Vulnerabilities in Unix package
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
wolfi | any | x86_64 | apko | 0.7.3-r1 | apko-0.7.3-r1.apk |
wolfi | any | aarch64 | apko | 0.7.3-r1 | apko-0.7.3-r1.apk |
wolfi | any | x86_64 | bom | 0.6.0-r0 | bom-0.6.0-r0.apk |
wolfi | any | aarch64 | bom | 0.6.0-r0 | bom-0.6.0-r0.apk |
wolfi | any | x86_64 | ctop | 0.7.7-r13 | ctop-0.7.7-r13.apk |
wolfi | any | aarch64 | ctop | 0.7.7-r13 | ctop-0.7.7-r13.apk |
wolfi | any | x86_64 | helm | 3.12.2-r1 | helm-3.12.2-r1.apk |
wolfi | any | aarch64 | helm | 3.12.2-r1 | helm-3.12.2-r1.apk |
wolfi | any | x86_64 | ko | 0.13.0-r3 | ko-0.13.0-r3.apk |
wolfi | any | aarch64 | ko | 0.13.0-r3 | ko-0.13.0-r3.apk |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo