Add 81 Advisories
CVE Exclusion List
Please check all CVEs which are to be excluded when running the exclusion job:
START EXCLUSION LIST
-
go/github.com/docker/docker CVE-2023-28840 -
go/github.com/docker/docker CVE-2023-28841 -
go/github.com/docker/docker CVE-2023-28842 -
go/github.com/hashicorp/nomad CVE-2023-1782 -
go/github.com/hashicorp/vault CVE-2023-0665 -
go/github.com/hashicorp/vault CVE-2023-25000 -
go/github.com/mattermost/mattermost-server CVE-2023-1775 -
go/github.com/mattermost/mattermost-server CVE-2023-1776 -
go/github.com/mattermost/mattermost-server CVE-2023-1777 -
go/github.com/mattermost/mattermost-server/v5 CVE-2023-1775 -
go/github.com/mattermost/mattermost-server/v5 CVE-2023-1776 -
go/github.com/mattermost/mattermost-server/v6 CVE-2023-1775 -
go/github.com/mattermost/mattermost-server/v6 CVE-2023-1776 -
go/github.com/mattermost/mattermost-server/v6 CVE-2023-1777 -
go/github.com/opencontainers/runc/libcontainer CVE-2023-25809 -
go/github.com/opencontainers/runc/libcontainer CVE-2023-28642 -
go/github.com/phachon/mm-wiki CVE-2020-19277 -
go/github.com/russellhaering/goxmldsig GMS-2021-681 -
go/github.com/sjqzhang/go-fastdfs CVE-2023-1800 -
go/github.com/sjqzhang/go-fastdfs CVE-2023-23677 -
maven/com.baomidou/mybatis-plus CVE-2023-25330 -
maven/com.ruoyi/ruoyi CVE-2023-27025 -
maven/com.veracode.jenkins/veracode-scan CVE-2023-25721 -
maven/com.veracode.jenkins/veracode-scan CVE-2023-25722 -
maven/io.goobi.viewer/viewer-core CVE-2023-29014 -
maven/io.goobi.viewer/viewer-core CVE-2023-29015 -
maven/io.goobi.viewer/viewer-core CVE-2023-29016 -
maven/net.mingsoft/ms-mcms CVE-2020-20913 -
maven/net.sourceforge.htmlunit/htmlunit CVE-2023-26119 -
maven/org.jeecgframework.boot/jeecg-boot-parent CVE-2023-1784 -
maven/org.jenkinsci.plugins/octoperf CVE-2023-28673 -
maven/org.jenkinsci.plugins/octoperf CVE-2023-28675 -
maven/org.keycloak/keycloak-core CVE-2022-1274 -
maven/org.keycloak/keycloak-model-infinispan CVE-2022-1274 -
maven/org.keycloak/keycloak-model-jpa CVE-2022-1274 -
maven/org.keycloak/keycloak-parent CVE-2022-1274 -
maven/org.keycloak/keycloak-saml-core-public CVE-2022-1274 -
maven/org.keycloak/keycloak-server-spi-private CVE-2022-1274 -
maven/org.keycloak/keycloak-wildfly-server-subsystem CVE-2022-1274 -
maven/org.openapitools/openapi-generator CVE-2023-27162 -
npm/@sveltejs/kit CVE-2023-29003 -
npm/@sveltejs/kit CVE-2023-29008 -
npm/directus CVE-2020-19850 -
npm/editor.md CVE-2020-19697 -
npm/editor.md CVE-2020-19698 -
npm/keycloak-connect CVE-2022-1274 -
npm/markdown-pdf CVE-2023-0835 -
npm/vm2 CVE-2023-29017 -
npm/xml2js CVE-2023-0842 -
nuget/nasm CVE-2022-44368 -
nuget/nasm CVE-2022-44369 -
nuget/nasm CVE-2022-44370 -
packagist/appwrite/server-ce CVE-2023-27159 -
packagist/centreon/centreon CVE-2022-42424 -
packagist/centreon/centreon CVE-2022-42425 -
packagist/centreon/centreon CVE-2022-42426 -
packagist/centreon/centreon CVE-2022-42427 -
packagist/centreon/centreon CVE-2022-42428 -
packagist/centreon/centreon CVE-2022-42429 -
packagist/grumpydictator/firefly-iii CVE-2023-1788 -
packagist/microweber/microweber CVE-2023-1877 -
packagist/microweber/microweber CVE-2023-1881 -
packagist/thorsten/phpmyfaq CVE-2023-1756 -
packagist/thorsten/phpmyfaq CVE-2023-1757 -
packagist/thorsten/phpmyfaq CVE-2023-1758 -
packagist/thorsten/phpmyfaq CVE-2023-1762 -
packagist/thorsten/phpmyfaq CVE-2023-1878 -
packagist/thorsten/phpmyfaq CVE-2023-1879 -
packagist/thorsten/phpmyfaq CVE-2023-1880 -
packagist/thorsten/phpmyfaq CVE-2023-1882 -
packagist/thorsten/phpmyfaq CVE-2023-1883 -
packagist/thorsten/phpmyfaq CVE-2023-1884 -
packagist/thorsten/phpmyfaq CVE-2023-1885 -
packagist/thorsten/phpmyfaq CVE-2023-1886 -
packagist/thorsten/phpmyfaq CVE-2023-1887 -
pypi/apache-airflow-providers-apache-drill CVE-2023-28707 -
pypi/apache-airflow-providers-apache-hive CVE-2023-28706 -
pypi/apache-airflow-providers-apache-spark CVE-2023-28710 -
pypi/configobj CVE-2023-26112 -
pypi/kiwitcms CVE-2023-27489 -
pypi/langchain CVE-2023-29374
END EXCLUSION LIST
To be checked:
-
I have evaluated the MR acceptance checklist for this MR.