
"temporalScore": "6.1",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libexpat1-dev:amd64",
"version": "2.1.0-6+deb8u3",
"fixVersion": "2.1.0-6+deb8u5"
},
{
"name": "libexpat1:amd64",
"version": "2.1.0-6+deb8u3",
"fixVersion": "2.1.0-6+deb8u5"
}
],
"category": "Debian",
"firstFound": "1726223192961",
"lastFound": "1726570859880",
"published": 1563274190000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"denialOfService": true,
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Long Term Support (LTS) Security Update for Open Secure Sockets Layer (OpenSSL) (DLA 1449-1)",
"qid": 177256,
"cveids": [
"CVE-2018-0732",
"CVE-2018-0737"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libssl1.0.0:amd64",
"version": "1.0.1t-1+deb8u5",
"fixVersion": "1.0.1t-1+deb8u9"
},
{
"name": "libssl-dev:amd64",
"version": "1.0.1t-1+deb8u5",
"fixVersion": "1.0.1t-1+deb8u9"
},
{
"name": "openssl",
"version": "1.0.1t-1+deb8u5",
"fixVersion": "1.0.1t-1+deb8u9"
}
],
"category": "Debian",
"firstFound": "1726223192970",
"lastFound": "1726570859887",
"published": 1566210024000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for glibc (DSA 3887-1) (Stack Clash)",
"qid": 176066,
"cveids": [
"CVE-2017-1000366"
],
"cvssInfo": {
"baseScore": "7.2",
"temporalScore": "6.0",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "7.8",
"temporalScore": "7.2"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libc6-dev:amd64",
"version": "2.19-18+deb8u6",
"fixVersion": "2.19-18+deb8u10"
},
{
"name": "libc-dev-bin",
"version": "2.19-18+deb8u6",
"fixVersion": "2.19-18+deb8u10"
},
{
"name": "libc6:amd64",
"version": "2.19-18+deb8u6",
"fixVersion": "2.19-18+deb8u10"
},
{
"name": "libc-bin",
"version": "2.19-18+deb8u6",
"fixVersion": "2.19-18+deb8u10"
},
{
"name": "multiarch-support",
"version": "2.19-18+deb8u6",
"fixVersion": "2.19-18+deb8u10"
}
],
"category": "Debian",
"firstFound": "1726223192927",
"lastFound": "1726570859850",
"published": 1497920001000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"activeAttacks": true,
"denialOfService": true,
"easyExploit": true,
"highDataLoss": true,
"highLateralMovement": true,
"malware": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for openssh (DLA 1728-1)",
"qid": 176756,
"cveids": [
"CVE-2018-20685",
"CVE-2019-6109",
"CVE-2019-6111"
],
"cvssInfo": {
"baseScore": "5.8",
"temporalScore": "4.8",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.8",
"temporalScore": "6.3"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "openssh-client",
"version": "1:6.7p1-5+deb8u3",
"fixVersion": "1:6.7p1-5+deb8u8"
}
],
"category": "Debian",
"firstFound": "1726223192952",
"lastFound": "1726570859870",
"published": 1554375138000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"activeAttacks": true,
"malware": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for tiff (DLA 1680-1)",
"qid": 176680,
"cveids": [
"CVE-2018-17000",
"CVE-2018-19210",
"CVE-2019-7663"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.5",
"temporalScore": "5.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libtiff5:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u8"
},
{
"name": "libtiff5-dev:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u8"
},
{
"name": "libtiffxx5:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u8"
}
],
"category": "Debian",
"firstFound": "1726223192947",
"lastFound": "1726570859866",
"published": 1553546619000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for libgcrypt20 (DSA 3880-1)",
"qid": 176059,
"cveids": [
"CVE-2017-9526"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.2",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.9",
"temporalScore": "5.2"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libgcrypt20:amd64",
"version": "1.6.3-2+deb8u2",
"fixVersion": "1.6.3-2+deb8u3"
}
],
"category": "Debian",
"firstFound": "1726223192926",
"lastFound": "1726570859850",
"published": 1497519708000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for postgresql-9.4 (DLA 1464-1)",
"qid": 177156,
"cveids": [
