CVE-2023-48795 vulnerabilities affecting multiple package
Reporter | Title | Published | Views | Family All 200 |
---|---|---|---|---|
![]() | Rogue Session Attack (Terrapin) | 19 Dec 202306:46 | – | veracode |
![]() | Prefix Truncation Attack (Terrapin Attack) | 19 Dec 202309:12 | – | veracode |
![]() | Fedora 39 : podman-tui (2023-20feb865d8) | 28 Dec 202300:00 | – | nessus |
![]() | EulerOS 2.0 SP9 : libssh2 (EulerOS-SA-2024-1178) | 8 Feb 202400:00 | – | nessus |
![]() | FreeBSD : putty -- add protocol extension against 'Terrapin attack' (91955195-9ebb-11ee-bc14-a703705db3a6) | 20 Dec 202300:00 | – | nessus |
![]() | RHEL 7 : ssh (Unpatched Vulnerability) | 11 May 202400:00 | – | nessus |
![]() | Oracle Coherence (April 2024 CPU) | 19 Apr 202400:00 | – | nessus |
![]() | Fedora 39 : podman (2024-3bb23c77f3) | 8 Jan 202400:00 | – | nessus |
![]() | FreeBSD : FreeBSD -- Prefix Truncation Attack in the SSH protocol (13d83980-9f18-11ee-8e38-002590c1f29c) | 2 Jan 202400:00 | – | nessus |
![]() | Fedora 39 : putty (2024-d946b9ad25) | 10 Jan 202400:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
wolfi | any | x86_64 | aactl | 0.4.12-r7 | aactl-0.4.12-r7.apk |
wolfi | any | aarch64 | aactl | 0.4.12-r7 | aactl-0.4.12-r7.apk |
wolfi | any | x86_64 | actions-runner-controller | 0.8.1-r1 | actions-runner-controller-0.8.1-r1.apk |
wolfi | any | aarch64 | actions-runner-controller | 0.8.1-r1 | actions-runner-controller-0.8.1-r1.apk |
wolfi | any | x86_64 | amass | 4.2.0-r8 | amass-4.2.0-r8.apk |
wolfi | any | aarch64 | amass | 4.2.0-r8 | amass-4.2.0-r8.apk |
wolfi | any | x86_64 | apko | 0.12.0-r2 | apko-0.12.0-r2.apk |
wolfi | any | aarch64 | apko | 0.12.0-r2 | apko-0.12.0-r2.apk |
wolfi | any | x86_64 | argo-cd | 2.7.15-r6 | argo-cd-2.7.15-r6.apk |
wolfi | any | aarch64 | argo-cd | 2.7.15-r6 | argo-cd-2.7.15-r6.apk |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo