Skip to content

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Apr 30, 2025

This PR contains the following updates:

Package Change Age Confidence Type Update
github.com/docker/docker v27.5.1+incompatible -> v28.3.2+incompatible age confidence require major
github.com/google/go-github/v68 v68.0.0 -> v74.0.0 age confidence require major
golangci/golangci-lint v1.64.8 -> v2.3.0 age confidence stage major

Release Notes

docker/docker (github.com/docker/docker)

v28.3.2+incompatible

Compare Source

v28.3.1+incompatible

Compare Source

v28.3.0+incompatible

Compare Source

v28.2.2+incompatible

Compare Source

v28.2.1+incompatible

Compare Source

v28.2.0+incompatible

Compare Source

v28.1.1+incompatible

Compare Source

v28.1.0+incompatible

Compare Source

v28.0.4+incompatible

Compare Source

v28.0.3+incompatible

Compare Source

v28.0.2+incompatible

Compare Source

v28.0.1+incompatible

Compare Source

v28.0.0+incompatible

Compare Source

google/go-github (github.com/google/go-github/v68)

v74.0.0

Compare Source

This release contains the following breaking API changes:

  • fix!: Add ListSCIMProvisionedGroupsForEnterpriseOptions (#​3601)
    BREAKING CHANGE: ListSCIMProvisionedGroupsForEnterprise now takes ListSCIMProvisionedGroupsForEnterpriseOptions instead of *ListSCIMProvisionedIdentitiesOptions.
  • fix!: Change ListCheckSuiteOptions.AppID from int to int64 (#​3633)
    BREAKING CHANGE: Change ListCheckSuiteOptions.AppID from int to int64

...and the following additional changes:

  • Bump go-github from v72 to v73 in /scrape (#​3600)
  • refactor: Simplify error handling in JSON decoding in tests (#​3602)
  • refactor: fix revive.unused-parameter lint issues (#​3603)
  • chore: Correct typos in comments and tests error messages (#​3604)
  • feat: Add organization migration options (#​3606)
  • feat: Add new enhanced billing endpoints (#​3605)
  • docs: Update HTTP cache references to RFC 9111 compliant implementation (#​3608)
  • fix: Remove custom Accept in Apps.ListRepos and Apps.ListUserRepos (#​3609)
  • fix: Change UsageItem.Quantity from int to float64 (#​3610)
  • fix: Fix broken URL for SubIssueService.Remove endpoint (#​3613)
  • feat: Add DisableRateLimitCheck option to client (#​3607)
  • build(deps): bump github.com/alecthomas/kong from 1.11.0 to 1.12.0 in /tools (#​3614)
  • chore: Fix some minor issues in the comments (#​3615)
  • fix: Handle null assignee in Copilot Seat Billing API response (#​3619)
  • fix: Add ProtectionURL field to Repositories.ListBranches response (#​3618)
  • feat: Add digest field to Artifact (#​3621)
  • fix: Add missing require_last_push_approval field to branch protection rule event structs (#​3623)
  • build(deps): bump golang.org/x/sync from 0.15.0 to 0.16.0 in /tools (#​3624)
  • build(deps): bump golang.org/x/net from 0.41.0 to 0.42.0 in /scrape (#​3625)
  • feat: Add the Digest field to ReleaseAsset (#​3628)
  • refactor: Fix revive.unnecessary-format lint issues (#​3629)
  • build(deps): bump github.com/alecthomas/kong from 1.12.0 to 1.12.1 in /tools (#​3632)
  • docs: Extend RepositoryContentGetOptions description (#​3637)
  • Bump version of go-github to v74.0.0 (#​3638)

v73.0.0

Compare Source

This release contains the following breaking API changes:

  • feat!: Add repository query option to ListCustomPropertyValues (#​3598)
    BREAKING CHANGE: ListCustomPropertyValues now takes ListCustomPropertyValuesOptions instead of ListOptions.

...and the following additional changes:

  • Bump go-github from v71 to v72 in /scrape (#​3572)
  • Update OpenAPI (#​3574)
  • Improve DownloadContents and DownloadContentsWithMeta methods (#​3573)
  • build(deps): bump actions/setup-go from 5.4.0 to 5.5.0 in the actions group (#​3575)
  • build(deps): bump golang.org/x/net from 0.39.0 to 0.40.0 in /scrape (#​3576)
  • build(deps): bump github.com/alecthomas/kong from 1.10.0 to 1.11.0 in /tools (#​3578)
  • build(deps): bump codecov/codecov-action from 5.4.0 to 5.4.3 (#​3579)
  • feat: Add support for sub-issue (#​3580)
  • fix: Add missing relationship and pkg external info for SBOMs (#​3582)
  • chore: Use any instead of interface{} (#​3584)
  • chore: Migrate golangci-lint to v2 (#​3587)
  • chore: Add alexandear to REVIEWERS (#​3588)
  • docs: Update minimum Go version in README to 1.23 (#​3589)
  • fix: Use stable media type in Starring API (#​3590)
  • docs: Use pkgsite links (#​3591)
  • build(deps): bump golang.org/x/net from 0.40.0 to 0.41.0 in /scrape (#​3593)
  • build(deps): bump golang.org/x/sync from 0.14.0 to 0.15.0 in /tools (#​3594)
  • build(deps): bump github.com/cloudflare/circl from 1.3.7 to 1.6.1 in /example (#​3595)
  • Bump version of go-github to v73.0.0 (#​3599)

v72.0.0

Compare Source

This release contains the following breaking API changes:

  • chore!: Remove support for Required Workflows (#​3538)
  • fix!: Differentiate merge method of pull request and merge queue (#​3559)
    BREAKING CHANGE: MergeMethod* consts have been split into: PullRequestMergeMethod* and MergeQueueMergeMethod*.
  • feat!: Add support for pagination options in rules API methods (#​3562)
    BREAKING CHANGE: GetRulesForBranch, GetAllRulesets, and GetAllRepositoryRulesets now accept opts.

...and the following additional changes:

  • Bump go-github from v70 to v71 in /scrape (#​3541)
  • build(deps): bump golang.org/x/net from 0.37.0 to 0.38.0 in /scrape (#​3536)
  • build(deps): bump github.com/alecthomas/kong from 1.9.0 to 1.10.0 in /tools (#​3542)
  • build(deps): bump golang.org/x/sync from 0.12.0 to 0.13.0 in /tools (#​3543)
  • Add support for registry_package event (#​3545)
  • build(deps): bump codecov/codecov-action from 5.4.0 to 5.4.2 (#​3551)
  • build(deps): bump golang.org/x/net from 0.38.0 to 0.39.0 in /scrape (#​3549)
  • build(deps): bump github.com/PuerkitoBio/goquery from 1.10.2 to 1.10.3 in /scrape (#​3550)
  • feat: Add EPSS to Dependabot alerts (#​3547)
  • Revert "build(deps): bump codecov/codecov-action from 5.4.0 to 5.4.2" (#​3552)
  • feat: Add new fields and options to secret scanning structs (#​3548)
  • build(deps): bump golang.org/x/net from 0.36.0 to 0.38.0 in /example in the go_modules group across 1 directory (#​3553)
  • Add case-instensitive GetHeader for HookRequest & HookResponse (#​3556)
  • Add issue Type to IssueRequest (#​3567)
  • build(deps): bump golang.org/x/sync from 0.13.0 to 0.14.0 in /tools (#​3568)
  • build(deps): bump github.com/getkin/kin-openapi from 0.131.0 to 0.132.0 in /tools (#​3569)
  • Add ListCursorOptions to list Issues methods (#​3570)
  • Bump version of go-github to v72.0.0 (#​3571)

v71.0.0

Compare Source

This release contains the following breaking API changes:

  • feat!: Add ListReactionOptions to all ListxxReactions functions to enable filter by content (#​3532)
    BREAKING CHANGE: ListCommentReactionOptions => ListReactionOptions and all List*Reactions methods now use it.

...and the following additional changes:

  • Bump go-github from v69 to v70 in /scrape (#​3521)
  • Path escape fix in UserService.GetPackage() (#​3522)
  • Update openapi (#​3526)
  • feat: Add support for Issue Types API (#​3525)
  • build(deps): bump github.com/golang-jwt/jwt/v4 from 4.5.1 to 4.5.2 in /example (#​3528)
  • build(deps): bump the actions group with 2 updates (#​3530)
  • build(deps): bump github.com/getkin/kin-openapi from 0.130.0 to 0.131.0 in /tools (#​3531)
  • Add ListReleaseReactions and DeleteReleaseReaction (#​3533)
  • feat: Add actions_macos field to APIMeta struct (#​3535)
  • fix: Isolate HTTP transports in parallel tests to prevent connection issues (#​3529)
  • chore: Remove redundant in Go 1.22 loop variables (#​3537)
  • fix: Add back repository field in Package struct (#​3539)
  • Bump version of go-github to v71.0.0 (#​3540)

v70.0.0

Compare Source

This release contains the following breaking API changes:

  • feat!: Add support for network-configurations endpoints for organization (#​3511)
    BREAKING CHANGE: EnterpriseNetwork* structs have been replaced with Network* structs.
  • refactor!: Update package types to align with webhook event (#​3515)
    BREAKING CHANGE: PackageVersion.Body and PackageVersion.Metadata are both now json.RawMessage.

...and the following additional changes:

  • build(deps): bump github.com/alecthomas/kong from 1.8.0 to 1.8.1 in /tools (#​3485)
  • build(deps): bump github.com/google/go-github/v69 from 69.0.0 to 69.2.0 in /scrape (#​3483)
  • build(deps): bump github.com/google/go-cmp from 0.6.0 to 0.7.0 in /tools (#​3490)
  • Bump github.com/google/go-cmp from 0.6.0 to 0.7.0 (#​3494)
  • build(deps): bump actions/cache from 4.2.0 to 4.2.1 in the actions group (#​3492)
  • fix: Resolve '400 Custom domains' error on GitHub Enterprise Server (#​3489)
  • Correct the runIDFromURLRE regex to properly match the callbackURL (#​3495)
  • feat: Add support for GitHub-hosted runner API endpoints (#​3487)
  • feat: Add support for network-configurations endpoints (#​3497)
  • build(deps): bump codecov/codecov-action from 5.3.1 to 5.4.0 (#​3500)
  • build(deps): bump actions/cache from 4.2.1 to 4.2.2 in the actions group (#​3499)
  • Add created_at field to Reaction (#​3501)
  • Add reason parameter to MergeGroupEvent (#​3508)
  • fix(ci): ensure 'auto' toolchain applies to generate (#​3436)
  • Bump dependency versions from dependabot warnings (#​3512)
  • Bump go-jose to v4.0.5 (#​3513)
  • build(deps): bump golang.org/x/net from 0.33.0 to 0.36.0 in /example (#​3514)
  • docs: Update readme and examples for updated go-github-ratelimit and introduce go-github-pagination (#​3504)
  • Add validity filter to secret scanning alert list options (#​3516)
  • build(deps): bump github.com/alecthomas/kong from 1.8.1 to 1.9.0 in /tools (#​3518)
  • build(deps): bump github.com/getkin/kin-openapi from 0.129.0 to 0.130.0 in /tools (#​3517)
  • feat: Add automatic_copilot_code_review_enabled parameter to ruleset API (#​3506)
  • Bump version of go-github to v70.0.0 (#​3520)

v69.2.0

Compare Source

This minor release contains the following changes:

  • Add helper to get runID from Custom Deployment Protection Rule Event (#​3476)
  • feat: Add JSON marshal tests for dependabot alerts (#​3480)
  • feat: Add sorting list options for secret scanning (#​3481)
  • Bump version of go-github to v69.2.0 (#​3482)

v69.1.0

Compare Source

This minor release contains the following changes:

  • Bump go-github from v68 to v69 in /scrape (#​3464)
  • Use a max retry after duration for secondary rate limit if specified (#​3438)
  • docs: Clarify ListPullRequestsWithCommit usage (#​3465)
  • fix: go 1.22 test breakage (#​3459)
  • feat: Add link to bored-engineer/github-conditional-http-transport to conditional requests documentation (#​3469)
  • build(deps): bump golang.org/x/sync from 0.10.0 to 0.11.0 in /tools (#​3472)
  • build(deps): bump golang.org/x/net from 0.34.0 to 0.35.0 in /scrape (#​3470)
  • build(deps): bump github.com/alecthomas/kong from 1.7.0 to 1.8.0 in /tools (#​3471)
  • Update workflow and tools to use Go1.24 and 1.23 (#​3474)
  • chore: Only use master test runs for status badge (#​3475)
  • feat: Add ListProvisionedScimGroupsForEnterprise inside SCIM service (#​3467)
  • fix: Add missing query params to AlertListOptions (#​3477)
  • Bump version of go-github to v69.1.0 (#​3478)

v69.0.0

Compare Source

This release contains the following breaking API changes:

  • feat!: Add support for enterprise rulesets (#​3417)
    BREAKING CHANGE: Create*Ruleset and Update*Ruleset now pass ruleset parameter by-value instead of by-reference.
  • fix!: Typo in field names in the CheckSuite struct (#​3444)
    BREAKING CHANGE: Rerequstable=>Rerequestable, RunsRerequstable=>RunsRerequestable
  • fix!: Typo in field names in the PullStats struct (#​3445)
    BREAKING CHANGE: MergablePulls=>MergeablePulls, UnmergablePulls=>UnmergeablePulls
  • refactor!: Do not capitalize error strings (#​3446)
    BREAKING CHANGE: Some error strings are slightly modified - please do not rely on error text in general.
  • fix!: Refactor the repository ruleset code (#​3430)
    BREAKING CHANGES: The following types have been renamed:
    • Ruleset -> RepositoryRuleset
    • RulesetLink -> RepositoryRulesetLink
    • RulesetLinks -> RepositoryRulesetLinks
    • RulesetRefConditionParameters -> RepositoryRulesetRefConditionParameters
    • RulesetRepositoryNamesConditionParameters -> RepositoryRulesetRepositoryNamesConditionParameters
    • RulesetRepositoryIDsConditionParameters -> RepositoryRulesetRepositoryIDsConditionParameters
    • RulesetRepositoryPropertyTargetParameters -> Repository
    • RulesetRepositoryPropertyConditionParameters -> RepositoryRulesetRepositoryPropertyConditionParameters
    • RulesetOrganizationNamesConditionParameters -> RepositoryRulesetOrganizationNamesConditionParameters
    • RulesetOrganizationIDsConditionParameters -> RepositoryRulesetOrganizationIDsConditionParameters
    • RulesetConditions -> RepositoryRulesetConditions
    • RepositoryRulesetEditedChanges -> RepositoryRulesetChanges
    • RepositoryRulesetEditedSource -> RepositoryRulesetChangeSource
    • RepositoryRulesetEditedSources -> RepositoryRulesetChangeSources
    • RepositoryRulesetEditedConditions -> RepositoryRulesetUpdatedConditions
    • RepositoryRulesetUpdatedConditionsEdited -> RepositoryRulesetUpdatedCondition
    • RepositoryRulesetEditedRules -> RepositoryRulesetChangedRules
    • RepositoryRulesetUpdatedRules -> RepositoryRulesetUpdatedRules
    • RepositoryRulesetEditedRuleChanges -> RepositoryRulesetChangedRule
  • chore!: Add sliceofpointers custom linter (#​3447)
    BREAKING CHANGE: ListOAuthApps now returns ([]*OAuthApp, error) instead of ([]OAuthApp, error).
  • feat!: Change User.InheritedFrom to a slice (#​3460)
    BREAKING CHANGE: User.InheritedFrom is changed from a *Team to a []*Team.

...and the following additional changes:

  • Bump go-github from v67 to v68 in /scrape (#​3398)
  • build(deps): bump golang.org/x/net from 0.32.0 to 0.33.0 in /scrape (#​3400)
  • build(deps): bump codecov/codecov-action from 5.1.1 to 5.1.2 (#​3401)
  • Bump golang.org/x/net to v0.33.0 (#​3402)
  • Add TokenID and TokenName to PersonalAccessToken struct (#​3404)
  • Bump github.com/PuerkitoBio/goquery from 1.9.2 to 1.10.1 in /scrape (#​3408)
  • Bump Go to 1.22.10 or 1.23.4 in go.mod files (#​3410)
  • Add opt-in rate limit support on endpoints returning 302s (#​3411)
  • Update OpenAPI (#​3419)
  • build(deps): bump golang.org/x/net from 0.33.0 to 0.34.0 in /scrape (#​3420)
  • Permit toggling rate limit check by consumers (#​3386)
  • build(deps): Pin and group actions/* (#​3424)
  • Add deprecation messages to security managers APIs (#​3426)
  • fix: Relax go directive in go.mod to 1.22.0 (#​3423)
  • Enforce toolchain requirement in generate.sh (#​3428)
  • feat: Add missing notification_setting to Team (#​3431)
  • chore: Add reviewers file (#​3435)
  • gen-accessors: Update dumping of getters (#​3437)
  • chore: Fix codecov upload (#​3440)
  • chore: Spell "unmarshal" consistently with one el (#​3441)
  • fix: Typos in func parameter, vars, error, and comments (#​3442)
  • feat: Add manage_ghes endpoints introduced in 3.15 (#​3433)
  • Fix minor typo (#​3448)
  • chore: Check and fix license headers (#​3449)
  • Add new fields for IssueType (#​3451)
  • ci: update golangci-lint to v1.63.4 (#​3452)
  • Extend Rate and Rate Limiting with X-Ratelimit-Used and X-Ratelimit-Resource headers (#​3453)
  • build(deps): bump actions/setup-go from 5.2.0 to 5.3.0 in the actions group (#​3454)
  • build(deps): bump codecov/codecov-action from 5.1.2 to 5.3.1 (#​3455)
  • docs: Add clarifications for mergeable field in pull requests (#​3396)
  • build(deps): bump github.com/alecthomas/kong from 1.6.0 to 1.7.0 in /tools (#​3458)
  • Bump version of go-github to v69.0.0 (#​3463)
golangci/golangci-lint (golangci/golangci-lint)

v2.3.0

Compare Source

  1. Linters new features or changes
    • ginkgolinter: from 0.19.1 to 0.20.0 (new option: force-assertion-description)
    • iface: from 1.4.0 to 1.4.1 (report message improvements)
    • noctx: from 0.3.4 to 0.3.5 (new detections: log/slog, exec, crypto/tls)
    • revive: from 1.10.0 to 1.11.0 (new rule: enforce-switch-style)
    • wsl: from 5.0.0 to 5.1.0
  2. Linters bug fixes
    • gosec: from 2.22.5 to 2.22.6
    • noinlineerr: from 1.0.4 to 1.0.5
    • sloglint: from 0.11.0 to 0.11.1
  3. Misc.
    • fix: panic close of closed channel

v2.2.2

Compare Source

  1. Linters bug fixes
    • noinlineerr: from 1.0.3 to 1.0.4
  2. Documentation
    • Improve debug keys documentation
  3. Misc.
    • fix: panic close of closed channel
    • godot: add noinline value into the JSONSchema

v2.2.1

Compare Source

  1. Linters bug fixes
  • varnamelen: fix configuration

v2.2.0

Compare Source

  1. New linters
  2. Linters new features or changes
    • errcheck: add verbose option
    • funcorder: from 0.2.1 to 0.5.0 (new option alphabetical)
    • gomoddirectives: from 0.6.1 to 0.7.0 (new option ignore-forbidden)
    • iface: from 1.3.1 to 1.4.0 (new option unexported)
    • noctx: from 0.1.0 to 0.3.3 (new report messages, and new rules related to database/sql)
    • noctx: from 0.3.3 to 0.3.4 (new SQL functions detection)
    • revive: from 1.9.0 to 1.10.0 (new rules: time-date, unnecessary-format, use-fmt-print)
    • usestdlibvars: from 1.28.0 to 1.29.0 (new option time-date-month)
    • wsl: deprecation
    • wsl_v5: from 4.7.0 to 5.0.0 (major version with new configuration)
  3. Linters bug fixes
    • dupword: from 0.1.3 to 0.1.6
    • exptostd: from 0.4.3 to 0.4.4
    • forbidigo: from 1.6.0 to 2.1.0
    • gci: consistently format the code
    • go-spancheck: from 0.6.4 to 0.6.5
    • goconst: from 1.8.1 to 1.8.2
    • gosec: from 2.22.3 to 2.22.4
    • gosec: from 2.22.4 to 2.22.5
    • makezero: from 1.2.0 to 2.0.1
    • misspell: from 0.6.0 to 0.7.0
    • usetesting: from 0.4.3 to 0.5.0
  4. Misc.
    • exclusions: fix path-expect
    • formatters: write the input to stdout when using stdin and there are no changes
    • migration: improve the error message when trying to migrate a migrated config
    • typecheck: deduplicate errors
    • typecheck: stops the analysis after the first error
    • Deprecate print-resources-usage flag
    • Unique version per custom build
  5. Documentation
    • Improves typecheck FAQ
    • Adds plugin systems recommendations
    • Add description for linters.default sets

v2.1.6

Compare Source

  1. Linters bug fixes
    • godot: from 1.5.0 to 1.5.1
    • musttag: from 0.13.0 to 0.13.1
  2. Documentation
    • Add note about golangci-lint v2 integration in VS Code

v2.1.5

Compare Source

Due to an error related to Snapcraft, some artifacts of the v2.1.4 release have not been published.

This release contains the same things as v2.1.3.

v2.1.4

Compare Source

Due to an error related to Snapcraft, some artifacts of the v2.1.3 release have not been published.

This release contains the same things as v2.1.3.

v2.1.3

Compare Source

  1. Linters bug fixes
    • fatcontext: from 0.7.2 to 0.8.0
  2. Misc.
    • migration: fix nakedret.max-func-lines: 0
    • migration: fix order of staticcheck settings
    • fix: add go.mod hash to the cache salt
    • fix: use diagnostic position for related information position

v2.1.2

Compare Source

  1. Linters bug fixes
    • exptostd: from 0.4.2 to 0.4.3
    • gofumpt: from 0.7.0 to 0.8.0
    • protogetter: from 0.3.13 to 0.3.15
    • usetesting: from 0.4.2 to 0.4.3

v2.1.1

Compare Source

The release process of v2.1.0 failed due to a regression inside goreleaser.

The binaries of v2.1.0 have been published, but not the other artifacts (AUR, Docker, etc.).

v2.1.0

Compare Source

  1. Enhancements
    • Add an option to display absolute paths (--path-mode=abs)
    • Add configuration path placeholder (${config-path})
    • Add warn-unused option for fmt command
    • Colored diff for fmt command (golangci-lint fmt --diff-colored)
  2. New linters
  3. Linters new features or changes
    • go-errorlint: from 1.7.1 to 1.8.0 (automatic error comparison and type assertion fixes)
    • ⚠️ goconst: ignore-strings is deprecated and replaced by ignore-string-values
    • goconst: from 1.7.1 to 1.8.1 (new options: find-duplicates, eval-const-expressions)
    • govet: add httpmux analyzer
    • nilnesserr: from 0.1.2 to 0.2.0 (detect more cases)
    • paralleltest: from 1.0.10 to 1.0.14 (checks only _test.go files)
    • revive: from 1.7.0 to 1.9.0 (support kebab case for setting names)
    • sloglint: from 0.9.0 to 0.11.0 (autofix, new option msg-style, suggest slog.DiscardHandler)
    • wrapcheck: from 2.10.0 to 2.11.0 (new option report-internal-errors)
    • wsl: from 4.6.0 to 4.7.0 (cgo files are always excluded)
  4. Linters bug fixes
    • fatcontext: from 0.7.1 to 0.7.2
    • gocritic: fix importshadow checker
    • gosec: from 2.22.2 to 2.22.3
    • ireturn: from 0.3.1 to 0.4.0
    • loggercheck: from 0.10.1 to 0.11.0
    • nakedret: from 2.0.5 to 2.0.6
    • nonamedreturns: from 1.0.5 to 1.0.6
    • protogetter: from 0.3.12 to 0.3.13
    • testifylint: from 1.6.0 to 1.6.1
    • unconvert: update to HEAD
  5. Misc.
    • Fixes memory leaks when using go1.(N) with golangci-lint built with go1.(N-X)
    • Adds golangci-lint-fmt pre-commit hook
  6. Documentation
    • Improvements
    • Updates section about vscode integration

v2.0.2

Compare Source

  1. Misc.
    • Fixes flags parsing for formatters
    • Fixes the filepath used by the exclusion source option
  2. Documentation
    • Adds a section about flags migration
    • Cleaning pages with v1 options

v2.0.1

Compare Source

  1. Linters/formatters bug fixes
    • golines: fix settings during linter load
  2. Misc.
    • Validates the version field before the configuration
    • forbidigo: fix migration

v2.0.0

Compare Source

  1. Enhancements
  2. New linters/formatters
  3. Linters new features
    • ⚠️ Merge staticcheck, stylecheck, gosimple into one linter (staticcheck) (cf. Migration guide)
    • go-critic: from 0.12.0 to 0.13.0
    • gomodguard: from 1.3.5 to 1.4.1 (block explicit indirect dependencies)
    • nilnil: from 1.0.1 to 1.1.0 (new option: only-two)
    • perfsprint: from 0.8.2 to 0.9.1 (checker name in the diagnostic message)
    • staticcheck: new quickfix set of rules
    • testifylint: from 1.5.2 to 1.6.0 (new options: equal-values, suite-method-signature, require-string-msg)
    • wsl: from 4.5.0 to 4.6.0 (new option: allow-cuddle-used-in-block)
  4. Linters bug fixes
    • bidichk: from 0.3.2 to 0.3.3
    • errchkjson: from 0.4.0 to 0.4.1
    • errname: from 1.0.0 to 1.1.0
    • funlen: fix ignore-comments option
    • gci: from 0.13.5 to 0.13.6
    • gosmopolitan: from 1.2.2 to 1.3.0
    • inamedparam: from 0.1.3 to 0.2.0
    • intrange: from 0.3.0 to 0.3.1
    • protogetter: from 0.3.9 to 0.3.12
    • unparam: from 8a5130c to 0df0534
  5. Misc.
    • 🧹 Configuration options renaming (cf. Migration guide)
    • 🧹 Remove options (cf. Migration guide)
    • 🧹 Remove flags (cf. Migration guide)
    • 🧹 Remove alternative names (cf. Migration guide)
    • 🧹 Remove or replace deprecated elements (cf. Migration guide)
    • Adds an option to display some commands as JSON:
      • golangci-lint config path --json
      • golangci-lint help linters --json
      • golangci-lint help formatters --json
      • golangci-lint linters --json
      • golangci-lint formatters --json
      • golangci-lint version --json
  6. Documentation

Configuration

📅 Schedule: Branch creation - Between 08:00 AM and 08:59 AM, on day 1 of the month ( * 8 1 * * ) in timezone Australia/Sydney, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from tim-thacker-nullify as a code owner April 30, 2025 22:12
@renovate renovate bot added the patch Patch version updates (fixes) label Apr 30, 2025
@renovate
Copy link
Contributor Author

renovate bot commented Apr 30, 2025

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.22.7 -> 1.23.0

@nullify-latest
Copy link
Contributor

nullify-latest bot commented Apr 30, 2025

Nullify Container Vulnerabilities

Container vulnerabilities occur due to misconfigurations, outdated software, or unpatched security flaws in containerized applications.

Severity Threshold: 🟡 HIGH

233 Vulnerabilities found in image: golangci/golangci-lint:v2.3.0@sha256:67bf4b8b2d64faa4effe19cbda0c651c1c3b8099ea26ec2e09bc20a383d2daa4

Total Vulnerabilities 🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
233 2 14 29 188

FROM golangci/golangci-lint:v2.3.0@sha256:67bf4b8b2d64faa4effe19cbda0c651c1c3b8099ea26ec2e09bc20a383d2daa4 as golangci-lint

View Vulnerable Packages

Package: debian:libc-bin Version: 2.36-9+deb12u10 Vulnerabilities: 7

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
1 3 3 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2019-9192 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2019-1010025 MEDIUM 5.30 1.40 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2019-1010024 MEDIUM 5.30 1.40 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2019-1010023 HIGH 8.80 5.90 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2019-1010022 CRITICAL 9.80 5.90 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2018-20796 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2010-4756 MEDIUM 4.00 2.90 8.00 AV:N/AC:L/Au:S/C:N/I:N/A:P

Package: debian:libc-dev-bin Version: 2.36-9+deb12u10 Vulnerabilities: 7

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
1 3 3 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2019-9192 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2019-1010025 MEDIUM 5.30 1.40 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2019-1010024 MEDIUM 5.30 1.40 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2019-1010023 HIGH 8.80 5.90 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2019-1010022 CRITICAL 9.80 5.90 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2018-20796 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2010-4756 MEDIUM 4.00 2.90 8.00 AV:N/AC:L/Au:S/C:N/I:N/A:P

Package: debian:libc6 Version: 2.36-9+deb12u10 Vulnerabilities: 7

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
1 3 3 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2019-9192 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2019-1010025 MEDIUM 5.30 1.40 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2019-1010024 MEDIUM 5.30 1.40 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2019-1010023 HIGH 8.80 5.90 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2019-1010022 CRITICAL 9.80 5.90 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2018-20796 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2010-4756 MEDIUM 4.00 2.90 8.00 AV:N/AC:L/Au:S/C:N/I:N/A:P

Package: debian:libc6-dev Version: 2.36-9+deb12u10 Vulnerabilities: 7

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
1 3 3 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2019-9192 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2019-1010025 MEDIUM 5.30 1.40 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2019-1010024 MEDIUM 5.30 1.40 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2019-1010023 HIGH 8.80 5.90 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2019-1010022 CRITICAL 9.80 5.90 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2018-20796 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2010-4756 MEDIUM 4.00 2.90 8.00 AV:N/AC:L/Au:S/C:N/I:N/A:P

Package: debian:wget Version: 1.21.3-1+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
1 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-38428 CRITICAL 9.10 5.20 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVE-2024-10524 MEDIUM 6.50 3.70 2.20
CVE-2021-31879 MEDIUM 6.10 2.70 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Package: debian:zlib1g Version: 1:1.2.13.dfsg-1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
1 0 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-45853 CRITICAL 9.80 5.90 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:libldap-2.5-0 Version: 2.5.13+dfsg-5 Vulnerabilities: 5

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 3 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-2953 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2020-15719 MEDIUM 4.20 2.50 1.60 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
CVE-2017-17740 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2017-14159 MEDIUM 4.70 3.60 1.00 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2015-3276 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Package: debian:libperl5.36 Version: 5.36.0-7+deb12u2 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 3 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2023-31486 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2011-4116 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Package: debian:perl Version: 5.36.0-7+deb12u2 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 3 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2023-31486 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2011-4116 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Package: debian:perl-base Version: 5.36.0-7+deb12u2 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 3 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2023-31486 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2011-4116 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Package: debian:perl-modules-5.36 Version: 5.36.0-7+deb12u2 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 3 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2023-31486 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2011-4116 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Package: debian:openssh-client Version: 1:9.2p1-2+deb12u6 Vulnerabilities: 9

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 2 7 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-51767 HIGH 7.00 5.90 1.00 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2020-15778 HIGH 7.80 5.90 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2020-14145 MEDIUM 5.90 3.60 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2019-6110 MEDIUM 6.80 5.20 1.60 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
CVE-2018-15919 MEDIUM 5.30 1.40 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2016-20012 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2008-3234 MEDIUM 6.50 6.40 8.00 AV:N/AC:L/Au:S/C:P/I:P/A:P
CVE-2007-2768 MEDIUM 4.30 2.90 8.60 AV:N/AC:M/Au:N/C:P/I:N/A:N
CVE-2007-2243 MEDIUM 5.00 2.90 10.00 AV:N/AC:L/Au:N/C:P/I:N/A:N

Package: debian:libpython3.11-minimal Version: 3.11.2-6+deb12u6 Vulnerabilities: 5

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 2 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-6923 MEDIUM 5.50 3.40 2.10
CVE-2023-27043 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2024-9287 HIGH 7.80 5.90 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2024-11168 UNKNOWN

Package: debian:libpython3.11-stdlib Version: 3.11.2-6+deb12u6 Vulnerabilities: 5

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 2 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-6923 MEDIUM 5.50 3.40 2.10
CVE-2023-27043 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2024-9287 HIGH 7.80 5.90 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2024-11168 UNKNOWN

Package: debian:python3.11 Version: 3.11.2-6+deb12u6 Vulnerabilities: 5

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 2 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-6923 MEDIUM 5.50 3.40 2.10
CVE-2023-27043 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2024-9287 HIGH 7.80 5.90 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2024-11168 UNKNOWN

Package: debian:python3.11-minimal Version: 3.11.2-6+deb12u6 Vulnerabilities: 5

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 2 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-6923 MEDIUM 5.50 3.40 2.10
CVE-2023-27043 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2024-9287 HIGH 7.80 5.90 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2024-11168 UNKNOWN

Package: debian:libexpat1 Version: 2.5.0-1+deb12u1 Vulnerabilities: 4

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 2 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-52425 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-50602 MEDIUM 5.90 3.60 2.20
CVE-2024-28757 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2023-52426 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Package: debian:libpam-modules Version: 1.5.2-6+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20
CVE-2024-22365 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2024-10041 MEDIUM 4.70 3.60 1.00

Package: debian:libpam-modules-bin Version: 1.5.2-6+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20
CVE-2024-22365 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2024-10041 MEDIUM 4.70 3.60 1.00

Package: debian:libpam-runtime Version: 1.5.2-6+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20
CVE-2024-22365 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2024-10041 MEDIUM 4.70 3.60 1.00

Package: debian:libpam0g Version: 1.5.2-6+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20
CVE-2024-22365 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2024-10041 MEDIUM 4.70 3.60 1.00

Package: debian:libgssapi-krb5-2 Version: 1.20.1-2+deb12u3 Vulnerabilities: 4

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 1 2
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-26461 LOW 7.50 3.60 3.90
CVE-2024-26458 LOW
CVE-2018-5709 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2024-26462 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Package: debian:libk5crypto3 Version: 1.20.1-2+deb12u3 Vulnerabilities: 4

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 1 2
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-26461 LOW 7.50 3.60 3.90
CVE-2024-26458 LOW
CVE-2018-5709 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2024-26462 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Package: debian:libkrb5-3 Version: 1.20.1-2+deb12u3 Vulnerabilities: 4

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 1 2
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-26461 LOW 7.50 3.60 3.90
CVE-2024-26458 LOW
CVE-2018-5709 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2024-26462 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Package: debian:libkrb5support0 Version: 1.20.1-2+deb12u3 Vulnerabilities: 4

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 1 2
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-26461 LOW 7.50 3.60 3.90
CVE-2024-26458 LOW
CVE-2018-5709 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2024-26462 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Package: debian:git Version: 1:2.39.5-0+deb12u2 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-24975 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2018-1000021 MEDIUM 5.00 3.40 1.60 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L

Package: debian:git-man Version: 1:2.39.5-0+deb12u2 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-24975 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2018-1000021 MEDIUM 5.00 3.40 1.60 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L

Package: debian:libgcrypt20 Version: 1.10.1-3 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-2236 MEDIUM 5.90 3.60 2.20
CVE-2018-6829 HIGH 7.50 3.60 3.90 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Package: debian:libjansson4 Version: 2.14-2 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2020-36325 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Package: debian:tar Version: 1.34+dfsg-1.2+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2005-2541 HIGH 10.00 10.00 10.00 AV:N/AC:L/Au:N/C:C/I:C/A:C

Package: debian:binutils Version: 2.40-2 Vulnerabilities: 6

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 6 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-1972 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-32256 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-9996 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20712 MEDIUM 6.50 3.60 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20673 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2017-13716 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:binutils-common Version: 2.40-2 Vulnerabilities: 6

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 6 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-1972 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-32256 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-9996 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20712 MEDIUM 6.50 3.60 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20673 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2017-13716 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:binutils-x86-64-linux-gnu Version: 2.40-2 Vulnerabilities: 6

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 6 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-1972 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-32256 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-9996 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20712 MEDIUM 6.50 3.60 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20673 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2017-13716 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libbinutils Version: 2.40-2 Vulnerabilities: 6

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 6 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-1972 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-32256 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-9996 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20712 MEDIUM 6.50 3.60 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20673 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2017-13716 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libctf-nobfd0 Version: 2.40-2 Vulnerabilities: 6

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 6 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-1972 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-32256 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-9996 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20712 MEDIUM 6.50 3.60 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20673 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2017-13716 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libctf0 Version: 2.40-2 Vulnerabilities: 6

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 6 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-1972 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-32256 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-9996 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20712 MEDIUM 6.50 3.60 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20673 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2017-13716 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libgprofng0 Version: 2.40-2 Vulnerabilities: 6

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 6 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-1972 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-32256 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-9996 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20712 MEDIUM 6.50 3.60 2.80 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2018-20673 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2017-13716 MEDIUM 5.50 3.60 1.80 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libsystemd0 Version: 252.38-1~deb12u1 Vulnerabilities: 4

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 3 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31439 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2023-31438 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2023-31437 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2013-4392 LOW 3.30 4.90 3.40 AV:L/AC:M/Au:N/C:P/I:P/A:N

Package: debian:libudev1 Version: 252.38-1~deb12u1 Vulnerabilities: 4

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 3 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31439 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2023-31438 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2023-31437 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2013-4392 LOW 3.30 4.90 3.40 AV:L/AC:M/Au:N/C:P/I:P/A:N

Package: debian:login Version: 1:4.13+dfsg1-1+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4641 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2023-29383 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVE-2007-5686 MEDIUM 4.90 6.90 3.90 AV:L/AC:L/Au:N/C:C/I:N/A:N

Package: debian:passwd Version: 1:4.13+dfsg1-1+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4641 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2023-29383 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVE-2007-5686 MEDIUM 4.90 6.90 3.90 AV:L/AC:L/Au:N/C:C/I:N/A:N

Package: debian:coreutils Version: 9.1-1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2016-2781 MEDIUM 6.50 4.00 2.00 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
CVE-2017-18018 MEDIUM 4.70 3.60 1.00 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N

Package: debian:cpp-12 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:g++-12 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:gcc-12 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:gcc-12-base Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libasan8 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libatomic1 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libcc1-0 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libgcc-12-dev Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libgcc-s1 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libgomp1 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libitm1 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:liblsan0 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libquadmath0 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libstdc++-12-dev Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libstdc++6 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libtsan2 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libubsan1 Version: 12.2.0-14+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4039 MEDIUM 4.80 2.50 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-27943 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:curl Version: 7.88.1-10+deb12u12 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-9681 MEDIUM 6.50 4.20 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
CVE-2024-2379 LOW 6.30 3.40 2.80

Package: debian:libcurl3-gnutls Version: 7.88.1-10+deb12u12 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-9681 MEDIUM 6.50 4.20 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
CVE-2024-2379 LOW 6.30 3.40 2.80

Package: debian:libcurl4 Version: 7.88.1-10+deb12u12 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-9681 MEDIUM 6.50 4.20 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
CVE-2024-2379 LOW 6.30 3.40 2.80

Package: debian:bsdutils Version: 1:2.38.1-5+deb12u3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-0563 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Package: debian:libblkid1 Version: 2.38.1-5+deb12u3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-0563 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Package: debian:libgnutls30 Version: 3.7.9-2+deb12u4 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2011-3389 MEDIUM 4.30 2.90 8.60 AV:N/AC:M/Au:N/C:P/I:N/A:N

Package: debian:libmount1 Version: 2.38.1-5+deb12u3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-0563 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Package: debian:libncursesw6 Version: 6.4-4 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-50495 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libsmartcols1 Version: 2.38.1-5+deb12u3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-0563 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Package: debian:libsqlite3-0 Version: 3.40.1-2+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2021-45346 MEDIUM 4.30 1.40 2.80 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Package: debian:libtinfo6 Version: 6.4-4 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-50495 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libuuid1 Version: 2.38.1-5+deb12u3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-0563 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Package: debian:mount Version: 2.38.1-5+deb12u3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-0563 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Package: debian:ncurses-base Version: 6.4-4 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-50495 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:ncurses-bin Version: 6.4-4 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-50495 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:util-linux Version: 2.38.1-5+deb12u3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-0563 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Package: debian:util-linux-extra Version: 2.38.1-5+deb12u3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-0563 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Package: debian:apt Version: 2.6.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2011-3374 LOW 3.70 1.40 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Package: debian:dirmngr Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:gnupg Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:gnupg-l10n Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:gnupg-utils Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:gpg Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:gpg-agent Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:gpg-wks-client Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:gpg-wks-server Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:gpgconf Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:gpgsm Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:gpgv Version: 2.2.40-1.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2022-3219 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:libapt-pkg6.0 Version: 2.6.1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2011-3374 LOW 3.70 1.40 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Package: debian:libproc2-0 Version: 2:4.0.2-3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4016 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Package: debian:procps Version: 2:4.0.2-3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 1
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4016 LOW 3.30 1.40 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Alternative Images

golangci/golangci-lint:v2.3.0-alpine@sha256:8cde2fcc8ccc6c8ca7d4476ac35ab30de546204368c678bc7080560e69952a62

Total Vulnerabilities 🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 0 0
View Vulnerable Packages

Package: alpine:python3 Version: 3.12.11-r0 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-9287 HIGH 7.80 5.90 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

golangci/golangci-lint:v2.3-alpine@sha256:8cde2fcc8ccc6c8ca7d4476ac35ab30de546204368c678bc7080560e69952a62

Total Vulnerabilities 🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 0 0
View Vulnerable Packages

Package: alpine:python3 Version: 3.12.11-r0 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-9287 HIGH 7.80 5.90 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

@renovate renovate bot force-pushed the renovate/major-dependencies branch 2 times, most recently from 8991d95 to e49a548 Compare May 4, 2025 18:13
@renovate renovate bot force-pushed the renovate/major-dependencies branch from e49a548 to 79e71db Compare May 8, 2025 15:57
@renovate renovate bot force-pushed the renovate/major-dependencies branch 3 times, most recently from 605a75a to 6e346d8 Compare May 30, 2025 20:04
@renovate renovate bot force-pushed the renovate/major-dependencies branch from 6e346d8 to 1364370 Compare June 24, 2025 19:32
@nullify-latest
Copy link
Contributor

nullify-latest bot commented Jun 24, 2025

Nullify Dependency Vulnerabilities

Dependency vulnerabilities arise from using outdated libraries, unaddressed security issues, or incorrect configurations in software dependencies.

1 findings found in this pull request

🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 0

You can find a list of all findings here

Reply with /nullify to interact with me like another developer

@renovate renovate bot force-pushed the renovate/major-dependencies branch from 1364370 to 904b9e2 Compare June 25, 2025 02:37
@renovate renovate bot force-pushed the renovate/major-dependencies branch 3 times, most recently from aa7e46d to efe6313 Compare July 11, 2025 14:33
@renovate renovate bot force-pushed the renovate/major-dependencies branch from efe6313 to eb69703 Compare July 21, 2025 23:28
@renovate renovate bot force-pushed the renovate/major-dependencies branch from eb69703 to 38890ca Compare July 23, 2025 16:44
@renovate
Copy link
Contributor Author

renovate bot commented Jul 28, 2025

Edited/Blocked Notification

Renovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR.

You can manually request rebase by checking the rebase/retry box above.

⚠️ Warning: custom changes will be lost.

@tim-thacker-nullify tim-thacker-nullify added this pull request to the merge queue Aug 4, 2025
Merged via the queue into main with commit 477c9f3 Aug 4, 2025
5 checks passed
@tim-thacker-nullify tim-thacker-nullify deleted the renovate/major-dependencies branch August 4, 2025 18:00
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

patch Patch version updates (fixes)

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants