Add 69 Advisories
CVE Exclusion List
Please check all CVEs which are to be excluded when running the exclusion job:
START EXCLUSION LIST
-
gem/omniauth-microsoft_graph CVE-2024-21632 -
go/github.com/aws/aws-sdk-go CVE-2023-51651 -
go/github.com/buildkite/elastic-ci-stack-for-aws/v6 CVE-2023-43116 -
go/github.com/buildkite/elastic-ci-stack-for-aws/v6 CVE-2023-43741 -
go/github.com/cubefs/cubefs CVE-2023-46738 -
go/github.com/cubefs/cubefs CVE-2023-46739 -
go/github.com/cubefs/cubefs CVE-2023-46740 -
go/github.com/cubefs/cubefs CVE-2023-46741 -
go/github.com/cubefs/cubefs CVE-2023-46742 -
go/github.com/gravitational/teleport GMS-2024-1 -
go/github.com/gravitational/teleport GMS-2024-2 -
go/github.com/gravitational/teleport GMS-2024-3 -
go/github.com/karmada-io/karmada GMS-2024-4 -
go/github.com/mattermost/mattermost-server/v6 CVE-2023-47858 -
go/github.com/mattermost/mattermost-server/v6 CVE-2023-48732 -
go/github.com/mattermost/mattermost/server/v8 CVE-2023-47858 -
go/github.com/mattermost/mattermost/server/v8 CVE-2023-48732 -
go/github.com/mattermost/mattermost/server/v8 CVE-2023-50333 -
go/github.com/mattermost/mattermost/server/v8 CVE-2023-7113 -
maven/cn.hutool/hutool-core CVE-2023-51080 -
maven/com.amazon.ion/ion-java CVE-2024-21634 -
maven/com.github.seancfoley/ipaddress CVE-2023-50570 -
maven/net.mingsoft/ms-mcms CVE-2023-50578 -
maven/org.apache.dolphinscheduler/dolphinscheduler-master CVE-2023-49299 -
maven/org.apache.inlong/manager-pojo CVE-2023-51784 -
maven/org.apache.inlong/manager-pojo CVE-2023-51785 -
maven/org.jeecgframework.boot/jeecg-boot-common CVE-2023-41542 -
maven/org.jeecgframework.boot/jeecg-boot-common CVE-2023-41543 -
maven/org.jeecgframework.boot/jeecg-boot-common CVE-2023-41544 -
maven/org.keycloak/keycloak-core CVE-2023-48795 -
maven/org.keycloak/keycloak-model-infinispan CVE-2023-48795 -
maven/org.keycloak/keycloak-model-jpa CVE-2023-48795 -
maven/org.keycloak/keycloak-parent CVE-2023-48795 -
maven/org.keycloak/keycloak-saml-core-public CVE-2023-48795 -
maven/org.keycloak/keycloak-server-spi-private CVE-2023-48795 -
maven/org.keycloak/keycloak-services CVE-2023-48795 -
maven/org.keycloak/keycloak-wildfly-server-subsystem CVE-2023-48795 -
maven/org.opencrx/opencrx-core CVE-2023-27150 -
npm/@perfood/couch-auth CVE-2023-39655 -
npm/keycloak-connect CVE-2023-48795 -
npm/layui CVE-2023-50550 -
npm/plotly.js CVE-2023-46308 -
npm/wrangler CVE-2023-7079 -
npm/wrangler CVE-2023-7080 -
packagist/corveda/phpsandbox CVE-2014-125107 -
packagist/craftcms/cms CVE-2024-21622 -
packagist/dilab/resumable.php CVE-2023-52086 -
packagist/gilacms/gila CVE-2020-26623 -
packagist/plotly/plotly.js CVE-2023-46308 -
packagist/prestashop/prestashop CVE-2024-21627 -
packagist/prestashop/prestashop CVE-2024-21628 -
packagist/typo3/cms CVE-2023-30451 -
pypi/Flask-Security-Too CVE-2023-49438 -
pypi/paddlepaddle CVE-2023-38674 -
pypi/paddlepaddle CVE-2023-38676 -
pypi/paddlepaddle CVE-2023-38677 -
pypi/paddlepaddle CVE-2023-38678 -
pypi/paddlepaddle CVE-2023-52302 -
pypi/paddlepaddle CVE-2023-52303 -
pypi/paddlepaddle CVE-2023-52304 -
pypi/paddlepaddle CVE-2023-52305 -
pypi/paddlepaddle CVE-2023-52306 -
pypi/paddlepaddle CVE-2023-52307 -
pypi/paddlepaddle CVE-2023-52308 -
pypi/paddlepaddle CVE-2023-52309 -
pypi/paddlepaddle CVE-2023-52310 -
pypi/paddlepaddle CVE-2023-52311 -
pypi/paddlepaddle CVE-2023-52312 -
pypi/paddlepaddle CVE-2023-52314
END EXCLUSION LIST
To be checked:
-
I have evaluated the MR acceptance checklist for this MR.