Loading...
Loading...
14 CVE findings
99 | CRITICAL | CVE-2021-44228 | KEV | 97.4%P100 | log4j-corev2.14.1 | scw://instance/i-7f3b9a | 2.17.0 | 2d |
88 | CRITICAL | CVE-2022-22965 | KEV | 96.0%P100 | spring-corev5.3.17 | default/api-deployment | 5.3.18 | 8d |
86 | CRITICAL | CVE-2024-3094 | KEV | 85.0%P99 | liblzmav5.6.0 | default/api-deployment | 5.6.2 | 3d |
80 | HIGH | CVE-2023-44487 | KEV | 62.0%P95 | nginxv1.24.0 | arn:aws:ec2:eu-west-1:123:instance/i-prod-1 | 1.25.3 | 4d |
70 | HIGH | CVE-2023-44487 | KEV | 62.0%P95 | libxml2v2.9.10 | gcp://compute/instance/api-staging-1 | 1.25.3 | 27d |
49 | HIGH | CVE-2024-6387 | - | 36.0%P86 | openssh-serverv9.7p1 | scw://instance/i-staging-2 | 9.8p1 | 13d |
44 | HIGH | CVE-2024-21626 | - | 45.0%P88 | runcv1.1.7 | arn:aws:lambda:eu-west-1:123:function:cleanup | 1.1.12 | 5d |
44 | HIGH | CVE-2024-21626 | - | 45.0%P88 | libcurlv8.0.1 | arn:aws:ec2:eu-west-1:123:instance/i-prod-1 | 1.1.12 | 21d |
32 | CRITICAL | CVE-2024-7264 | - | 0.1%P5 | libcurlv8.9.0 | gcp://compute/instance/api-staging-1 | 8.9.1-1ubuntu2 | 21d |
31 | HIGH | CVE-2023-48795 | - | 1.2%P45 | openssh-serverv9.5p1 | scw://instance/i-staging-2 | 9.6p1 | 6d |
26 | CRITICAL | CVE-2023-50387 | - | 0.8%P25 | bind9v9.18.18 | arn:aws:ec2:eu-west-1:123:instance/i-prod-1 | 9.18.24-0ubuntu0.22.04.1 | 71d |
24 | MEDIUM | CVE-2024-2961 | - | 5.0%P65 | libc6v2.35-0 | gcp://compute/instance/api-staging-1 | 2.35-0ubuntu3.7 | 41d |
24 | MEDIUM | CVE-2024-2961 | - | 5.0%P65 | glibcv2.31 | arn:aws:lambda:eu-west-1:123:function:cleanup | 2.35-0ubuntu3.7 | 14d |
13 | LOW | CVE-2023-26604 | - | 0.1%P2 | systemdv246 | arn:aws:ec2:eu-west-1:123:instance/i-prod-1 | 247 | 51d |