Skip to content

Add 69 Advisories

CVE Exclusion List

Please check all CVEs which are to be excluded when running the exclusion job:

START EXCLUSION LIST

  • gem/omniauth-microsoft_graph CVE-2024-21632

  • go/github.com/aws/aws-sdk-go CVE-2023-51651

  • go/github.com/buildkite/elastic-ci-stack-for-aws/v6 CVE-2023-43116

  • go/github.com/buildkite/elastic-ci-stack-for-aws/v6 CVE-2023-43741

  • go/github.com/cubefs/cubefs CVE-2023-46738

  • go/github.com/cubefs/cubefs CVE-2023-46739

  • go/github.com/cubefs/cubefs CVE-2023-46740

  • go/github.com/cubefs/cubefs CVE-2023-46741

  • go/github.com/cubefs/cubefs CVE-2023-46742

  • go/github.com/gravitational/teleport GMS-2024-1

  • go/github.com/gravitational/teleport GMS-2024-2

  • go/github.com/gravitational/teleport GMS-2024-3

  • go/github.com/karmada-io/karmada GMS-2024-4

  • go/github.com/mattermost/mattermost-server/v6 CVE-2023-47858

  • go/github.com/mattermost/mattermost-server/v6 CVE-2023-48732

  • go/github.com/mattermost/mattermost/server/v8 CVE-2023-47858

  • go/github.com/mattermost/mattermost/server/v8 CVE-2023-48732

  • go/github.com/mattermost/mattermost/server/v8 CVE-2023-50333

  • go/github.com/mattermost/mattermost/server/v8 CVE-2023-7113

  • maven/cn.hutool/hutool-core CVE-2023-51080

  • maven/com.amazon.ion/ion-java CVE-2024-21634

  • maven/com.github.seancfoley/ipaddress CVE-2023-50570

  • maven/net.mingsoft/ms-mcms CVE-2023-50578

  • maven/org.apache.dolphinscheduler/dolphinscheduler-master CVE-2023-49299

  • maven/org.apache.inlong/manager-pojo CVE-2023-51784

  • maven/org.apache.inlong/manager-pojo CVE-2023-51785

  • maven/org.jeecgframework.boot/jeecg-boot-common CVE-2023-41542

  • maven/org.jeecgframework.boot/jeecg-boot-common CVE-2023-41543

  • maven/org.jeecgframework.boot/jeecg-boot-common CVE-2023-41544

  • maven/org.keycloak/keycloak-core CVE-2023-48795

  • maven/org.keycloak/keycloak-model-infinispan CVE-2023-48795

  • maven/org.keycloak/keycloak-model-jpa CVE-2023-48795

  • maven/org.keycloak/keycloak-parent CVE-2023-48795

  • maven/org.keycloak/keycloak-saml-core-public CVE-2023-48795

  • maven/org.keycloak/keycloak-server-spi-private CVE-2023-48795

  • maven/org.keycloak/keycloak-services CVE-2023-48795

  • maven/org.keycloak/keycloak-wildfly-server-subsystem CVE-2023-48795

  • maven/org.opencrx/opencrx-core CVE-2023-27150

  • npm/@perfood/couch-auth CVE-2023-39655

  • npm/keycloak-connect CVE-2023-48795

  • npm/layui CVE-2023-50550

  • npm/plotly.js CVE-2023-46308

  • npm/wrangler CVE-2023-7079

  • npm/wrangler CVE-2023-7080

  • packagist/corveda/phpsandbox CVE-2014-125107

  • packagist/craftcms/cms CVE-2024-21622

  • packagist/dilab/resumable.php CVE-2023-52086

  • packagist/gilacms/gila CVE-2020-26623

  • packagist/plotly/plotly.js CVE-2023-46308

  • packagist/prestashop/prestashop CVE-2024-21627

  • packagist/prestashop/prestashop CVE-2024-21628

  • packagist/typo3/cms CVE-2023-30451

  • pypi/Flask-Security-Too CVE-2023-49438

  • pypi/paddlepaddle CVE-2023-38674

  • pypi/paddlepaddle CVE-2023-38676

  • pypi/paddlepaddle CVE-2023-38677

  • pypi/paddlepaddle CVE-2023-38678

  • pypi/paddlepaddle CVE-2023-52302

  • pypi/paddlepaddle CVE-2023-52303

  • pypi/paddlepaddle CVE-2023-52304

  • pypi/paddlepaddle CVE-2023-52305

  • pypi/paddlepaddle CVE-2023-52306

  • pypi/paddlepaddle CVE-2023-52307

  • pypi/paddlepaddle CVE-2023-52308

  • pypi/paddlepaddle CVE-2023-52309

  • pypi/paddlepaddle CVE-2023-52310

  • pypi/paddlepaddle CVE-2023-52311

  • pypi/paddlepaddle CVE-2023-52312

  • pypi/paddlepaddle CVE-2023-52314

END EXCLUSION LIST

To be checked:

Edited by Michael Henriksen

Merge request reports