Skip to content

fix(deps): update dependencies (major) #116

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Apr 30, 2025

This PR contains the following updates:

Package Change Age Confidence Type Update
github.com/docker/docker v27.5.1+incompatible -> v28.3.2+incompatible age confidence require major
github.com/google/go-github/v68 v68.0.0 -> v73.0.0 age confidence require major
golangci/golangci-lint v1.64.8 -> v2.2.2 age confidence stage major

Release Notes

docker/docker (github.com/docker/docker)

v28.3.2+incompatible

Compare Source

v28.3.1+incompatible

Compare Source

v28.3.0+incompatible

Compare Source

v28.2.2+incompatible

Compare Source

v28.2.1+incompatible

Compare Source

v28.2.0+incompatible

Compare Source

v28.1.1+incompatible

Compare Source

v28.1.0+incompatible

Compare Source

v28.0.4+incompatible

Compare Source

v28.0.3+incompatible

Compare Source

v28.0.2+incompatible

Compare Source

v28.0.1+incompatible

Compare Source

v28.0.0+incompatible

Compare Source

google/go-github (github.com/google/go-github/v68)

v73.0.0

Compare Source

This release contains the following breaking API changes:

  • feat!: Add repository query option to ListCustomPropertyValues (#​3598)
    BREAKING CHANGE: ListCustomPropertyValues now takes ListCustomPropertyValuesOptions instead of ListOptions.

...and the following additional changes:

  • Bump go-github from v71 to v72 in /scrape (#​3572)
  • Update OpenAPI (#​3574)
  • Improve DownloadContents and DownloadContentsWithMeta methods (#​3573)
  • build(deps): bump actions/setup-go from 5.4.0 to 5.5.0 in the actions group (#​3575)
  • build(deps): bump golang.org/x/net from 0.39.0 to 0.40.0 in /scrape (#​3576)
  • build(deps): bump github.com/alecthomas/kong from 1.10.0 to 1.11.0 in /tools (#​3578)
  • build(deps): bump codecov/codecov-action from 5.4.0 to 5.4.3 (#​3579)
  • feat: Add support for sub-issue (#​3580)
  • fix: Add missing relationship and pkg external info for SBOMs (#​3582)
  • chore: Use any instead of interface{} (#​3584)
  • chore: Migrate golangci-lint to v2 (#​3587)
  • chore: Add alexandear to REVIEWERS (#​3588)
  • docs: Update minimum Go version in README to 1.23 (#​3589)
  • fix: Use stable media type in Starring API (#​3590)
  • docs: Use pkgsite links (#​3591)
  • build(deps): bump golang.org/x/net from 0.40.0 to 0.41.0 in /scrape (#​3593)
  • build(deps): bump golang.org/x/sync from 0.14.0 to 0.15.0 in /tools (#​3594)
  • build(deps): bump github.com/cloudflare/circl from 1.3.7 to 1.6.1 in /example (#​3595)
  • Bump version of go-github to v73.0.0 (#​3599)

v72.0.0

Compare Source

This release contains the following breaking API changes:

  • chore!: Remove support for Required Workflows (#​3538)
  • fix!: Differentiate merge method of pull request and merge queue (#​3559)
    BREAKING CHANGE: MergeMethod* consts have been split into: PullRequestMergeMethod* and MergeQueueMergeMethod*.
  • feat!: Add support for pagination options in rules API methods (#​3562)
    BREAKING CHANGE: GetRulesForBranch, GetAllRulesets, and GetAllRepositoryRulesets now accept opts.

...and the following additional changes:

  • Bump go-github from v70 to v71 in /scrape (#​3541)
  • build(deps): bump golang.org/x/net from 0.37.0 to 0.38.0 in /scrape (#​3536)
  • build(deps): bump github.com/alecthomas/kong from 1.9.0 to 1.10.0 in /tools (#​3542)
  • build(deps): bump golang.org/x/sync from 0.12.0 to 0.13.0 in /tools (#​3543)
  • Add support for registry_package event (#​3545)
  • build(deps): bump codecov/codecov-action from 5.4.0 to 5.4.2 (#​3551)
  • build(deps): bump golang.org/x/net from 0.38.0 to 0.39.0 in /scrape (#​3549)
  • build(deps): bump github.com/PuerkitoBio/goquery from 1.10.2 to 1.10.3 in /scrape (#​3550)
  • feat: Add EPSS to Dependabot alerts (#​3547)
  • Revert "build(deps): bump codecov/codecov-action from 5.4.0 to 5.4.2" (#​3552)
  • feat: Add new fields and options to secret scanning structs (#​3548)
  • build(deps): bump golang.org/x/net from 0.36.0 to 0.38.0 in /example in the go_modules group across 1 directory (#​3553)
  • Add case-instensitive GetHeader for HookRequest & HookResponse (#​3556)
  • Add issue Type to IssueRequest (#​3567)
  • build(deps): bump golang.org/x/sync from 0.13.0 to 0.14.0 in /tools (#​3568)
  • build(deps): bump github.com/getkin/kin-openapi from 0.131.0 to 0.132.0 in /tools (#​3569)
  • Add ListCursorOptions to list Issues methods (#​3570)
  • Bump version of go-github to v72.0.0 (#​3571)

v71.0.0

Compare Source

This release contains the following breaking API changes:

  • feat!: Add ListReactionOptions to all ListxxReactions functions to enable filter by content (#​3532)
    BREAKING CHANGE: ListCommentReactionOptions => ListReactionOptions and all List*Reactions methods now use it.

...and the following additional changes:

  • Bump go-github from v69 to v70 in /scrape (#​3521)
  • Path escape fix in UserService.GetPackage() (#​3522)
  • Update openapi (#​3526)
  • feat: Add support for Issue Types API (#​3525)
  • build(deps): bump github.com/golang-jwt/jwt/v4 from 4.5.1 to 4.5.2 in /example (#​3528)
  • build(deps): bump the actions group with 2 updates (#​3530)
  • build(deps): bump github.com/getkin/kin-openapi from 0.130.0 to 0.131.0 in /tools (#​3531)
  • Add ListReleaseReactions and DeleteReleaseReaction (#​3533)
  • feat: Add actions_macos field to APIMeta struct (#​3535)
  • fix: Isolate HTTP transports in parallel tests to prevent connection issues (#​3529)
  • chore: Remove redundant in Go 1.22 loop variables (#​3537)
  • fix: Add back repository field in Package struct (#​3539)
  • Bump version of go-github to v71.0.0 (#​3540)

v70.0.0

Compare Source

This release contains the following breaking API changes:

  • feat!: Add support for network-configurations endpoints for organization (#​3511)
    BREAKING CHANGE: EnterpriseNetwork* structs have been replaced with Network* structs.
  • refactor!: Update package types to align with webhook event (#​3515)
    BREAKING CHANGE: PackageVersion.Body and PackageVersion.Metadata are both now json.RawMessage.

...and the following additional changes:

  • build(deps): bump github.com/alecthomas/kong from 1.8.0 to 1.8.1 in /tools (#​3485)
  • build(deps): bump github.com/google/go-github/v69 from 69.0.0 to 69.2.0 in /scrape (#​3483)
  • build(deps): bump github.com/google/go-cmp from 0.6.0 to 0.7.0 in /tools (#​3490)
  • Bump github.com/google/go-cmp from 0.6.0 to 0.7.0 (#​3494)
  • build(deps): bump actions/cache from 4.2.0 to 4.2.1 in the actions group (#​3492)
  • fix: Resolve '400 Custom domains' error on GitHub Enterprise Server (#​3489)
  • Correct the runIDFromURLRE regex to properly match the callbackURL (#​3495)
  • feat: Add support for GitHub-hosted runner API endpoints (#​3487)
  • feat: Add support for network-configurations endpoints (#​3497)
  • build(deps): bump codecov/codecov-action from 5.3.1 to 5.4.0 (#​3500)
  • build(deps): bump actions/cache from 4.2.1 to 4.2.2 in the actions group (#​3499)
  • Add created_at field to Reaction (#​3501)
  • Add reason parameter to MergeGroupEvent (#​3508)
  • fix(ci): ensure 'auto' toolchain applies to generate (#​3436)
  • Bump dependency versions from dependabot warnings (#​3512)
  • Bump go-jose to v4.0.5 (#​3513)
  • build(deps): bump golang.org/x/net from 0.33.0 to 0.36.0 in /example (#​3514)
  • docs: Update readme and examples for updated go-github-ratelimit and introduce go-github-pagination (#​3504)
  • Add validity filter to secret scanning alert list options (#​3516)
  • build(deps): bump github.com/alecthomas/kong from 1.8.1 to 1.9.0 in /tools (#​3518)
  • build(deps): bump github.com/getkin/kin-openapi from 0.129.0 to 0.130.0 in /tools (#​3517)
  • feat: Add automatic_copilot_code_review_enabled parameter to ruleset API (#​3506)
  • Bump version of go-github to v70.0.0 (#​3520)

v69.2.0

Compare Source

This minor release contains the following changes:

  • Add helper to get runID from Custom Deployment Protection Rule Event (#​3476)
  • feat: Add JSON marshal tests for dependabot alerts (#​3480)
  • feat: Add sorting list options for secret scanning (#​3481)
  • Bump version of go-github to v69.2.0 (#​3482)

v69.1.0

Compare Source

This minor release contains the following changes:

  • Bump go-github from v68 to v69 in /scrape (#​3464)
  • Use a max retry after duration for secondary rate limit if specified (#​3438)
  • docs: Clarify ListPullRequestsWithCommit usage (#​3465)
  • fix: go 1.22 test breakage (#​3459)
  • feat: Add link to bored-engineer/github-conditional-http-transport to conditional requests documentation (#​3469)
  • build(deps): bump golang.org/x/sync from 0.10.0 to 0.11.0 in /tools (#​3472)
  • build(deps): bump golang.org/x/net from 0.34.0 to 0.35.0 in /scrape (#​3470)
  • build(deps): bump github.com/alecthomas/kong from 1.7.0 to 1.8.0 in /tools (#​3471)
  • Update workflow and tools to use Go1.24 and 1.23 (#​3474)
  • chore: Only use master test runs for status badge (#​3475)
  • feat: Add ListProvisionedScimGroupsForEnterprise inside SCIM service (#​3467)
  • fix: Add missing query params to AlertListOptions (#​3477)
  • Bump version of go-github to v69.1.0 (#​3478)

v69.0.0

Compare Source

This release contains the following breaking API changes:

  • feat!: Add support for enterprise rulesets (#​3417)
    BREAKING CHANGE: Create*Ruleset and Update*Ruleset now pass ruleset parameter by-value instead of by-reference.
  • fix!: Typo in field names in the CheckSuite struct (#​3444)
    BREAKING CHANGE: Rerequstable=>Rerequestable, RunsRerequstable=>RunsRerequestable
  • fix!: Typo in field names in the PullStats struct (#​3445)
    BREAKING CHANGE: MergablePulls=>MergeablePulls, UnmergablePulls=>UnmergeablePulls
  • refactor!: Do not capitalize error strings (#​3446)
    BREAKING CHANGE: Some error strings are slightly modified - please do not rely on error text in general.
  • fix!: Refactor the repository ruleset code (#​3430)
    BREAKING CHANGES: The following types have been renamed:
    • Ruleset -> RepositoryRuleset
    • RulesetLink -> RepositoryRulesetLink
    • RulesetLinks -> RepositoryRulesetLinks
    • RulesetRefConditionParameters -> RepositoryRulesetRefConditionParameters
    • RulesetRepositoryNamesConditionParameters -> RepositoryRulesetRepositoryNamesConditionParameters
    • RulesetRepositoryIDsConditionParameters -> RepositoryRulesetRepositoryIDsConditionParameters
    • RulesetRepositoryPropertyTargetParameters -> Repository
    • RulesetRepositoryPropertyConditionParameters -> RepositoryRulesetRepositoryPropertyConditionParameters
    • RulesetOrganizationNamesConditionParameters -> RepositoryRulesetOrganizationNamesConditionParameters
    • RulesetOrganizationIDsConditionParameters -> RepositoryRulesetOrganizationIDsConditionParameters
    • RulesetConditions -> RepositoryRulesetConditions
    • RepositoryRulesetEditedChanges -> RepositoryRulesetChanges
    • RepositoryRulesetEditedSource -> RepositoryRulesetChangeSource
    • RepositoryRulesetEditedSources -> RepositoryRulesetChangeSources
    • RepositoryRulesetEditedConditions -> RepositoryRulesetUpdatedConditions
    • RepositoryRulesetUpdatedConditionsEdited -> RepositoryRulesetUpdatedCondition
    • RepositoryRulesetEditedRules -> RepositoryRulesetChangedRules
    • RepositoryRulesetUpdatedRules -> RepositoryRulesetUpdatedRules
    • RepositoryRulesetEditedRuleChanges -> RepositoryRulesetChangedRule
  • chore!: Add sliceofpointers custom linter (#​3447)
    BREAKING CHANGE: ListOAuthApps now returns ([]*OAuthApp, error) instead of ([]OAuthApp, error).
  • feat!: Change User.InheritedFrom to a slice (#​3460)
    BREAKING CHANGE: User.InheritedFrom is changed from a *Team to a []*Team.

...and the following additional changes:

  • Bump go-github from v67 to v68 in /scrape (#​3398)
  • build(deps): bump golang.org/x/net from 0.32.0 to 0.33.0 in /scrape (#​3400)
  • build(deps): bump codecov/codecov-action from 5.1.1 to 5.1.2 (#​3401)
  • Bump golang.org/x/net to v0.33.0 (#​3402)
  • Add TokenID and TokenName to PersonalAccessToken struct (#​3404)
  • Bump github.com/PuerkitoBio/goquery from 1.9.2 to 1.10.1 in /scrape (#​3408)
  • Bump Go to 1.22.10 or 1.23.4 in go.mod files (#​3410)
  • Add opt-in rate limit support on endpoints returning 302s (#​3411)
  • Update OpenAPI (#​3419)
  • build(deps): bump golang.org/x/net from 0.33.0 to 0.34.0 in /scrape (#​3420)
  • Permit toggling rate limit check by consumers (#​3386)
  • build(deps): Pin and group actions/* (#​3424)
  • Add deprecation messages to security managers APIs (#​3426)
  • fix: Relax go directive in go.mod to 1.22.0 (#​3423)
  • Enforce toolchain requirement in generate.sh (#​3428)
  • feat: Add missing notification_setting to Team (#​3431)
  • chore: Add reviewers file (#​3435)
  • gen-accessors: Update dumping of getters (#​3437)
  • chore: Fix codecov upload (#​3440)
  • chore: Spell "unmarshal" consistently with one el (#​3441)
  • fix: Typos in func parameter, vars, error, and comments (#​3442)
  • feat: Add manage_ghes endpoints introduced in 3.15 (#​3433)
  • Fix minor typo (#​3448)
  • chore: Check and fix license headers (#​3449)
  • Add new fields for IssueType (#​3451)
  • ci: update golangci-lint to v1.63.4 (#​3452)
  • Extend Rate and Rate Limiting with X-Ratelimit-Used and X-Ratelimit-Resource headers (#​3453)
  • build(deps): bump actions/setup-go from 5.2.0 to 5.3.0 in the actions group (#​3454)
  • build(deps): bump codecov/codecov-action from 5.1.2 to 5.3.1 (#​3455)
  • docs: Add clarifications for mergeable field in pull requests (#​3396)
  • build(deps): bump github.com/alecthomas/kong from 1.6.0 to 1.7.0 in /tools (#​3458)
  • Bump version of go-github to v69.0.0 (#​3463)
golangci/golangci-lint (golangci/golangci-lint)

v2.2.2

Compare Source

  1. Linters bug fixes
    • noinlineerr: from 1.0.3 to 1.0.4
  2. Documentation
    • Improve debug keys documentation
  3. Misc.
    • fix: panic close of closed channel
    • godot: add noinline value into the JSONSchema

v2.2.1

Compare Source

  1. Linters bug fixes
  • varnamelen: fix configuration

v2.2.0

Compare Source

  1. New linters
  2. Linters new features or changes
    • errcheck: add verbose option
    • funcorder: from 0.2.1 to 0.5.0 (new option alphabetical)
    • gomoddirectives: from 0.6.1 to 0.7.0 (new option ignore-forbidden)
    • iface: from 1.3.1 to 1.4.0 (new option unexported)
    • noctx: from 0.1.0 to 0.3.3 (new report messages, and new rules related to database/sql)
    • noctx: from 0.3.3 to 0.3.4 (new SQL functions detection)
    • revive: from 1.9.0 to 1.10.0 (new rules: time-date, unnecessary-format, use-fmt-print)
    • usestdlibvars: from 1.28.0 to 1.29.0 (new option time-date-month)
    • wsl: deprecation
    • wsl_v5: from 4.7.0 to 5.0.0 (major version with new configuration)
  3. Linters bug fixes
    • dupword: from 0.1.3 to 0.1.6
    • exptostd: from 0.4.3 to 0.4.4
    • forbidigo: from 1.6.0 to 2.1.0
    • gci: consistently format the code
    • go-spancheck: from 0.6.4 to 0.6.5
    • goconst: from 1.8.1 to 1.8.2
    • gosec: from 2.22.3 to 2.22.4
    • gosec: from 2.22.4 to 2.22.5
    • makezero: from 1.2.0 to 2.0.1
    • misspell: from 0.6.0 to 0.7.0
    • usetesting: from 0.4.3 to 0.5.0
  4. Misc.
    • exclusions: fix path-expect
    • formatters: write the input to stdout when using stdin and there are no changes
    • migration: improve the error message when trying to migrate a migrated config
    • typecheck: deduplicate errors
    • typecheck: stops the analysis after the first error
    • Deprecate print-resources-usage flag
    • Unique version per custom build
  5. Documentation
    • Improves typecheck FAQ
    • Adds plugin systems recommendations
    • Add description for linters.default sets

v2.1.6

Compare Source

  1. Linters bug fixes
    • godot: from 1.5.0 to 1.5.1
    • musttag: from 0.13.0 to 0.13.1
  2. Documentation
    • Add note about golangci-lint v2 integration in VS Code

v2.1.5

Compare Source

Due to an error related to Snapcraft, some artifacts of the v2.1.4 release have not been published.

This release contains the same things as v2.1.3.

v2.1.4

Compare Source

Due to an error related to Snapcraft, some artifacts of the v2.1.3 release have not been published.

This release contains the same things as v2.1.3.

v2.1.3

Compare Source

  1. Linters bug fixes
    • fatcontext: from 0.7.2 to 0.8.0
  2. Misc.
    • migration: fix nakedret.max-func-lines: 0
    • migration: fix order of staticcheck settings
    • fix: add go.mod hash to the cache salt
    • fix: use diagnostic position for related information position

v2.1.2

Compare Source

  1. Linters bug fixes
    • exptostd: from 0.4.2 to 0.4.3
    • gofumpt: from 0.7.0 to 0.8.0
    • protogetter: from 0.3.13 to 0.3.15
    • usetesting: from 0.4.2 to 0.4.3

v2.1.1

Compare Source

The release process of v2.1.0 failed due to a regression inside goreleaser.

The binaries of v2.1.0 have been published, but not the other artifacts (AUR, Docker, etc.).

v2.1.0

Compare Source

  1. Enhancements
    • Add an option to display absolute paths (--path-mode=abs)
    • Add configuration path placeholder (${config-path})
    • Add warn-unused option for fmt command
    • Colored diff for fmt command (golangci-lint fmt --diff-colored)
  2. New linters
  3. Linters new features or changes
    • go-errorlint: from 1.7.1 to 1.8.0 (automatic error comparison and type assertion fixes)
    • ⚠️ goconst: ignore-strings is deprecated and replaced by ignore-string-values
    • goconst: from 1.7.1 to 1.8.1 (new options: find-duplicates, eval-const-expressions)
    • govet: add httpmux analyzer
    • nilnesserr: from 0.1.2 to 0.2.0 (detect more cases)
    • paralleltest: from 1.0.10 to 1.0.14 (checks only _test.go files)
    • revive: from 1.7.0 to 1.9.0 (support kebab case for setting names)
    • sloglint: from 0.9.0 to 0.11.0 (autofix, new option msg-style, suggest slog.DiscardHandler)
    • wrapcheck: from 2.10.0 to 2.11.0 (new option report-internal-errors)
    • wsl: from 4.6.0 to 4.7.0 (cgo files are always excluded)
  4. Linters bug fixes
    • fatcontext: from 0.7.1 to 0.7.2
    • gocritic: fix importshadow checker
    • gosec: from 2.22.2 to 2.22.3
    • ireturn: from 0.3.1 to 0.4.0
    • loggercheck: from 0.10.1 to 0.11.0
    • nakedret: from 2.0.5 to 2.0.6
    • nonamedreturns: from 1.0.5 to 1.0.6
    • protogetter: from 0.3.12 to 0.3.13
    • testifylint: from 1.6.0 to 1.6.1
    • unconvert: update to HEAD
  5. Misc.
    • Fixes memory leaks when using go1.(N) with golangci-lint built with go1.(N-X)
    • Adds golangci-lint-fmt pre-commit hook
  6. Documentation
    • Improvements
    • Updates section about vscode integration

v2.0.2

Compare Source

  1. Misc.
    • Fixes flags parsing for formatters
    • Fixes the filepath used by the exclusion source option
  2. Documentation
    • Adds a section about flags migration
    • Cleaning pages with v1 options

v2.0.1

Compare Source

  1. Linters/formatters bug fixes
    • golines: fix settings during linter load
  2. Misc.
    • Validates the version field before the configuration
    • forbidigo: fix migration

v2.0.0

Compare Source

  1. Enhancements
  2. New linters/formatters
  3. Linters new features
    • ⚠️ Merge staticcheck, stylecheck, gosimple into one linter (staticcheck) (cf. Migration guide)
    • go-critic: from 0.12.0 to 0.13.0
    • gomodguard: from 1.3.5 to 1.4.1 (block explicit indirect dependencies)
    • nilnil: from 1.0.1 to 1.1.0 (new option: only-two)
    • perfsprint: from 0.8.2 to 0.9.1 (checker name in the diagnostic message)
    • staticcheck: new quickfix set of rules
    • testifylint: from 1.5.2 to 1.6.0 (new options: equal-values, suite-method-signature, require-string-msg)
    • wsl: from 4.5.0 to 4.6.0 (new option: allow-cuddle-used-in-block)
  4. Linters bug fixes
    • bidichk: from 0.3.2 to 0.3.3
    • errchkjson: from 0.4.0 to 0.4.1
    • errname: from 1.0.0 to 1.1.0
    • funlen: fix ignore-comments option
    • gci: from 0.13.5 to 0.13.6
    • gosmopolitan: from 1.2.2 to 1.3.0
    • inamedparam: from 0.1.3 to 0.2.0
    • intrange: from 0.3.0 to 0.3.1
    • protogetter: from 0.3.9 to 0.3.12
    • unparam: from 8a5130c to 0df0534
  5. Misc.
    • 🧹 Configuration options renaming (cf. Migration guide)
    • 🧹 Remove options (cf. Migration guide)
    • 🧹 Remove flags (cf. Migration guide)
    • 🧹 Remove alternative names (cf. Migration guide)
    • 🧹 Remove or replace deprecated elements (cf. Migration guide)
    • Adds an option to display some commands as JSON:
      • golangci-lint config path --json
      • golangci-lint help linters --json
      • golangci-lint help formatters --json
      • golangci-lint linters --json
      • golangci-lint formatters --json
      • golangci-lint version --json
  6. Documentation

Configuration

📅 Schedule: Branch creation - Between 08:00 AM and 08:59 AM, on day 1 of the month ( * 8 1 * * ) in timezone Australia/Sydney, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from tim-thacker-nullify as a code owner April 30, 2025 22:12
@renovate renovate bot added the patch Patch version updates (fixes) label Apr 30, 2025
Copy link
Contributor Author

renovate bot commented Apr 30, 2025

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.22.7 -> 1.23.0

@nullify-latest
Copy link
Contributor

nullify-latest bot commented Apr 30, 2025

Nullify Container Vulnerabilities

Container vulnerabilities occur due to misconfigurations, outdated software, or unpatched security flaws in containerized applications.

Severity Threshold: 🟡 HIGH

233 Vulnerabilities found in image: golangci/golangci-lint:v2.2.2@sha256:0f0e3fad35aa127e2823e79809727709bceb6b899ad17362b92a6148ba40c862

Total Vulnerabilities 🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
233 2 14 29 188

FROM golangci/golangci-lint:v2.2.2@sha256:0f0e3fad35aa127e2823e79809727709bceb6b899ad17362b92a6148ba40c862 as golangci-lint

View Vulnerable Packages

Package: debian:libc-bin Version: 2.36-9+deb12u10 Vulnerabilities: 7

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
1 3 3 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2019-9192 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2019-1010025 MEDIUM 5.30 1.40 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2019-1010024 MEDIUM 5.30 1.40 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2019-1010023 HIGH 8.80 5.90 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2019-1010022 CRITICAL 9.80 5.90 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2018-20796 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2010-4756 MEDIUM 4.00 2.90 8.00 AV:N/AC:L/Au:S/C:N/I:N/A:P

Package: debian:libc-dev-bin Version: 2.36-9+deb12u10 Vulnerabilities: 7

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
1 3 3 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2019-9192 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2019-1010025 MEDIUM 5.30 1.40 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2019-1010024 MEDIUM 5.30 1.40 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2019-1010023 HIGH 8.80 5.90 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2019-1010022 CRITICAL 9.80 5.90 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2018-20796 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2010-4756 MEDIUM 4.00 2.90 8.00 AV:N/AC:L/Au:S/C:N/I:N/A:P

Package: debian:libc6 Version: 2.36-9+deb12u10 Vulnerabilities: 7

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
1 3 3 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2019-9192 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2019-1010025 MEDIUM 5.30 1.40 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2019-1010024 MEDIUM 5.30 1.40 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2019-1010023 HIGH 8.80 5.90 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2019-1010022 CRITICAL 9.80 5.90 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2018-20796 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2010-4756 MEDIUM 4.00 2.90 8.00 AV:N/AC:L/Au:S/C:N/I:N/A:P

Package: debian:libc6-dev Version: 2.36-9+deb12u10 Vulnerabilities: 7

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
1 3 3 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2019-9192 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2019-1010025 MEDIUM 5.30 1.40 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2019-1010024 MEDIUM 5.30 1.40 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2019-1010023 HIGH 8.80 5.90 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2019-1010022 CRITICAL 9.80 5.90 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2018-20796 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2010-4756 MEDIUM 4.00 2.90 8.00 AV:N/AC:L/Au:S/C:N/I:N/A:P

Package: debian:wget Version: 1.21.3-1+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
1 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-38428 CRITICAL 9.10 5.20 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVE-2024-10524 MEDIUM 6.50 3.70 2.20
CVE-2021-31879 MEDIUM 6.10 2.70 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Package: debian:zlib1g Version: 1:1.2.13.dfsg-1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
1 0 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-45853 CRITICAL 9.80 5.90 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:libldap-2.5-0 Version: 2.5.13+dfsg-5 Vulnerabilities: 5

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 3 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-2953 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2020-15719 MEDIUM 4.20 2.50 1.60 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
CVE-2017-17740 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2017-14159 MEDIUM 4.70 3.60 1.00 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2015-3276 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Package: debian:libperl5.36 Version: 5.36.0-7+deb12u2 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 3 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2023-31486 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2011-4116 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Package: debian:perl Version: 5.36.0-7+deb12u2 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 3 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2023-31486 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2011-4116 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Package: debian:perl-base Version: 5.36.0-7+deb12u2 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 3 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2023-31486 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2011-4116 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Package: debian:perl-modules-5.36 Version: 5.36.0-7+deb12u2 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 3 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2023-31486 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2011-4116 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Package: debian:openssh-client Version: 1:9.2p1-2+deb12u6 Vulnerabilities: 9

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 2 7 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-51767 HIGH 7.00 5.90 1.00 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2020-15778 HIGH 7.80 5.90 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2020-14145 MEDIUM 5.90 3.60 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2019-6110 MEDIUM 6.80 5.20 1.60 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
CVE-2018-15919 MEDIUM 5.30 1.40 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2016-20012 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2008-3234 MEDIUM 6.50 6.40 8.00 AV:N/AC:L/Au:S/C:P/I:P/A:P
CVE-2007-2768 MEDIUM 4.30 2.90 8.60 AV:N/AC:M/Au:N/C:P/I:N/A:N
CVE-2007-2243 MEDIUM 5.00 2.90 10.00 AV:N/AC:L/Au:N/C:P/I:N/A:N

Package: debian:libpython3.11-minimal Version: 3.11.2-6+deb12u6 Vulnerabilities: 5

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 2 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-6923 MEDIUM 5.50 3.40 2.10
CVE-2023-27043 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2024-9287 HIGH 7.80 5.90 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2024-11168 UNKNOWN

Package: debian:libpython3.11-stdlib Version: 3.11.2-6+deb12u6 Vulnerabilities: 5

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 2 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-6923 MEDIUM 5.50 3.40 2.10
CVE-2023-27043 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2024-9287 HIGH 7.80 5.90 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2024-11168 UNKNOWN

Package: debian:python3.11 Version: 3.11.2-6+deb12u6 Vulnerabilities: 5

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 2 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-6923 MEDIUM 5.50 3.40 2.10
CVE-2023-27043 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2024-9287 HIGH 7.80 5.90 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2024-11168 UNKNOWN

Package: debian:python3.11-minimal Version: 3.11.2-6+deb12u6 Vulnerabilities: 5

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 2 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-6923 MEDIUM 5.50 3.40 2.10
CVE-2023-27043 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2024-9287 HIGH 7.80 5.90 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2024-11168 UNKNOWN

Package: debian:libexpat1 Version: 2.5.0-1+deb12u1 Vulnerabilities: 4

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 2 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-52425 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-50602 MEDIUM 5.90 3.60 2.20
CVE-2024-28757 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2023-52426 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Package: debian:libpam-modules Version: 1.5.2-6+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20
CVE-2024-22365 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2024-10041 MEDIUM 4.70 3.60 1.00

Package: debian:libpam-modules-bin Version: 1.5.2-6+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20
CVE-2024-22365 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2024-10041 MEDIUM 4.70 3.60 1.00

Package: debian:libpam-runtime Version: 1.5.2-6+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20
CVE-2024-22365 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2024-10041 MEDIUM 4.70 3.60 1.00

Package: debian:libpam0g Version: 1.5.2-6+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20
CVE-2024-22365 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2024-10041 MEDIUM 4.70 3.60 1.00

Package: debian:libgssapi-krb5-2 Version: 1.20.1-2+deb12u3 Vulnerabilities: 4

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 1 2
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-26461 LOW 7.50 3.60 3.90
CVE-2024-26458 LOW
CVE-2018-5709 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2024-26462 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Package: debian:libk5crypto3 Version: 1.20.1-2+deb12u3 Vulnerabilities: 4

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 1 2
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-26461 LOW 7.50 3.60 3.90
CVE-2024-26458 LOW
CVE-2018-5709 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2024-26462 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Package: debian:libkrb5-3 Version: 1.20.1-2+deb12u3 Vulnerabilities: 4

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 1 2
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-26461 LOW 7.50 3.60 3.90
CVE-2024-26458 LOW
CVE-2018-5709 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2024-26462 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Package: debian:libkrb5support0 Version: 1.20.1-2+deb12u3 Vulnerabilities: 4

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 1 2
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-26461 LOW 7.50 3.60 3.90
CVE-2024-26458 LOW
CVE-2018-5709 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2024-26462 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Package: debian:git Version: 1:2.39.5-0+deb12u2 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-24975 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2018-1000021 MEDIUM 5.00 3.40 1.60 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L

Package: debian:git-man Version: 1:2.39.5-0+deb12u2 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-24975 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2018-1000021 MEDIUM 5.00 3.40 1.60 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L

Package: debian:libgcrypt20 Version: 1.10.1-3 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-2236 MEDIUM 5.90 3.60 2.20
CVE-2018-6829 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Package: debian:libjansson4 Version: 2.14-2 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2020-36325 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Package: debian:tar Version: 1.34+dfsg-1.2+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2005-2541 HIGH 10.00 10.00 10.00 AV:N/AC:L/Au:N/C:C/I:C/A:C

Package: debian:binutils Version: 2.40-2 Vulnerabilities: 6

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 6 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-1972 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-32256 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-9996 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20712 MEDIUM 6.50 3.60 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20673 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2017-13716 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:binutils-common Version: 2.40-2 Vulnerabilities: 6

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 6 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-1972 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-32256 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-9996 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20712 MEDIUM 6.50 3.60 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20673 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2017-13716 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:binutils-x86-64-linux-gnu Version: 2.40-2 Vulnerabilities: 6

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 6 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-1972 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-32256 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-9996 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20712 MEDIUM 6.50 3.60 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20673 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2017-13716 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libbinutils Version: 2.40-2 Vulnerabilities: 6

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 6 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-1972 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-32256 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-9996 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20712 MEDIUM 6.50 3.60 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20673 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2017-13716 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libctf-nobfd0 Version: 2.40-2 Vulnerabilities: 6

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 6 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-1972 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-32256 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-9996 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20712 MEDIUM 6.50 3.60 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20673 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2017-13716 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libctf0 Version: 2.40-2 Vulnerabilities: 6

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 6 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-1972 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-32256 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-9996 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20712 MEDIUM 6.50 3.60 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20673 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2017-13716 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libgprofng0 Version: 2.40-2 Vulnerabilities: 6

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 6 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-1972 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-32256 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-9996 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20712 MEDIUM 6.50 3.60 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20673 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2017-13716 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libsystemd0 Version: 252.38-1~deb12u1 Vulnerabilities: 4

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 3 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31439 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2023-31438 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2023-31437 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2013-4392 LOW 3.30 4.90 3.40 AV:L/AC:M/Au:N/C:P/I:P/A:N

Package: debian:libudev1 Version: 252.38-1~deb12u1 Vulnerabilities: 4

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 3 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31439 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2023-31438 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2023-31437 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2013-4392 LOW 3.30 4.90 3.40 AV:L/AC:M/Au:N/C:P/I:P/A:N

Package: debian:login Version: 1:4.13+dfsg1-1+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4641 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2023-29383 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVE-2007-5686 MEDIUM 4.90 6.90 3.90 AV:L/AC:L/Au:N/C:C/I:N/A:N

Package: debian:passwd Version: 1:4.13+dfsg1-1+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4641 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2023-29383 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVE-2007-5686 MEDIUM 4.90 6.90 3.90 AV:L/AC:L/Au:N/C:C/I:N/A:N

Package: debian:coreutils Version: 9.1-1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2016-2781 MEDIUM 6.50 4.00 2.00 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
CVE-2017-18018 MEDIUM 4.70 3.60 1.00 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N

Package: debian:cpp-12 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:g++-12 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:gcc-12 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:gcc-12-base Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libasan8 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libatomic1 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libcc1-0 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libgcc-12-dev Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libgcc-s1 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libgomp1 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libitm1 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:liblsan0 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libquadmath0 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libstdc++-12-dev Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libstdc++6 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libtsan2 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libubsan1 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:curl Version: 7.88.1-10+deb12u12 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-9681 MEDIUM 6.50 4.20 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
CVE-2024-2379 LOW 6.30 3.40 2.80

Package: debian:libcurl3-gnutls Version: 7.88.1-10+deb12u12 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-9681 MEDIUM 6.50 4.20 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
CVE-2024-2379 LOW 6.30 3.40 2.80

Package: debian:libcurl4 Version: 7.88.1-10+deb12u12 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-9681 MEDIUM 6.50 4.20 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
CVE-2024-2379 LOW 6.30 3.40 2.80

Package: debian:bsdutils Version: 1:2.38.1-5+deb12u3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-0563 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Package: debian:libblkid1 Version: 2.38.1-5+deb12u3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-0563 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Package: debian:libgnutls30 Version: 3.7.9-2+deb12u4 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2011-3389 MEDIUM 4.30 2.90 8.60 AV:N/AC:M/Au:N/C:P/I:N/A:N

Package: debian:libmount1 Version: 2.38.1-5+deb12u3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-0563 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Package: debian:libncursesw6 Version: 6.4-4 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-50495 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libsmartcols1 Version: 2.38.1-5+deb12u3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-0563 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Package: debian:libsqlite3-0 Version: 3.40.1-2+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2021-45346 MEDIUM 4.30 1.40 2.80 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Package: debian:libtinfo6 Version: 6.4-4 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-50495 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libuuid1 Version: 2.38.1-5+deb12u3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-0563 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Package: debian:mount Version: 2.38.1-5+deb12u3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-0563 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Package: debian:ncurses-base Version: 6.4-4 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-50495 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:ncurses-bin Version: 6.4-4 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-50495 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:util-linux Version: 2.38.1-5+deb12u3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-0563 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Package: debian:util-linux-extra Version: 2.38.1-5+deb12u3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-0563 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Package: debian:apt Version: 2.6.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2011-3374 LOW 3.70 1.40 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Package: debian:dirmngr Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:gnupg Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:gnupg-l10n Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:gnupg-utils Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:gpg Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:gpg-agent Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:gpg-wks-client Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:gpg-wks-server Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:gpgconf Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:gpgsm Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:gpgv Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:libapt-pkg6.0 Version: 2.6.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2011-3374 LOW 3.70 1.40 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Package: debian:libproc2-0 Version: 2:4.0.2-3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4016 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:procps Version: 2:4.0.2-3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4016 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Alternative Images

golangci/golangci-lint:v2.2.2-alpine@sha256:27ec1537dc2c6b17375d234c8fc6fcb567bc73335c092bd15f1cf0190718dbd1

Total Vulnerabilities 🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 0 0
View Vulnerable Packages

Package: alpine:python3 Version: 3.12.11-r0 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-9287 HIGH 7.80 5.90 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

golangci/golangci-lint:v2.2-alpine@sha256:27ec1537dc2c6b17375d234c8fc6fcb567bc73335c092bd15f1cf0190718dbd1

Total Vulnerabilities 🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 0 0
View Vulnerable Packages

Package: alpine:python3 Version: 3.12.11-r0 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-9287 HIGH 7.80 5.90 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

@renovate renovate bot force-pushed the renovate/major-dependencies branch 2 times, most recently from 8991d95 to e49a548 Compare May 4, 2025 18:13
@renovate renovate bot force-pushed the renovate/major-dependencies branch from e49a548 to 79e71db Compare May 8, 2025 15:57
@renovate renovate bot force-pushed the renovate/major-dependencies branch 3 times, most recently from 605a75a to 6e346d8 Compare May 30, 2025 20:04
@renovate renovate bot force-pushed the renovate/major-dependencies branch from 6e346d8 to 1364370 Compare June 24, 2025 19:32
@nullify-latest
Copy link
Contributor

nullify-latest bot commented Jun 24, 2025

Nullify Dependency Vulnerabilities

Dependency vulnerabilities arise from using outdated libraries, unaddressed security issues, or incorrect configurations in software dependencies.

1 findings found in this pull request

🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 0

You can find a list of all findings here

Reply with /nullify to interact with me like another developer

@renovate renovate bot force-pushed the renovate/major-dependencies branch from 1364370 to 904b9e2 Compare June 25, 2025 02:37
@renovate renovate bot force-pushed the renovate/major-dependencies branch 2 times, most recently from 35dbc80 to aa7e46d Compare July 9, 2025 23:32
@renovate renovate bot force-pushed the renovate/major-dependencies branch from aa7e46d to efe6313 Compare July 11, 2025 14:33
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
patch Patch version updates (fixes)
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants