Security vulnerabilities for various packages on unix system
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
wolfi | any | x86_64 | aactl | 0.4.12-r7 | aactl-0.4.12-r7.apk |
wolfi | any | aarch64 | aactl | 0.4.12-r7 | aactl-0.4.12-r7.apk |
wolfi | any | x86_64 | actions-runner-controller | 0.8.1-r1 | actions-runner-controller-0.8.1-r1.apk |
wolfi | any | aarch64 | actions-runner-controller | 0.8.1-r1 | actions-runner-controller-0.8.1-r1.apk |
wolfi | any | x86_64 | amass | 4.2.0-r8 | amass-4.2.0-r8.apk |
wolfi | any | aarch64 | amass | 4.2.0-r8 | amass-4.2.0-r8.apk |
wolfi | any | x86_64 | apko | 0.12.0-r2 | apko-0.12.0-r2.apk |
wolfi | any | aarch64 | apko | 0.12.0-r2 | apko-0.12.0-r2.apk |
wolfi | any | x86_64 | argo-cd | 2.7.15-r6 | argo-cd-2.7.15-r6.apk |
wolfi | any | aarch64 | argo-cd | 2.7.15-r6 | argo-cd-2.7.15-r6.apk |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo