diff --git a/docs/docs-content/security-bulletins/reports/cve-2019-1010022.md b/docs/docs-content/security-bulletins/reports/cve-2019-1010022.md index 3ca5382f77..d2d56b4a9e 100644 --- a/docs/docs-content/security-bulletins/reports/cve-2019-1010022.md +++ b/docs/docs-content/security-bulletins/reports/cve-2019-1010022.md @@ -14,7 +14,7 @@ tags: ["security", "cve"] ## Last Update -10/10/2024 +10/29/2024 ## NIST CVE Summary @@ -24,7 +24,12 @@ to bypass stack guard. NOTE: Upstream comments indicate "this is being treated a ## Our Official Summary -Waiting on a fix from third party mongodb vendor. +The issue relates to a mitigation bypass in the GNU Libc library's NPTL component, allowing attackers to circumvent +stack guard protection via a stack buffer overflow. This is considered a post-attack mitigation rather than a direct +vulnerability by many upstream maintainers. In our products, exploiting this vulnerability on the 3rd party images is +very low since this issue does not directly lead to code execution. Instead, it weakens an additional layer of +protection after an attack has already occurred, thus classifying it as a post-attack hardening issue. We are waiting on +an upstream fix from the 3rd party vendors and will upgrade the images once the upstream fix becomes available. ## CVE Severity diff --git a/docs/docs-content/security-bulletins/reports/cve-2021-39537.md b/docs/docs-content/security-bulletins/reports/cve-2021-39537.md index e0eb011733..44f0fd41b7 100644 --- a/docs/docs-content/security-bulletins/reports/cve-2021-39537.md +++ b/docs/docs-content/security-bulletins/reports/cve-2021-39537.md @@ -14,7 +14,7 @@ tags: ["security", "cve"] ## Last Update -10/10/2024 +10/29/2024 ## NIST CVE Summary @@ -22,7 +22,11 @@ An issue was discovered in ncurses through v6.2-1. \_nc_captoinfo in captoinfo.c ## Our Official Summary -Waiting on a fix from third party mongodb & calico vendors. +This vulnerability is reported on some 3rd party images used by our products. This flaw results from a lack of proper +bounds checking during input processing. By exploiting this boundary error, an attacker can create a malicious file, +deceive the victim into opening it using the affected software, and initiate an out-of-bounds write, potentially +impacting system availability. We are waiting on an upstream fix from the 3rd party vendor. We will upgrade the images +once the upstream fix becomes available. ## CVE Severity diff --git a/docs/docs-content/security-bulletins/reports/cve-2021-46848.md b/docs/docs-content/security-bulletins/reports/cve-2021-46848.md index 5e4f312453..ac442dd6ab 100644 --- a/docs/docs-content/security-bulletins/reports/cve-2021-46848.md +++ b/docs/docs-content/security-bulletins/reports/cve-2021-46848.md @@ -14,7 +14,7 @@ tags: ["security", "cve"] ## Last Update -10/10/24 +10/29/24 ## NIST CVE Summary @@ -24,7 +24,9 @@ GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affe This is a vulnerability reported in GNU Libtasn1 before version 4.19.0, a library used to manage the ASN.1 data structure. This vulnerability is caused by an off-by-one array size check issue, leading to an out-of-bounds read. -Impacting systems using GNU Libtasn1 before 4.19.0. Waiting on an upstream fix. +Impacting systems using GNU Libtasn1 before 4.19.0. This flaw enables access to one additional memory byte, +significantly constraining the potential damage an attacker could inflict. We are waiting on an upstream fix from the +3rd party vendors and will upgrade the images once the upstream fix becomes available. ## CVE Severity diff --git a/docs/docs-content/security-bulletins/reports/cve-2023-24540.md b/docs/docs-content/security-bulletins/reports/cve-2023-24540.md index bdaec63f33..586a8f31ac 100644 --- a/docs/docs-content/security-bulletins/reports/cve-2023-24540.md +++ b/docs/docs-content/security-bulletins/reports/cve-2023-24540.md @@ -14,7 +14,7 @@ tags: ["security", "cve"] ## Last Update -10/10/2024 +10/29/2024 ## NIST CVE Summary @@ -28,8 +28,9 @@ This is a vulnerability affecting the Golang Go software, specifically the html/ improper handling of JavaScript whitespace characters in certain contexts, leading to potential security risks. Systems using Golang Go versions up to 1.19.9 and from 1.20.0 to 1.20.4 are affected, particularly those using the html/template package with JavaScript contexts containing actions and specific whitespace characters. The images in which -vulnerabilities are report do not use the html package. So possibility of this vulnerability getting exploited in -Spectro Cloud products is low. There is a upstream fix available, we will upgrade to that version. +vulnerabilities are reported are not directly exposed. This restricts access to the vulnerable golang html/templates to +authenticated users only, reducing the impact. We are waiting on an upstream fix from the 3rd party vendors. We will +upgrade the images once the upstream fix becomes available. ## CVE Severity diff --git a/docs/docs-content/security-bulletins/reports/cve-2023-37920.md b/docs/docs-content/security-bulletins/reports/cve-2023-37920.md index 5c51148993..4bccb6f644 100644 --- a/docs/docs-content/security-bulletins/reports/cve-2023-37920.md +++ b/docs/docs-content/security-bulletins/reports/cve-2023-37920.md @@ -14,7 +14,7 @@ tags: ["security", "cve"] ## Last Update -10/10/2024 +10/29/2024 ## NIST CVE Summary @@ -25,7 +25,12 @@ Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store. ## Our Official Summary -Waiting on a fix from third party mongodb & calico vendors. +This vulnerability was found in the python-certifi package. eTurgra certificates are marked as untrusted by Mozilla and +were removed from Mozilla's root store in July 2023. This issue occurs when the e-Tugra root certificate in Certifi is +removed, resulting in an unspecified error that has an unknown impact and attack vector. This issue is mostly impacted +during the use of web browsers. The vulnerability exploitation likelihood in the calico cni images is low. We are +waiting on an upstream fix from the 3rd party vendors. We will upgrade the images once the upstream fix becomes +available. ## CVE Severity diff --git a/docs/docs-content/security-bulletins/reports/cve-2024-1485.md b/docs/docs-content/security-bulletins/reports/cve-2024-1485.md index 9e7f2cebe7..ee2c0131ea 100644 --- a/docs/docs-content/security-bulletins/reports/cve-2024-1485.md +++ b/docs/docs-content/security-bulletins/reports/cve-2024-1485.md @@ -14,7 +14,7 @@ tags: ["security", "cve"] ## Last Update -10/24/24 +10/29/24 ## NIST CVE Summary @@ -25,7 +25,11 @@ allowed. ## Our Official Summary -Investigation is ongoing to determine how this vulnerability affects our products. +This vulnerability can be exploited by an unauthenticated remote attacker who tricks a user into parsing a devfile with +parent or plugin keywords. This malicious interaction could result in the download of a harmful archive, leading the +cleanup process to overwrite or delete files outside the intended archive scope. There is no evidence that a public +proof-of-concept exists. We are waiting on an upstream fix from the 3rd party vendors and will upgrade the images once +the upstream fix becomes available. ## CVE Severity diff --git a/docs/docs-content/security-bulletins/reports/cve-2024-21626.md b/docs/docs-content/security-bulletins/reports/cve-2024-21626.md index 11dda4c5db..3d11ce8848 100644 --- a/docs/docs-content/security-bulletins/reports/cve-2024-21626.md +++ b/docs/docs-content/security-bulletins/reports/cve-2024-21626.md @@ -14,7 +14,7 @@ tags: ["security", "cve"] ## Last Update -10/10/2024 +10/29/2024 ## NIST CVE Summary @@ -28,8 +28,12 @@ overwrite semi-arbitrary host binaries, allowing for complete container escapes ## Our Official Summary -CVE exists in kube-proxy 1.28.11. Affects only k8s version 1.28.11 For customer workload clusters, workaround is to use -k8s version 1.29+. For Palette Self Hosted cluster, a future release will upgrade to 1.29+. +A file descriptor leak issue was found in the runc package. These vulnerabilities not only enable malicious actors to +escape containerized environments but also allow for full control over the underlying host system. The presence of these +dependencies in the container does not imply a security risk to the containerized application itself, as it is based on +low-level packages included, and the impact to the container's core functionality is minimal. Upstream fix from the 3rd +party vendors is awaited. We are waiting on an upstream fix from the 3rd party vendors and will upgrade the images once +the upstream fix becomes available. ## CVE Severity diff --git a/docs/docs-content/security-bulletins/reports/cve-2024-24790.md b/docs/docs-content/security-bulletins/reports/cve-2024-24790.md index 05bc9911d1..602a316cf2 100644 --- a/docs/docs-content/security-bulletins/reports/cve-2024-24790.md +++ b/docs/docs-content/security-bulletins/reports/cve-2024-24790.md @@ -14,7 +14,7 @@ tags: ["security", "cve"] ## Last Update -10/25/2024 +10/29/2024 ## NIST CVE Summary @@ -23,8 +23,8 @@ false for addresses which would return true in their traditional IPv4 forms. ## Our Official Summary -This vulnerability is reported on several 3rd party images used by the product. We are waiting on an upstream fix from -the vendor. If the vulnerability is exploited, impact is low for the products using these images. +This vulnerability is reported on some of the 3rd party csi images and coredns images from Kubernetes. This CVE requires +a network-based attack vector. We will upgrade the images when the fixes are available from the vendor. ## CVE Severity diff --git a/docs/docs-content/security-bulletins/reports/cve-2024-37371.md b/docs/docs-content/security-bulletins/reports/cve-2024-37371.md index 403c0ea48a..d5d8d3ee09 100644 --- a/docs/docs-content/security-bulletins/reports/cve-2024-37371.md +++ b/docs/docs-content/security-bulletins/reports/cve-2024-37371.md @@ -14,7 +14,7 @@ tags: ["security", "cve"] ## Last Update -10/10/2024 +10/29/2024 ## NIST CVE Summary @@ -25,8 +25,13 @@ by sending message tokens with invalid length fields. This CVE is a memory corruption vulnerability reported on kerboros libraries. Attackers could potentially exploit a flaw within Kerberos' handling of GSS (Generic Security Service) message tokens to cause invalid memory reads, potentially -leading to system crashes. Risk of this specific vulnerability for spectro cloud components is low. Working on -removing/upgrading libraries to fix the issue. +leading to system crashes. This issue is classified as a moderate severity vulnerability because, while it allows an +attacker to modify the plaintext "Extra Count" field of a GSS krb5 wrap token, the impact is primarily limited to token +truncation at the application layer. This truncation can disrupt services but does not directly lead to a full +compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token +transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token. +We are waiting on an upstream fix from the 3rd party vendor and will upgrade the images once the upstream fix becomes +available. ## CVE Severity diff --git a/docs/docs-content/security-bulletins/reports/cve-2024-45491.md b/docs/docs-content/security-bulletins/reports/cve-2024-45491.md index bfad18a57f..c13ea1ab21 100644 --- a/docs/docs-content/security-bulletins/reports/cve-2024-45491.md +++ b/docs/docs-content/security-bulletins/reports/cve-2024-45491.md @@ -26,7 +26,7 @@ An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have This CVE identifies an integer overflow vulnerability found in libexpat versions prior to 2.6.3, specifically in the dtdCopy function of xmlparse.c on 32-bit platforms. This vulnerability can be exploited over a network without user interaction and has very low attack complexity. Not all of the images affected use the specific function affected. -Exploiting this vulnerable library will require a user to compromise the containers and gain privileged access. Fix +Exploiting this vulnerable library will require a user to compromise the containers and gain privileged access. Fix is available in libexpat versions > 2.6.3. Investigating upgrading this library within the affected images. ## CVE Severity diff --git a/docs/docs-content/security-bulletins/reports/reports.md b/docs/docs-content/security-bulletins/reports/reports.md index ee64f7be1d..4623111275 100644 --- a/docs/docs-content/security-bulletins/reports/reports.md +++ b/docs/docs-content/security-bulletins/reports/reports.md @@ -36,7 +36,7 @@ Click on the CVE ID to view the full details of the vulnerability. | CVE ID | Initial Pub Date | Modified Date | Product Version | Vulnerability Type | CVSS Severity | Status | | ----------------------------------------------- | ---------------- | ------------- | ----------------------------- | --------------------------------------- | -------------------------------------------------------------------- | --------------------------- | -| [CVE-2024-21626](./cve-2024-21626.md) | 1/3/24 | 10/10/24 | 4.4.11, 4.4.14, 4.4.18, 4.5.3 | Third-party component: kube-proxy | [8.6](https://nvd.nist.gov/vuln/detail/CVE-2024-21626) | :mag: Ongoing | +| [CVE-2024-21626](./cve-2024-21626.md) | 1/3/24 | 10/29/24 | 4.4.11, 4.4.14, 4.4.18, 4.5.3 | Third-party component: kube-proxy | [8.6](https://nvd.nist.gov/vuln/detail/CVE-2024-21626) | :mag: Ongoing | | [CVE-2022-41723](./cve-2022-41723.md) | 2/28/23 | 10/10/24 | 4.4.11, 4.4.14, 4.4.18 | Third-party component: CoreDNS | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2022-41723) | :mag: Ongoing | | [GHSA-m425-mq94-257g](./ghsa-m425-mq94-257g.md) | 10/25/23 | 10/25/24 | 4.4.11, 4.4.14, 4.4.18, 4.5.3 | Third-party component: CoreDNS | [7.5](https://github.com/advisories/GHSA-m425-mq94-257g) | :mag: Ongoing | | [CVE-2023-45142](./cve-2023-45142.md) | 10/12/23 | 10/10/24 | 4.4.11, 4.4.14, 4.4.18 | Third-party component: OpenTelemetry-Go | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2023-45142) | :mag: Ongoing | @@ -47,13 +47,13 @@ Click on the CVE ID to view the full details of the vulnerability. | [CVE-2022-25883](./cve-2022-25883.md) | 6/21/23 | 9/25/24 | 4.4.11, 4.4.14 | Third-party component: CAPI | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2022-25883) | :mag: Ongoing | | [CVE-2015-8855](./cve-2015-8855.md) | 1/23/17 | 9/25/24 | 4.4.11 | Third-party component: CAPI | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2015-8855) | :mag: Ongoing | | [CVE-2019-12900](./cve-2019-12900.md) | 08/16/24 | 10/25/24 | 4.4.14, 4.4.18, 4.5.3 | Third-party component: BZ2 | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2019-12900) | :mag: Ongoing | -| [CVE-2023-37920](./cve-2023-37920.md) | 08/16/24 | 10/10/24 | 4.4.14, 4.4.18, 4.5.3 | Third-party component: Certifi | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2023-37920) | :mag: Ongoing | -| [CVE-2019-1010022](./cve-2019-1010022.md) | 08/16/24 | 10/10/24 | 4.4.14, 4.4.18, 4.5.3 | Third-party component: GNU Libc | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2019-1010022) | :mag: Ongoing | +| [CVE-2023-37920](./cve-2023-37920.md) | 08/16/24 | 10/29/24 | 4.4.14, 4.4.18, 4.5.3 | Third-party component: Certifi | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2023-37920) | :mag: Ongoing | +| [CVE-2019-1010022](./cve-2019-1010022.md) | 08/16/24 | 10/29/24 | 4.4.14, 4.4.18, 4.5.3 | Third-party component: GNU Libc | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2019-1010022) | :mag: Ongoing | | [CVE-2016-1585](./cve-2016-1585.md) | 08/16/24 | 9/25/24 | 4.4.14 | Third-party component: Ubuntu | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2016-1585) | :mag: Ongoing | | [CVE-2018-20839](./cve-2018-20839.md) | 08/16/24 | 10/10/24 | 4.4.14, 4.4.18, 4.5.3 | Third-party component: MongoDB | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2018-20839) | :mag: Ongoing | | [CVE-2024-38428](./cve-2024-38428.md) | 08/16/24 | 10/10/24 | 4.4.14, 4.4.18 | Third-party component: MongoDB | [9.1](https://nvd.nist.gov/vuln/detail/CVE-2024-38428) | :mag: Ongoing | | [CVE-2021-42694](./cve-2021-42694.md) | 08/16/24 | 10/10/24 | 4.4.14, 4.4.18, 4.5.3 | Third-party component: MongoDB | [8.3](https://nvd.nist.gov/vuln/detail/CVE-2021-42694) | :mag: Ongoing | -| [CVE-2021-39537](./cve-2021-39537.md) | 08/16/24 | 10/10/24 | 4.4.14, 4.4.18, 4.5.3 | Third-party component: MongoDB | [8.8](https://nvd.nist.gov/vuln/detail/CVE-2021-39537) | :mag: Ongoing | +| [CVE-2021-39537](./cve-2021-39537.md) | 08/16/24 | 10/29/24 | 4.4.14, 4.4.18, 4.5.3 | Third-party component: MongoDB | [8.8](https://nvd.nist.gov/vuln/detail/CVE-2021-39537) | :mag: Ongoing | | [CVE-2019-9923](./cve-2019-9923.md) | 08/16/24 | 9/25/24 | 4.4.14 | Third-party component: MongoDB | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2019-9923) | :mag: Ongoing | | [CVE-2020-36325](./cve-2020-36325.md) | 08/16/24 | 10/10/24 | 4.4.14, 4.4.18, 4.5.3 | Third-party component: Jansson | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2020-36325) | :mag: Ongoing | | [CVE-2005-2541](./cve-2005-2541.md) | 08/16/24 | 10/25/24 | 4.4.14, 4.5.3 | Third-party component: MongoDB | [10.0](https://nvd.nist.gov/vuln/detail/CVE-2005-2541) | :mag: Ongoing | @@ -75,7 +75,7 @@ Click on the CVE ID to view the full details of the vulnerability. | [CVE-2023-27534](./cve-2023-27534.md) | 08/16/24 | 10/25/24 | 4.4.14 | Third-party component: MongoDB | [8.8](https://nvd.nist.gov/vuln/detail/CVE-2023-27534) | :mag: Ongoing | | [CVE-2023-32636](./cve-2023-32636.md) | 08/16/24 | 10/25/24 | 4.4.14 | Third-party component: MongoDB | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2023-32636) | :mag: Ongoing | | [CVE-2023-29499](./cve-2023-29499.md) | 08/16/24 | 10/25/24 | 4.4.14 | Third-party component: MongoDB | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2023-29499) | :mag: Ongoing | -| [CVE-2024-24790](./cve-2024-24790.md) | 8/6/24 | 10/25/24 | 4.4.11, 4.4.14 | Third-party component: Go Project | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2024-24790) | :mag: Ongoing | +| [CVE-2024-24790](./cve-2024-24790.md) | 8/6/24 | 10/29/24 | 4.4.11, 4.4.14 | Third-party component: Go Project | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2024-24790) | :mag: Ongoing | | [CVE-2023-4156](./cve-2023-4156.md) | 08/16/24 | 10/25/24 | 4.4.14 | Third-party component: MongoDB | [7.1](https://nvd.nist.gov/vuln/detail/CVE-2023-4156) | :mag: Ongoing | | [CVE-2022-23990](./cve-2022-23990.md) | 08/16/24 | 10/25/24 | 4.4.14 | Third-party component: MongoDB | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2022-23990) | :mag: Ongoing | | [CVE-2020-35512](./cve-2020-35512.md) | 08/16/24 | 10/25/24 | 4.4.14 | Third-party component: MongoDB | [7.8](https://nvd.nist.gov/vuln/detail/CVE-2020-35512) | :mag: Ongoing | @@ -85,9 +85,9 @@ Click on the CVE ID to view the full details of the vulnerability. | [GHSA-74fp-r6jw-h4mp](./ghsa-74fp-r6jw-h4mp.md) | 10/25/23 | 10/10/24 | 4.4.11, 4.4.14, 4.4.18, 4.5.3 | Third-party component: Kubernetes API | [7.5](https://github.com/advisories/GHSA-74fp-r6jw-h4mp) | :mag: Ongoing | | [CVE-2024-35325](./cve-2024-35325.md) | 08/27/24 | 08/30/24 | 4.4.14 | Third-party component: Libyaml | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2024-35325) | :white_check_mark: Resolved | | [CVE-2024-6197](./cve-2024-6197.md) | 08/27/24 | 10/10/24 | 4.4.14 | Third-party component: Libcurl | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2024-6197) | :mag: Ongoing | -| [CVE-2024-37371](./cve-2024-37371.md) | 08/30/24 | 10/10/24 | 4.4.14, 4.4.18, 4.5.3 | Third-party component: MIT Kerberos | [9.1](https://nvd.nist.gov/vuln/detail/CVE-2024-37371) | :mag: Ongoing | +| [CVE-2024-37371](./cve-2024-37371.md) | 08/30/24 | 10/29/24 | 4.4.14, 4.4.18, 4.5.3 | Third-party component: MIT Kerberos | [9.1](https://nvd.nist.gov/vuln/detail/CVE-2024-37371) | :mag: Ongoing | | [CVE-2024-37370](./cve-2024-37370.md) | 08/30/24 | 10/10/24 | 4.4.14, 4.4.18, 4.5.3 | Third-party component: MIT Kerberos | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2024-37370) | :mag: Ongoing | -| [CVE-2021-46848](./cve-2021-46848.md) | 9/5/24 | 10/10/24 | 4.4.14, 4.4.18, 4.5.3 | Third-party component: GNU Libtasn1 | [9.1](https://nvd.nist.gov/vuln/detail/CVE-2021-46848) | :mag: Ongoing | +| [CVE-2021-46848](./cve-2021-46848.md) | 9/5/24 | 10/29/24 | 4.4.14, 4.4.18, 4.5.3 | Third-party component: GNU Libtasn1 | [9.1](https://nvd.nist.gov/vuln/detail/CVE-2021-46848) | :mag: Ongoing | | [CVE-2024-7592](./cve-2024-7592.md) | 9/5/24 | 9/5/24 | 4.4.14, 4.4.18 | Third-party component: CPython | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2024-7592) | :mag: Ongoing | | [CVE-2024-1737](./cve-2024-1737.md) | 9/5/24 | 10/10/24 | 4.4.14, 4.4.18 | Third-party component: ISC | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2024-1737) | :mag: Ongoing | | [CVE-2024-0760](./cve-2024-0760.md) | 9/5/24 | 10/10/24 | 4.4.14, 4.4.18 | Third-party component: ISC | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2024-0760) | :mag: Ongoing | @@ -108,14 +108,14 @@ Click on the CVE ID to view the full details of the vulnerability. | CVE ID | Initial Pub Date | Modified Date | Product Version | Vulnerability Type | CVSS Severity | Status | | ----------------------------------------------- | ---------------- | ------------- | ---------------------- | --------------------------------------- | -------------------------------------------------------- | ------------- | -| [CVE-2024-37371](./cve-2024-37371.md) | 08/30/24 | 10/10/24 | 4.4.18, 4.5.3 | Third-party component: MIT Kerberos | [9.1](https://nvd.nist.gov/vuln/detail/CVE-2024-37371) | :mag: Ongoing | -| [CVE-2019-1010022](./cve-2019-1010022.md) | 08/16/24 | 10/10/24 | 4.4.18, 4.5.3 | Third-party component: GNU Libc | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2019-1010022) | :mag: Ongoing | +| [CVE-2024-37371](./cve-2024-37371.md) | 08/30/24 | 10/29/24 | 4.4.18, 4.5.3 | Third-party component: MIT Kerberos | [9.1](https://nvd.nist.gov/vuln/detail/CVE-2024-37371) | :mag: Ongoing | +| [CVE-2019-1010022](./cve-2019-1010022.md) | 08/16/24 | 10/29/24 | 4.4.18, 4.5.3 | Third-party component: GNU Libc | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2019-1010022) | :mag: Ongoing | | [CVE-2024-45490](./cve-2024-45490.md) | 9/5/24 | 10/10/24 | 4.4.18, 4.5.3 | Third-party component: Libexpat | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2024-45490) | :mag: Ongoing | | [CVE-2019-12900](./cve-2019-12900.md) | 08/16/24 | 10/25/24 | 4.4.18, 4.5.3 | Third-party component: BZ2 | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2019-12900) | :mag: Ongoing | -| [CVE-2021-46848](./cve-2021-46848.md) | 9/5/24 | 10/10/24 | 4.4.18, 4.5.3 | Third-party component: GNU Libtasn1 | [9.1](https://nvd.nist.gov/vuln/detail/CVE-2021-46848) | :mag: Ongoing | -| [CVE-2024-24790](./cve-2024-24790.md) | 8/6/24 | 10/25/24 | 4.4.14, 4.4.18, 4.5.3 | Third-party component: Go Project | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2024-24790) | :mag: Ongoing | +| [CVE-2021-46848](./cve-2021-46848.md) | 9/5/24 | 10/29/24 | 4.4.18, 4.5.3 | Third-party component: GNU Libtasn1 | [9.1](https://nvd.nist.gov/vuln/detail/CVE-2021-46848) | :mag: Ongoing | +| [CVE-2024-24790](./cve-2024-24790.md) | 8/6/24 | 10/29/24 | 4.4.14, 4.4.18, 4.5.3 | Third-party component: Go Project | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2024-24790) | :mag: Ongoing | | [CVE-2018-20839](./cve-2018-20839.md) | 08/16/24 | 10/10/24 | 4.4.18, 4.5.3 | Third-party component: MongoDB | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2018-20839) | :mag: Ongoing | -| [CVE-2023-37920](./cve-2023-37920.md) | 08/16/24 | 10/10/24 | 4.4.18, 4.5.3 | Third-party component: Certifi | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2023-37920) | :mag: Ongoing | +| [CVE-2023-37920](./cve-2023-37920.md) | 08/16/24 | 10/29/24 | 4.4.18, 4.5.3 | Third-party component: Certifi | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2023-37920) | :mag: Ongoing | | [CVE-2024-45491](./cve-2024-45491.md) | 9/5/24 | 10/10/24 | 4.4.18, 4.5.3 | Third-party component: Libexpat | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2024-45491) | :mag: Ongoing | | [CVE-2024-45492](./cve-2024-45492.md) | 9/5/24 | 10/10/24 | 4.4.18, 4.5.3 | Third-party component: Libexpat | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2024-45492) | :mag: Ongoing | | [CVE-2024-38428](./cve-2024-38428.md) | 08/16/24 | 10/10/24 | 4.4.14, 4.4.18 | Third-party component: MongoDB | [9.1](https://nvd.nist.gov/vuln/detail/CVE-2024-38428) | :mag: Ongoing | @@ -132,7 +132,7 @@ Click on the CVE ID to view the full details of the vulnerability. | [CVE-2022-4899](./cve-2022-4899.md) | 08/16/24 | 10/25/24 | 4.4.18, 4.5.3 | Third-party component: MongoDB | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2022-4899) | :mag: Ongoing | | [CVE-2022-41723](./cve-2022-41723.md) | 2/28/23 | 10/10/24 | 4.4.11, 4.4.14, 4.4.18 | Third-party component: CoreDNS | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2022-41723) | :mag: Ongoing | | [CVE-2023-0464](./cve-2023-0464.md) | 3/22/23 | 10/10/24 | 4.4.18, 4.5.3 | Third-party component: OpenSSL | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2023-0464) | :mag: Ongoing | -| [CVE-2021-39537](./cve-2021-39537.md) | 08/16/24 | 10/10/24 | 4.4.18, 4.5.3 | Third-party component: MongoDB | [8.8](https://nvd.nist.gov/vuln/detail/CVE-2021-39537) | :mag: Ongoing | +| [CVE-2021-39537](./cve-2021-39537.md) | 08/16/24 | 10/29/24 | 4.4.18, 4.5.3 | Third-party component: MongoDB | [8.8](https://nvd.nist.gov/vuln/detail/CVE-2021-39537) | :mag: Ongoing | | [CVE-2018-20657](./cve-2018-20657.md) | 08/16/24 | 10/25/24 | 4.4.18, 4.5.3 | Third-party component: MongoDB | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2018-20657) | :mag: Ongoing | | [CVE-2021-42694](./cve-2021-42694.md) | 08/16/24 | 10/10/24 | 4.4.18, 4.5.3 | Third-party component: MongoDB | [8.3](https://nvd.nist.gov/vuln/detail/CVE-2021-42694) | :mag: Ongoing | | [GHSA-74fp-r6jw-h4mp](./ghsa-74fp-r6jw-h4mp.md) | 10/25/23 | 10/10/24 | 4.4.18, 4.5.3 | Third-party component: Kubernetes API | [7.5](https://github.com/advisories/GHSA-74fp-r6jw-h4mp) | :mag: Ongoing | @@ -141,7 +141,7 @@ Click on the CVE ID to view the full details of the vulnerability. | [CVE-2023-39325](./cve-2023-39325.md) | 10/11/23 | 10/10/24 | 4.4.18, 4.5.3 | Third-party component: Go project | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2023-39325) | :mag: Ongoing | | [CVE-2024-37370](./cve-2024-37370.md) | 08/30/24 | 10/10/24 | 4.4.18, 4.5.3 | Third-party component: MIT Kerberos | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2024-37370) | :mag: Ongoing | | [CVE-2016-20013](./cve-2016-20013.md) | 08/16/24 | 10/10/24 | 4.4.14, 4.4.18, 4.5.3 | Third-party component: Ubuntu | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2016-20013) | :mag: Ongoing | -| [CVE-2024-21626](./cve-2024-21626.md) | 1/3/24 | 10/10/24 | 4.4.18, 4.5.3 | Third-party component: kube-proxy | [8.6](https://nvd.nist.gov/vuln/detail/CVE-2024-21626) | :mag: Ongoing | +| [CVE-2024-21626](./cve-2024-21626.md) | 1/3/24 | 10/29/24 | 4.4.18, 4.5.3 | Third-party component: kube-proxy | [8.6](https://nvd.nist.gov/vuln/detail/CVE-2024-21626) | :mag: Ongoing | | [CVE-2024-7592](./cve-2024-7592.md) | 9/5/24 | 10/10/24 | 4.4.18, 4.5.3 | Third-party component: CPython | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2024-7592) | :mag: Ongoing | | [CVE-2024-0760](./cve-2024-0760.md) | 9/5/24 | 10/10/24 | 4.4.14, 4.4.18, 4.5.3 | Third-party component: ISC | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2024-0760) | :mag: Ongoing | | [CVE-2024-1737](./cve-2024-1737.md) | 9/5/24 | 10/10/24 | 4.4.14, 4.4.18, 4.5.3 | Third-party component: ISC | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2024-1737) | :mag: Ongoing | @@ -155,7 +155,7 @@ Click on the CVE ID to view the full details of the vulnerability. | [CVE-2023-24537](./cve-2023-24537.md) | 9/15/24 | 10/10/24 | 4.4.18 | Third-party component: Go Project | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2023-24537) | :mag: Ongoing | | [CVE-2023-24538](./cve-2023-24538.md) | 9/15/24 | 10/10/24 | 4.4.18 | Third-party component: Go Project | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2023-24538) | :mag: Ongoing | | [CVE-2023-24539](./cve-2023-24539.md) | 9/15/24 | 10/10/24 | 4.4.18 | Third-party component: Go Project | [7.3](https://nvd.nist.gov/vuln/detail/CVE-2023-24539) | :mag: Ongoing | -| [CVE-2023-24540](./cve-2023-24540.md) | 9/15/24 | 10/10/24 | 4.4.18 | Third-party component: Go Project | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2023-24540) | :mag: Ongoing | +| [CVE-2023-24540](./cve-2023-24540.md) | 9/15/24 | 10/29/24 | 4.4.18 | Third-party component: Go Project | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2023-24540) | :mag: Ongoing | | [CVE-2023-29400](./cve-2023-29400.md) | 9/15/24 | 10/10/24 | 4.4.18 | Third-party component: Go Project | [7.3](https://nvd.nist.gov/vuln/detail/CVE-2023-29400) | :mag: Ongoing | | [CVE-2023-29403](./cve-2023-29403.md) | 9/15/24 | 10/10/24 | 4.4.18, 4.5.3 | Third-party component: Go Project | [7.8](https://nvd.nist.gov/vuln/detail/CVE-2023-29403) | :mag: Ongoing | | [CVE-2023-45287](./cve-2023-45287.md) | 9/15/24 | 10/10/24 | 4.4.18, 4.5.3 | Third-party component: Go Project | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2023-45287) | :mag: Ongoing | @@ -178,7 +178,7 @@ Click on the CVE ID to view the full details of the vulnerability. | [CVE-2018-20657](./cve-2018-20657.md) | 08/16/24 | 10/25/24 | 4.5.3 | Third-party component: MongoDB | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2018-20657) | :mag: Ongoing | | [CVE-2018-20796](./cve-2018-20796.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: GNU C Library | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2018-20796) | :mag: Ongoing | | [CVE-2018-20839](./cve-2018-20839.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: MongoDB | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2018-20839) | :mag: Ongoing | -| [CVE-2019-1010022](./cve-2019-1010022.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: GNU Libc | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2019-1010022) | :mag: Ongoing | +| [CVE-2019-1010022](./cve-2019-1010022.md) | 08/16/24 | 10/29/24 | 4.5.3 | Third-party component: GNU Libc | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2019-1010022) | :mag: Ongoing | | [CVE-2019-12900](./cve-2019-12900.md) | 08/16/24 | 10/25/24 | 4.5.3 | Third-party component: BZ2 | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2019-12900) | :mag: Ongoing | | [CVE-2019-17543](./cve-2019-17543.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: MongoDB | [8.1](https://nvd.nist.gov/vuln/detail/CVE-2019-17543) | :mag: Ongoing | | [CVE-2019-19244](./cve-2019-19244.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: MongoDB | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2019-19244) | :mag: Ongoing | @@ -186,9 +186,9 @@ Click on the CVE ID to view the full details of the vulnerability. | [CVE-2019-9937](./cve-2019-9937.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: MongoDB | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2019-9937) | :mag: Ongoing | | [CVE-2019-9936](./cve-2019-9936.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: MongoDB | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2019-9936) | :mag: Ongoing | | [CVE-2020-36325](./cve-2020-36325.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: Jansson | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2020-36325) | :mag: Ongoing | -| [CVE-2021-39537](./cve-2021-39537.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: MongoDB | [8.8](https://nvd.nist.gov/vuln/detail/CVE-2021-39537) | :mag: Ongoing | +| [CVE-2021-39537](./cve-2021-39537.md) | 08/16/24 | 10/29/24 | 4.5.3 | Third-party component: MongoDB | [8.8](https://nvd.nist.gov/vuln/detail/CVE-2021-39537) | :mag: Ongoing | | [CVE-2021-42694](./cve-2021-42694.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: MongoDB | [8.3](https://nvd.nist.gov/vuln/detail/CVE-2021-42694) | :mag: Ongoing | -| [CVE-2021-46848](./cve-2021-46848.md) | 9/5/24 | 10/14/24 | 4.5.3 | Third-party component: GNU Libtasn1 | [9.1](https://nvd.nist.gov/vuln/detail/CVE-2021-46848) | :mag: Ongoing | +| [CVE-2021-46848](./cve-2021-46848.md) | 9/5/24 | 10/29/24 | 4.5.3 | Third-party component: GNU Libtasn1 | [9.1](https://nvd.nist.gov/vuln/detail/CVE-2021-46848) | :mag: Ongoing | | [CVE-2022-28948](./cve-2022-28948.md) | 9/15/24 | 10/14/24 | 4.5.3 | Third-party component: Go-Yaml | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2022-28948) | :mag: Ongoing | | [CVE-2022-41409](./cve-2022-41409.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: MongoDB | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2022-41409) | :mag: Ongoing | | [CVE-2022-41723](./cve-2022-41723.md) | 2/28/23 | 10/14/24 | 4.5.3 | Third-party component: CoreDNS | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2022-41723) | :mag: Ongoing | @@ -202,7 +202,7 @@ Click on the CVE ID to view the full details of the vulnerability. | [CVE-2023-29403](./cve-2023-29403.md) | 9/15/24 | 10/14/24 | 4.5.3 | Third-party component: Go Project | [7.8](https://nvd.nist.gov/vuln/detail/CVE-2023-29403) | :mag: Ongoing | | [CVE-2023-29499](./cve-2023-29499.md) | 08/16/24 | 10/25/24 | 4.5.3 | Third-party component: MongoDB | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2023-29499) | :mag: Ongoing | | [CVE-2023-32636](./cve-2023-32636.md) | 08/16/24 | 10/25/24 | 4.5.3 | Third-party component: MongoDB | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2023-32636) | :mag: Ongoing | -| [CVE-2023-37920](./cve-2023-37920.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: Certifi | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2023-37920) | :mag: Ongoing | +| [CVE-2023-37920](./cve-2023-37920.md) | 08/16/24 | 10/29/24 | 4.5.3 | Third-party component: Certifi | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2023-37920) | :mag: Ongoing | | [CVE-2023-39325](./cve-2023-39325.md) | 10/11/23 | 10/14/24 | 4.5.3 | Third-party component: Go project | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2023-39325) | :mag: Ongoing | | [CVE-2023-4156](./cve-2023-4156.md) | 08/16/24 | 10/25/24 | 4.5.3 | Third-party component: MongoDB | [7.1](https://nvd.nist.gov/vuln/detail/CVE-2023-4156) | :mag: Ongoing | | [CVE-2023-45287](./cve-2023-45287.md) | 9/15/24 | 10/14/24 | 4.5.3 | Third-party component: Go Project | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2023-45287) | :mag: Ongoing | @@ -212,9 +212,9 @@ Click on the CVE ID to view the full details of the vulnerability. | [CVE-2024-0760](./cve-2024-0760.md) | 9/5/24 | 10/14/24 | 4.5.3 | Third-party component: ISC | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2024-0760) | :mag: Ongoing | | [CVE-2024-1737](./cve-2024-1737.md) | 9/5/24 | 10/14/24 | 4.5.3 | Third-party component: ISC | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2024-1737) | :mag: Ongoing | | [CVE-2024-1975](./cve-2024-1975.md) | 9/5/24 | 10/14/24 | 4.5.3 | Third-party component: ISC | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2024-1975) | :mag: Ongoing | -| [CVE-2024-21626](./cve-2024-21626.md) | 1/3/24 | 10/14/24 | 4.5.3 | Third-party component: kube-proxy | [8.6](https://nvd.nist.gov/vuln/detail/CVE-2024-21626) | :mag: Ongoing | -| [CVE-2024-24790](./cve-2024-24790.md) | 8/6/24 | 10/25/24 | 4.5.3 | Third-party component: Go Project | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2024-24790) | :mag: Ongoing | -| [CVE-2024-37371](./cve-2024-37371.md) | 08/30/24 | 10/14/24 | 4.5.3 | Third-party component: MIT Kerberos | [9.1](https://nvd.nist.gov/vuln/detail/CVE-2024-37371) | :mag: Ongoing | +| [CVE-2024-21626](./cve-2024-21626.md) | 1/3/24 | 10/29/24 | 4.5.3 | Third-party component: kube-proxy | [8.6](https://nvd.nist.gov/vuln/detail/CVE-2024-21626) | :mag: Ongoing | +| [CVE-2024-24790](./cve-2024-24790.md) | 8/6/24 | 10/29/24 | 4.5.3 | Third-party component: Go Project | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2024-24790) | :mag: Ongoing | +| [CVE-2024-37371](./cve-2024-37371.md) | 08/30/24 | 10/29/24 | 4.5.3 | Third-party component: MIT Kerberos | [9.1](https://nvd.nist.gov/vuln/detail/CVE-2024-37371) | :mag: Ongoing | | [CVE-2024-37370](./cve-2024-37370.md) | 08/30/24 | 10/14/24 | 4.5.3 | Third-party component: MIT Kerberos | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2024-37370) | :mag: Ongoing | | [CVE-2024-45490](./cve-2024-45490.md) | 9/5/24 | 10/14/24 | 4.5.3 | Third-party component: Libexpat | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2024-45490) | :mag: Ongoing | | [CVE-2024-45491](./cve-2024-45491.md) | 9/5/24 | 10/14/24 | 4.5.3 | Third-party component: Libexpat | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2024-45491) | :mag: Ongoing | @@ -247,7 +247,7 @@ Click on the CVE ID to view the full details of the vulnerability. | [CVE-2023-6246](./cve-2023-6246.md) | 1/31/24 | 10/14/24 | 4.5.3 | Third-party component: GNU C Library | [7.8](https://nvd.nist.gov/vuln/detail/CVE-2023-6246) | :mag: Ongoing | | [CVE-2023-6779](./cve-2023-6779.md) | 1/31/24 | 10/14/24 | 4.5.3 | Third-party component: GNU C Library | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2023-6779) | :mag: Ongoing | | [CVE-2024-7006](./cve-2024-7006.md) | 8/12/24 | 10/14/24 | 4.5.3 | Third-party component: Libtiff | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2024-7006) | :mag: Ongoing | -| [CVE-2024-1485](./cve-2024-1485.md) | 2/13/24 | 10/24/24 | 4.5.3 | Third-party component: Github | [9.3](https://nvd.nist.gov/vuln/detail/CVE-2024-1485) | :mag: Ongoing | +| [CVE-2024-1485](./cve-2024-1485.md) | 2/13/24 | 10/29/24 | 4.5.3 | Third-party component: Github | [9.3](https://nvd.nist.gov/vuln/detail/CVE-2024-1485) | :mag: Ongoing | @@ -262,7 +262,7 @@ Click on the CVE ID to view the full details of the vulnerability. | [CVE-2018-20657](./cve-2018-20657.md) | 08/16/24 | 10/25/24 | 4.5.3 | Third-party component: MongoDB | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2018-20657) | :mag: Ongoing | | [CVE-2018-20796](./cve-2018-20796.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: GNU C Library | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2018-20796) | :mag: Ongoing | | [CVE-2018-20839](./cve-2018-20839.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: MongoDB | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2018-20839) | :mag: Ongoing | -| [CVE-2019-1010022](./cve-2019-1010022.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: GNU Libc | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2019-1010022) | :mag: Ongoing | +| [CVE-2019-1010022](./cve-2019-1010022.md) | 08/16/24 | 10/29/24 | 4.5.3 | Third-party component: GNU Libc | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2019-1010022) | :mag: Ongoing | | [CVE-2019-12900](./cve-2019-12900.md) | 08/16/24 | 10/25/24 | 4.5.3 | Third-party component: BZ2 | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2019-12900) | :mag: Ongoing | | [CVE-2019-17543](./cve-2019-17543.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: MongoDB | [8.1](https://nvd.nist.gov/vuln/detail/CVE-2019-17543) | :mag: Ongoing | | [CVE-2019-19244](./cve-2019-19244.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: MongoDB | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2019-19244) | :mag: Ongoing | @@ -270,9 +270,9 @@ Click on the CVE ID to view the full details of the vulnerability. | [CVE-2019-9937](./cve-2019-9937.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: MongoDB | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2019-9937) | :mag: Ongoing | | [CVE-2019-9936](./cve-2019-9936.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: MongoDB | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2019-9936) | :mag: Ongoing | | [CVE-2020-36325](./cve-2020-36325.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: Jansson | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2020-36325) | :mag: Ongoing | -| [CVE-2021-39537](./cve-2021-39537.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: MongoDB | [8.8](https://nvd.nist.gov/vuln/detail/CVE-2021-39537) | :mag: Ongoing | +| [CVE-2021-39537](./cve-2021-39537.md) | 08/16/24 | 10/29/24 | 4.5.3 | Third-party component: MongoDB | [8.8](https://nvd.nist.gov/vuln/detail/CVE-2021-39537) | :mag: Ongoing | | [CVE-2021-42694](./cve-2021-42694.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: MongoDB | [8.3](https://nvd.nist.gov/vuln/detail/CVE-2021-42694) | :mag: Ongoing | -| [CVE-2021-46848](./cve-2021-46848.md) | 9/5/24 | 10/14/24 | 4.5.3 | Third-party component: GNU Libtasn1 | [9.1](https://nvd.nist.gov/vuln/detail/CVE-2021-46848) | :mag: Ongoing | +| [CVE-2021-46848](./cve-2021-46848.md) | 9/5/24 | 10/29/24 | 4.5.3 | Third-party component: GNU Libtasn1 | [9.1](https://nvd.nist.gov/vuln/detail/CVE-2021-46848) | :mag: Ongoing | | [CVE-2022-41409](./cve-2022-41409.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: MongoDB | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2022-41409) | :mag: Ongoing | | [CVE-2022-41723](./cve-2022-41723.md) | 2/28/23 | 10/14/24 | 4.5.3 | Third-party component: CoreDNS | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2022-41723) | :mag: Ongoing | | [CVE-2022-41724](./cve-2022-41724.md) | 9/15/24 | 10/14/24 | 4.5.3 | Third-party component: Go Project | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2022-41724) | :mag: Ongoing | @@ -286,15 +286,15 @@ Click on the CVE ID to view the full details of the vulnerability. | [CVE-2023-29403](./cve-2023-29403.md) | 9/15/24 | 10/14/24 | 4.5.3 | Third-party component: Go Project | [7.8](https://nvd.nist.gov/vuln/detail/CVE-2023-29403) | :mag: Ongoing | | [CVE-2023-29499](./cve-2023-29499.md) | 08/16/24 | 10/25/24 | 4.5.3 | Third-party component: MongoDB | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2023-29499) | :mag: Ongoing | | [CVE-2023-32636](./cve-2023-32636.md) | 08/16/24 | 10/25/24 | 4.5.3 | Third-party component: MongoDB | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2023-32636) | :mag: Ongoing | -| [CVE-2023-37920](./cve-2023-37920.md) | 08/16/24 | 10/14/24 | 4.5.3 | Third-party component: Certifi | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2023-37920) | :mag: Ongoing | +| [CVE-2023-37920](./cve-2023-37920.md) | 08/16/24 | 10/29/24 | 4.5.3 | Third-party component: Certifi | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2023-37920) | :mag: Ongoing | | [CVE-2023-39325](./cve-2023-39325.md) | 10/11/23 | 10/14/24 | 4.5.3 | Third-party component: Go project | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2023-39325) | :mag: Ongoing | | [CVE-2023-4156](./cve-2023-4156.md) | 08/16/24 | 10/25/24 | 4.5.3 | Third-party component: MongoDB | [7.1](https://nvd.nist.gov/vuln/detail/CVE-2023-4156) | :mag: Ongoing | | [CVE-2023-45287](./cve-2023-45287.md) | 9/15/24 | 10/14/24 | 4.5.3 | Third-party component: Go Project | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2023-45287) | :mag: Ongoing | | [CVE-2023-47108](./cve-2023-47108.md) | 11/20/23 | 10/14/24 | 4.5.3 | Third-party component: OpenTelemetry-Go | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2023-47108) | :mag: Ongoing | -| [CVE-2024-21626](./cve-2024-21626.md) | 1/3/24 | 10/14/24 | 4.5.3 | Third-party component: Kube-proxy | [8.6](https://nvd.nist.gov/vuln/detail/CVE-2024-21626) | :mag: Ongoing | -| [CVE-2024-24790](./cve-2024-24790.md) | 8/6/24 | 10/25/24 | 4.5.3 | Third-party component: Go Project | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2024-24790) | :mag: Ongoing | +| [CVE-2024-21626](./cve-2024-21626.md) | 1/3/24 | 10/29/24 | 4.5.3 | Third-party component: Kube-proxy | [8.6](https://nvd.nist.gov/vuln/detail/CVE-2024-21626) | :mag: Ongoing | +| [CVE-2024-24790](./cve-2024-24790.md) | 8/6/24 | 10/29/24 | 4.5.3 | Third-party component: Go Project | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2024-24790) | :mag: Ongoing | | [CVE-2024-3651](./cve-2024-3651.md) | 9/13/24 | 10/14/24 | 4.5.3 | Third-party component: kjd | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2024-3651) | :mag: Ongoing | -| [CVE-2024-37371](./cve-2024-37371.md) | 08/30/24 | 10/14/24 | 4.5.3 | Third-party component: MIT Kerberos | [9.1](https://nvd.nist.gov/vuln/detail/CVE-2024-37371) | :mag: Ongoing | +| [CVE-2024-37371](./cve-2024-37371.md) | 08/30/24 | 10/29/24 | 4.5.3 | Third-party component: MIT Kerberos | [9.1](https://nvd.nist.gov/vuln/detail/CVE-2024-37371) | :mag: Ongoing | | [CVE-2024-37370](./cve-2024-37370.md) | 08/30/24 | 10/14/24 | 4.5.3 | Third-party component: MIT Kerberos | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2024-37370) | :mag: Ongoing | | [CVE-2024-45490](./cve-2024-45490.md) | 9/5/24 | 10/14/24 | 4.5.3 | Third-party component: Libexpat | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2024-45490) | :mag: Ongoing | | [CVE-2024-45491](./cve-2024-45491.md) | 9/5/24 | 10/14/24 | 4.5.3 | Third-party component: Libexpat | [9.8](https://nvd.nist.gov/vuln/detail/CVE-2024-45491) | :mag: Ongoing | @@ -324,7 +324,7 @@ Click on the CVE ID to view the full details of the vulnerability. | [CVE-2023-5363](./cve-2023-5363.md) | 10/25/23 | 10/14/24 | 4.5.3 | Third-party component: OpenSSL | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2023-5363) | :mag: Ongoing | | [CVE-2023-6246](./cve-2023-6246.md) | 1/31/24 | 10/14/24 | 4.5.3 | Third-party component: GNU C Library | [7.8](https://nvd.nist.gov/vuln/detail/CVE-2023-6246) | :mag: Ongoing | | [CVE-2023-6779](./cve-2023-6779.md) | 1/31/24 | 10/14/24 | 4.5.3 | Third-party component: GNU C Library | [7.5](https://nvd.nist.gov/vuln/detail/CVE-2023-6779) | :mag: Ongoing | -| [CVE-2024-1485](./cve-2024-1485.md) | 2/13/24 | 10/24/24 | 4.5.3 | Third-party component: Github | [9.3](https://nvd.nist.gov/vuln/detail/CVE-2024-1485) | :mag: Ongoing | +| [CVE-2024-1485](./cve-2024-1485.md) | 2/13/24 | 10/29/24 | 4.5.3 | Third-party component: Github | [9.3](https://nvd.nist.gov/vuln/detail/CVE-2024-1485) | :mag: Ongoing |