"CVE-2018-10915"
],
"cvssInfo": {
"baseScore": "6.0",
"temporalScore": "4.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libpq-dev",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.19-0+deb8u1"
},
{
"name": "postgresql-client-9.4",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.19-0+deb8u1"
},
{
"name": "libpq5:amd64",
"version": "9.4.9-0+deb8u1",
"fixVersion": "9.4.19-0+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192966",
"lastFound": "1726570859884",
"published": 1566210023000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for openssl (DSA 4018-1)",
"qid": 176197,
"cveids": [
"CVE-2017-3735",
"CVE-2017-3736"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "6.5",
"temporalScore": "5.7"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libssl1.0.0:amd64",
"version": "1.0.1t-1+deb8u5",
"fixVersion": "1.0.1t-1+deb8u7"
},
{
"name": "libssl-dev:amd64",
"version": "1.0.1t-1+deb8u5",
"fixVersion": "1.0.1t-1+deb8u7"
},
{
"name": "openssl",
"version": "1.0.1t-1+deb8u5",
"fixVersion": "1.0.1t-1+deb8u7"
}
],
"category": "Debian",
"firstFound": "1726223192936",
"lastFound": "1726570859857",
"published": 1510565038000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for tiff (DLA 1411-1)",
"qid": 177175,
"cveids": [
"CVE-2017-11613",
"CVE-2018-5784",
"CVE-2018-7456",
"CVE-2018-8905",
"CVE-2018-10963",
"CVE-2017-13726",
"CVE-2017-18013"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.8",
"temporalScore": "7.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libtiff5:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u6"
},
{
"name": "libtiff5-dev:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u6"
},
{
"name": "libtiffxx5:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u6"
}
],
"category": "Debian",
"firstFound": "1726223192967",
"lastFound": "1726570859885",
"published": 1566210023000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for sqlite3 (DLA 1613-1)",
"qid": 176787,
"cveids": [
"CVE-2018-20346",
"CVE-2018-20506"
],
"cvssInfo": {
"baseScore": "6.8",
"temporalScore": "5.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "8.1",
"temporalScore": "7.3"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libsqlite3-dev:amd64",
"version": "3.8.7.1-1+deb8u2",
"fixVersion": "3.8.7.1-1+deb8u3"
},
{
"name": "libsqlite3-0:amd64",
"version": "3.8.7.1-1+deb8u2",
"fixVersion": "3.8.7.1-1+deb8u3"
},
{
"name": "sqlite3",
"version": "3.8.7.1-1+deb8u2",
"fixVersion": "3.8.7.1-1+deb8u3"
}
],
"category": "Debian",
"firstFound": "1726223192953",
"lastFound": "1726570859872",
"published": 1554375138000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for lcms2 (DSA 3774-1)",
"qid": 175950,
"cveids": [
"CVE-2016-10165"
],
"cvssInfo": {
"baseScore": "5.8",
"temporalScore": "4.3",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.1",
"temporalScore": "6.2"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "liblcms2-2:amd64",
"version": "2.6-3+b3",
"fixVersion": "2.6-3+deb8u1"
},
{
"name": "liblcms2-dev:amd64",
"version": "2.6-3+b3",
"fixVersion": "2.6-3+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192919",
"lastFound": "1726570859844",
"published": 1485856043000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Debian Security Update for systemd (DLA 1639-1)",
"qid": 176715,
"cveids": [
"CVE-2018-16864",
"CVE-2018-16865"
],
"cvssInfo": {
"baseScore": "4.6",
"temporalScore": "3.6",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "7.8",
"temporalScore": "7.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "udev",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u9"
},
{
"name": "libsystemd0:amd64",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u9"
},
{
"name": "systemd-sysv",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u9"
},
{
"name": "libudev1:amd64",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u9"
},
{
"name": "systemd",
"version": "215-17+deb8u5",
"fixVersion": "215-17+deb8u9"
}
],
"category": "Debian",
"firstFound": "1726223192950",
"lastFound": "1726570859868",
"published": 1553546619000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for e2fsprogs (DLA 2156-1)",
"qid": 177707,
"cveids": [
"CVE-2019-5188"
],
"cvssInfo": {
"baseScore": "4.4",
"temporalScore": "3.4",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "6.7",
"temporalScore": "6.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "e2fslibs:amd64",
"version": "1.42.12-2",
"fixVersion": "1.42.12-2+deb8u2"
},
{
"name": "libcomerr2:amd64",
"version": "1.42.12-2",
"fixVersion": "1.42.12-2+deb8u2"
},
{
"name": "e2fsprogs",
"version": "1.42.12-2",
"fixVersion": "1.42.12-2+deb8u2"
},
{
"name": "libss2:amd64",
"version": "1.42.12-2",
"fixVersion": "1.42.12-2+deb8u2"
}
],
"category": "Debian",
"firstFound": "1726223192980",
"lastFound": "1726570859898",
"published": 1585568825000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for actionpack (GHSA-jp5v-5gx4-jmj9)",
"qid": 988377,
"cveids": [
"CVE-2020-8166"
],
"cvssInfo": {
"baseScore": "4.3",
"temporalScore": "3.4",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "4.3",
"temporalScore": "3.9"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "actionpack",
"version": "5.0.1",
"fixVersion": "5.2.4.3",
"packagePath": "usr/local/bundle/specifications/actionpack-5.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860333",
"lastFound": "1726570860333",
"published": 1666790958000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Debian Security Update for imagemagick (DSA 4040-1)",
"qid": 176220,
"cveids": [
"CVE-2017-11352",
"CVE-2017-11640",
"CVE-2017-12431",
"CVE-2017-12640",
"CVE-2017-12877",
"CVE-2017-12983",
"CVE-2017-13134",
"CVE-2017-13139",
"CVE-2017-13144",
"CVE-2017-13758",
"CVE-2017-13769",
"CVE-2017-14224",
"CVE-2017-14607",
"CVE-2017-14682",
"CVE-2017-14989",
"CVE-2017-15277",
"CVE-2017-16546"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libmagickcore-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u11"
},
{
"name": "libmagickcore-6-arch-config:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u11"
},
{
"name": "libmagickcore-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u11"
},
{
"name": "libmagickcore-6.q16-2-extra:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u11"
},
{
"name": "libmagickwand-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u11"
},
{
"name": "imagemagick-6.q16",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u11"
},
{
"name": "imagemagick",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u11"
},
{
"name": "libmagickwand-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u11"
},
{
"name": "libmagickwand-6-headers",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u11"
},
{
"name": "imagemagick-common",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u11"
},
{
"name": "libmagickcore-dev",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u11"
},
{
"name": "libmagickwand-6.q16-2:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u11"
},
{
"name": "libmagickcore-6.q16-dev:amd64",
"version": "8:6.8.9.9-5+deb8u6",
"fixVersion": "8:6.8.9.9-5+deb8u11"
}
],
"category": "Debian",
"firstFound": "1726223192936",
"lastFound": "1726570859858",
"published": 1513153124000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for subversion (DSA 3932-1)",
"qid": 176108,
"cveids": [
"CVE-2016-8734",
"CVE-2017-9800"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "subversion",
"version": "1.8.10-6+deb8u4",
"fixVersion": "1.8.10-6+deb8u5"
},
{
"name": "libsvn1:amd64",
"version": "1.8.10-6+deb8u4",
"fixVersion": "1.8.10-6+deb8u5"
}
],
"category": "Debian",
"firstFound": "1726223192930",
"lastFound": "1726570859853",
"published": 1502964196000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for e2fsprogs (DLA 1935-1)",
"qid": 177354,
"cveids": [
"CVE-2019-5094"
],
"cvssInfo": {
"baseScore": "4.6",
"temporalScore": "3.6",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "6.7",
"temporalScore": "6.0"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "e2fslibs:amd64",
"version": "1.42.12-2",
"fixVersion": "1.42.12-2+deb8u1"
},
{
"name": "libcomerr2:amd64",
"version": "1.42.12-2",
"fixVersion": "1.42.12-2+deb8u1"
},
{
"name": "e2fsprogs",
"version": "1.42.12-2",
"fixVersion": "1.42.12-2+deb8u1"
},
{
"name": "libss2:amd64",
"version": "1.42.12-2",
"fixVersion": "1.42.12-2+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192973",
"lastFound": "1726570859890",
"published": 1570056498000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for tiff (DSA 3844-1)",
"qid": 176022,
"cveids": [
"CVE-2016-3658",
"CVE-2016-9535",
"CVE-2016-10266",
"CVE-2016-10267",
"CVE-2016-10269",
"CVE-2016-10270",
"CVE-2017-5225",
"CVE-2017-7592",
"CVE-2017-7593",
"CVE-2017-7594",
"CVE-2017-7595",
"CVE-2017-7596",
"CVE-2017-7597",
"CVE-2017-7598",
"CVE-2017-7599",
"CVE-2017-7600",
"CVE-2017-7601",
"CVE-2017-7602"
],
"cvssInfo": {
"baseScore": "7.5",
"temporalScore": "5.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "libtiff5:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u3"
},
{
"name": "libtiff5-dev:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u3"
},
{
"name": "libtiffxx5:amd64",
"version": "4.0.3-12.3+deb8u1",
"fixVersion": "4.0.3-12.3+deb8u3"
}
],
"category": "Debian",
"firstFound": "1726223192923",
"lastFound": "1726570859847",
"published": 1494411859000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for rails-html-sanitizer (GHSA-rrfc-7g8p-99q8)",
"qid": 991020,
"cveids": [
"CVE-2022-23520"
],
"cvssInfo": {
"baseScore": "5.4",
"temporalScore": "4.3",
"accessVector": "Adjacent Network"
},
"cvss3Info": {
"baseScore": "6.1",
"temporalScore": "5.5"
},
"severity": 3,
"customerSeverity": 3,
"risk": 30,
"software": [
{
"name": "rails-html-sanitizer",
"version": "1.0.3",
"fixVersion": "1.4.4",
"packagePath": "usr/local/bundle/specifications/rails-html-sanitizer-1.0.3.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860604",
"lastFound": "1726570860604",
"published": 1672837005000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"highLateralMovement": true,
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for activesupport (GHSA-j6gc-792m-qgm2)",
"qid": 991711,
"cveids": [
"CVE-2023-22796"
],
"cvssInfo": {
"baseScore": "5.4",
"temporalScore": "4.0",
"accessVector": "Adjacent Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 2,
"customerSeverity": 2,
"risk": 20,
"software": [
{
"name": "activesupport",
"version": "5.0.1",
"fixVersion": "6.1.7.1",
"packagePath": "usr/local/bundle/specifications/activesupport-5.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860707",
"lastFound": "1726570860707",
"published": 1674570934000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"highLateralMovement": true
}
},
{
"title": "Debian Security Update for libxdmcp (DLA 2006-1)",
"qid": 177530,
"cveids": [
"CVE-2017-2625"
],
"cvssInfo": {
"baseScore": "2.1",
"temporalScore": "1.7",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "5.5",
"temporalScore": "5.0"
},
"severity": 2,
"customerSeverity": 2,
"risk": 20,
"software": [
{
"name": "libxdmcp6:amd64",
"version": "1:1.1.1-1+b1",
"fixVersion": "1:1.1.1-1+deb8u1"
},
{
"name": "libxdmcp-dev:amd64",
"version": "1:1.1.1-1+b1",
"fixVersion": "1:1.1.1-1+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192976",
"lastFound": "1726570859893",
"published": 1577703922000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for loofah (GHSA-c3gv-9cxf-6f57)",
"qid": 988349,
"cveids": [
"CVE-2019-15587"
],
"cvssInfo": {
"baseScore": "3.5",
"temporalScore": "2.6",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "5.4",
"temporalScore": "4.7"
},
"severity": 2,
"customerSeverity": 2,
"risk": 20,
"software": [
{
"name": "loofah",
"version": "2.0.3",
"fixVersion": "2.3.1",
"packagePath": "usr/local/bundle/specifications/loofah-2.0.3.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860317",
"lastFound": "1726570860317",
"published": 1666790957000,
"typeDetected": "CONFIRMED",
"threatIntel": {}
},
{
"title": "Rubygems (Rubygems) Security Update for actionpack (GHSA-8xww-x3g3-6jcv)",
"qid": 991704,
"cveids": [
"CVE-2023-22795"
],
"cvssInfo": {
"baseScore": "5.4",
"temporalScore": "4.0",
"accessVector": "Adjacent Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 2,
"customerSeverity": 2,
"risk": 20,
"software": [
{
"name": "actionpack",
"version": "5.0.1",
"fixVersion": "5.2.8.15",
"packagePath": "usr/local/bundle/specifications/actionpack-5.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860682",
"lastFound": "1726570860682",
"published": 1674570934000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"highLateralMovement": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for rack (GHSA-65f5-mfpf-vfhj)",
"qid": 991712,
"cveids": [
"CVE-2022-44570"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 2,
"customerSeverity": 2,
"risk": 20,
"software": [
{
"name": "rack",
"version": "2.0.1",
"fixVersion": "2.0.9.2",
"packagePath": "usr/local/bundle/specifications/rack-2.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860709",
"lastFound": "1726570860709",
"published": 1674570934000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for rack (GHSA-93pm-5p5f-3ghx)",
"qid": 991717,
"cveids": [
"CVE-2022-44571"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 2,
"customerSeverity": 2,
"risk": 20,
"software": [
{
"name": "rack",
"version": "2.0.1",
"fixVersion": "2.0.9.2",
"packagePath": "usr/local/bundle/specifications/rack-2.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860726",
"lastFound": "1726570860726",
"published": 1674570934000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for tar (DLA 1623-1)",
"qid": 176801,
"cveids": [
"CVE-2018-20482"
],
"cvssInfo": {
"baseScore": "1.9",
"temporalScore": "1.4",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "4.7",
"temporalScore": "4.2"
},
"severity": 2,
"customerSeverity": 2,
"risk": 20,
"software": [
{
"name": "tar",
"version": "1.27.1-2+deb8u1",
"fixVersion": "1.27.1-2+deb8u2"
}
],
"category": "Debian",
"firstFound": "1726223192954",
"lastFound": "1726570859873",
"published": 1554375138000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for rack (GHSA-rqv2-275x-2jq5)",
"qid": 991714,
"cveids": [
"CVE-2022-44572"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 2,
"customerSeverity": 2,
"risk": 20,
"software": [
{
"name": "rack",
"version": "2.0.1",
"fixVersion": "2.0.9.2",
"packagePath": "usr/local/bundle/specifications/rack-2.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860724",
"lastFound": "1726570860724",
"published": 1674570934000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Debian Security Update for libexif (DLA 2249-1)",
"qid": 177871,
"cveids": [
"CVE-2020-0182",
"CVE-2020-0198"
],
"cvssInfo": {
"baseScore": "6.4",
"temporalScore": "4.7",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 2,
"customerSeverity": 2,
"risk": 20,
"software": [
{
"name": "libexif-dev",
"version": "0.6.21-2",
"fixVersion": "0.6.21-2+deb8u4"
},
{
"name": "libexif12:amd64",
"version": "0.6.21-2",
"fixVersion": "0.6.21-2+deb8u4"
}
],
"category": "Debian",
"firstFound": "1726223192983",
"lastFound": "1726570859901",
"published": 1592829965000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for globalid (GHSA-23c2-gwp5-pxw9)",
"qid": 991713,
"cveids": [
"CVE-2023-22799"
],
"cvssInfo": {
"baseScore": "5.4",
"temporalScore": "4.0",
"accessVector": "Adjacent Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 2,
"customerSeverity": 2,
"risk": 20,
"software": [
{
"name": "globalid",
"version": "0.3.7",
"fixVersion": "1.0.1",
"packagePath": "usr/local/bundle/specifications/globalid-0.3.7.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860722",
"lastFound": "1726570860722",
"published": 1674570934000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"highLateralMovement": true
}
},
{
"title": "Debian Security Update for libice (DLA 2002-1)",
"qid": 177528,
"cveids": [
"CVE-2017-2626"
],
"cvssInfo": {
"baseScore": "2.1",
"temporalScore": "1.7",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "5.5",
"temporalScore": "5.0"
},
"severity": 2,
"customerSeverity": 2,
"risk": 20,
"software": [
{
"name": "libice6:amd64",
"version": "2:1.0.9-1+b1",
"fixVersion": "2:1.0.9-1+deb8u1"
},
{
"name": "libice-dev:amd64",
"version": "2:1.0.9-1+b1",
"fixVersion": "2:1.0.9-1+deb8u1"
}
],
"category": "Debian",
"firstFound": "1726223192975",
"lastFound": "1726570859893",
"published": 1577703921000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for sqlite3 (DLA 2221-1)",
"qid": 177834,
"cveids": [
"CVE-2020-13434"
],
"cvssInfo": {
"baseScore": "2.1",
"temporalScore": "1.7",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "5.5",
"temporalScore": "5.0"
},
"severity": 2,
"customerSeverity": 2,
"risk": 20,
"software": [
{
"name": "libsqlite3-dev:amd64",
"version": "3.8.7.1-1+deb8u2",
"fixVersion": "3.8.7.1-1+deb8u6"
},
{
"name": "libsqlite3-0:amd64",
"version": "3.8.7.1-1+deb8u2",
"fixVersion": "3.8.7.1-1+deb8u6"
},
{
"name": "sqlite3",
"version": "3.8.7.1-1+deb8u2",
"fixVersion": "3.8.7.1-1+deb8u6"
}
],
"category": "Debian",
"firstFound": "1726223192983",
"lastFound": "1726570859901",
"published": 1592829964000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for actionpack (GHSA-9chr-4fjh-5rgw)",
"qid": 990768,
"cveids": [
"CVE-2022-3704"
],
"cvssInfo": {
"baseScore": "5.4",
"temporalScore": "4.9",
"accessVector": "Adjacent Network"
},
"cvss3Info": {
"baseScore": "5.4",
"temporalScore": "5.1"
},
"severity": 2,
"customerSeverity": 2,
"risk": 20,
"software": [
{
"name": "actionpack",
"version": "5.0.1",
"fixVersion": "None",
"packagePath": "usr/local/bundle/specifications/actionpack-5.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860572",
"lastFound": "1726570860572",
"published": 1671022114000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"highLateralMovement": true,
"noPatch": true,
"publicExploit": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for actionpack (GHSA-p84v-45xj-wwqj)",
"qid": 991702,
"cveids": [
"CVE-2023-22792"
],
"cvssInfo": {
"baseScore": "5.4",
"temporalScore": "4.0",
"accessVector": "Adjacent Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.5"
},
"severity": 2,
"customerSeverity": 2,
"risk": 20,
"software": [
{
"name": "actionpack",
"version": "5.0.1",
"fixVersion": "5.2.8.15",
"packagePath": "usr/local/bundle/specifications/actionpack-5.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860639",
"lastFound": "1726570860639",
"published": 1674570934000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"highLateralMovement": true
}
},
{
"title": "Rubygems (Rubygems) Security Update for activerecord (GHSA-579w-22j4-4749)",
"qid": 991707,
"cveids": [
"CVE-2022-44566"
],
"cvssInfo": {
"baseScore": "5.0",
"temporalScore": "3.9",
"accessVector": "Network"
},
"cvss3Info": {
"baseScore": "7.5",
"temporalScore": "6.7"
},
"severity": 2,
"customerSeverity": 2,
"risk": 20,
"software": [
{
"name": "activerecord",
"version": "5.0.1",
"fixVersion": "5.2.8.15",
"packagePath": "usr/local/bundle/specifications/activerecord-5.0.1.gemspec"
}
],
"category": "SCA",
"firstFound": "1726570860684",
"lastFound": "1726570860684",
"published": 1674570934000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"easyExploit": true,
"publicExploit": true
}
},
{
"title": "Debian Security Update for libgcrypt20 (DLA 1405-1)",
"qid": 177217,
"cveids": [
"CVE-2018-0495"
],
"cvssInfo": {
"baseScore": "1.9",
"temporalScore": "1.4",
"accessVector": "Local"
},
"cvss3Info": {
"baseScore": "4.7",
"temporalScore": "4.2"
},
"severity": 1,
"customerSeverity": 1,
"risk": 10,
"software": [
{
"name": "libgcrypt20:amd64",
"version": "1.6.3-2+deb8u2",
"fixVersion": "1.6.3-2+deb8u5"
}
],
"category": "Debian",
"firstFound": "1726223192968",
"lastFound": "1726570859886",
"published": 1566210024000,
"typeDetected": "CONFIRMED",
"threatIntel": {
"publicExploit": true
}
}
],
"vulnSummary": {
"confirmed": {
"sev1Count": 1,
"sev2Count": 15,
"sev3Count": 188,
"sev4Count": 61,
"sev5Count": 14
},
"potential": {},
"patchAvailability": {
"confirmed": {
"sev1Count": 1,
"sev2Count": 14,
"sev3Count": 187,
"sev4Count": 61,
"sev5Count": 13
},
"potential": {}
}
}
},
"PolicyEvaluation": {}
}
Tabular Report
See the sample vulnerability report in Tabular format.
This report is not generated if your QScanner is running in Quiet mode (if you have used --quiet
flag during the scan).
SARIF Report
Sample SARIF report generated by QScanner is shown below.
{
"version": "2.1.0",
"$schema": "https://json.schemastore.org/sarif-2.1.0.json",
"runs": [
{
"tool": {
"driver": {
"fullName": "Qualys CLI Scanner",
"informationUri": "http://www.qualys.com",
"name": "qscanner",
"rules": [
{
"id": "184903",
"name": "Vulnerability",
"shortDescription": {
"text": "Debian Security Update for zliblibz-mingw-w64 (CVE-2022-37434)"
},
"defaultConfiguration": {
"level": "error"
},
"properties": {
"customerSeverity": 5,
"cve-ids": [
"CVE-2022-37434"
],
"cvss3Info": {
"baseScore": "9.8",
"temporalScore": "8.8"
},
"cvssInfo": {
"baseScore": "5.4",
"temporalScore": "4.3",
"accessVector": "Adjacent Network"
},
"risk": 50,
"severity": 5
}
},
{
"id": "PolicyEvaluationResult",
"name": "PolicyEvaluation",
"shortDescription": {
"text": "No active policy is assigned with these tags: [] and there is also no active default policy available."
},
"defaultConfiguration": {
"level": "warning"
}
},
{
"id": "ff34aaee-e4c2-11ed-b5ea-0242ac120002",
"name": "Secret",
"shortDescription": {
"text": "SSH public key DSA"
},
"defaultConfiguration": {
"level": "error"
}
},
{
"id": "ac882852-c960-11ed-afa1-0242ac120002",
"name": "Secret",
"shortDescription": {
"text": "Private Key"
},
"defaultConfiguration": {
"level": "error"
}
}
],
"version": "4.0.0-38"
}
},
"results": [
{
"properties": {
"QID": 184903,
"fixedVersion": "1:1.2.11.dfsg-4.1",
"installedVersion": "1.2.13.dfsg-1",
"layerSHA": "sha256:2fa37f2ee66efbd308b9b91bce81c262f5e6ab6c3bf8056632afc60cc602785c",
"patchAvailable": true,
"softwareName": "zlib1g",
"softwarePath": ""
},
"ruleId": "184903",
"ruleIndex": 0,
"level": "error",
"message": {
"text": "Debian Security Update for zliblibz-mingw-w64 (CVE-2022-37434)"
}
},
{
"properties": {
"action": "AUDIT",
"evaluatedAt": "2023-12-11 09:45:02"
},
"ruleId": "PolicyEvaluationResult",
"ruleIndex": 1,
"level": "warning",
"message": {
"text": "No active policy is assigned with these tags: [] and there is also no active default policy available."
}
},
{
"properties": {
"category": "PublicKey",
"layerSHA": "sha256:2ef3351afa6d94a8874a6af5aa1bafcd85106616ced8ac63112022fb04232d03",
"title": "SSH public key DSA"
},
"ruleId": "ff34aaee-e4c2-11ed-b5ea-0242ac120002",
"ruleIndex": 2,
"level": "error",
"message": {
"text": " using the \"key::\" prefix mechanism (e.g. \"key::*******************"
},
"locations": [
{
"physicalLocation": {
"artifactLocation": {
"uri": "/usr/share/doc/git/RelNotes/2.35.0.txt"
},
"region": {
"startLine": 62,
"endLine": 62
}
}
}
]
},
{
"properties": {
"category": "AsymmetricPrivateKey",
"layerSHA": "sha256:fbc321379a11088c8b501eb89ac7e1f41d4b511b14c9914f2963683d92e78fd9",
"title": "Private Key"
},
"ruleId": "ac882852-c960-11ed-afa1-0242ac120002",
"ruleIndex": 3,
"level": "error",
"message": {
"text": "\tkeyPem := []byte(`-----BEGIN EC PRIVATE KEY-----************************************************************************************************************************************************************************"
},
"locations": [
{
"physicalLocation": {
"artifactLocation": {
"uri": "/usr/local/go/src/crypto/tls/example_test.go"
},
"region": {
"startLine": 139,
"endLine": 139
}
}
}
]
},
{
"properties": {
"category": "AsymmetricPrivateKey",
"layerSHA": "sha256:fbc321379a11088c8b501eb89ac7e1f41d4b511b14c9914f2963683d92e78fd9",
"title": "Private Key"
},
"ruleId": "ac882852-c960-11ed-afa1-0242ac120002",
"ruleIndex": 3,
"level": "error",
"message": {
"text": "\tkeyPem := []byte(`-----BEGIN EC PRIVATE KEY-----************************************************************************************************************************************************************************"
},
"locations": [
{
"physicalLocation": {
"artifactLocation": {
"uri": "/usr/local/go/src/crypto/tls/example_test.go"
},
"region": {
"startLine": 164,
"endLine": 164
}
}
}
]
},
{
"properties": {
"category": "AsymmetricPrivateKey",
"layerSHA": "sha256:fbc321379a11088c8b501eb89ac7e1f41d4b511b14c9914f2963683d92e78fd9",
"title": "Private Key"
},
"ruleId": "ac882852-c960-11ed-afa1-0242ac120002",
"ruleIndex": 3,
"level": "error",
"message": {
"text": "-----BEGIN EC PRIVATE KEY-----************************************************************************************************************************************************************************"
},
"locations": [
{
"physicalLocation": {
"artifactLocation": {
"uri": "/usr/local/go/src/crypto/tls/testdata/example-key.pem"
},
"region": {
"startLine": 1,
"endLine": 1
}
}
}
]
},
{
"properties": {
"category": "AsymmetricPrivateKey",
"layerSHA": "sha256:fbc321379a11088c8b501eb89ac7e1f41d4b511b14c9914f2963683d92e78fd9",
"title": "Private Key"
},
"ruleId": "ac882852-c960-11ed-afa1-0242ac120002",
"ruleIndex": 3,
"level": "error",
"message": {
"text": "-----BEGIN EC PRIVATE KEY-----************************************************************************************************************************************************************************"
},
"locations": [
{
"physicalLocation": {
"artifactLocation": {
"uri": "/usr/local/go/src/crypto/x509/platform_root_key.pem"
},
"region": {
"startLine": 1,
"endLine": 1
}
}
}
]
}
],
"properties": {
"architecture": "amd64",
"imageID": "sha256:015e6b7f599b15be5eecad68608583d19d9fa2c8cc27cb6d254204e080dae199",
"layers": [
"sha256:2fa37f2ee66efbd308b9b91bce81c262f5e6ab6c3bf8056632afc60cc602785c",
"sha256:5cc3a4df1251c008ebfaaf8c48fe7bd61f0b0fdd7273966bd4bbe58877337e06",
"sha256:2ef3351afa6d94a8874a6af5aa1bafcd85106616ced8ac63112022fb04232d03",
"sha256:e51777ae0bce0a05c4c294fc7c3fb6ac29fd215b900bd46bb9bb7302708bffeb",
"sha256:fbc321379a11088c8b501eb89ac7e1f41d4b511b14c9914f2963683d92e78fd9",
"sha256:fe7d12ddfc653078295fed87b3fd7498a496dc5176358fba91239d44d98997bd"
],
"os": "Debian Linux 12.2",
"repoTags": [
"golang:latest"
]
}
}
]
}