jpradoar/mqtt-rabbitmq:1.0.0 (debian 11.7)

debian
Package Vulnerability ID Severity Installed Version Fixed Version Links
bsdutils CVE-2024-28085 HIGH 1:2.36.1-8+deb11u1 2.36.1-8+deb11u2
curl CVE-2023-38545 CRITICAL 7.74.0-1.3+deb11u7 7.74.0-1.3+deb11u10
curl CVE-2023-27533 HIGH 7.74.0-1.3+deb11u7 7.74.0-1.3+deb11u8
curl CVE-2023-27534 HIGH 7.74.0-1.3+deb11u7 7.74.0-1.3+deb11u8
curl CVE-2024-2398 HIGH 7.74.0-1.3+deb11u7 7.74.0-1.3+deb11u12
libblkid1 CVE-2024-28085 HIGH 2.36.1-8+deb11u1 2.36.1-8+deb11u2
libc-bin CVE-2023-4911 HIGH 2.31-13+deb11u6 2.31-13+deb11u7
libc-bin CVE-2024-2961 HIGH 2.31-13+deb11u6 2.31-13+deb11u9
libc-bin CVE-2024-33599 HIGH 2.31-13+deb11u6 2.31-13+deb11u10
libc-l10n CVE-2023-4911 HIGH 2.31-13+deb11u6 2.31-13+deb11u7
libc-l10n CVE-2024-2961 HIGH 2.31-13+deb11u6 2.31-13+deb11u9
libc-l10n CVE-2024-33599 HIGH 2.31-13+deb11u6 2.31-13+deb11u10
libc6 CVE-2023-4911 HIGH 2.31-13+deb11u6 2.31-13+deb11u7
libc6 CVE-2024-2961 HIGH 2.31-13+deb11u6 2.31-13+deb11u9
libc6 CVE-2024-33599 HIGH 2.31-13+deb11u6 2.31-13+deb11u10
libcom-err2 CVE-2022-1304 HIGH 1.46.2-2 1.46.2-2+deb11u1
libcurl4 CVE-2023-38545 CRITICAL 7.74.0-1.3+deb11u7 7.74.0-1.3+deb11u10
libcurl4 CVE-2023-27533 HIGH 7.74.0-1.3+deb11u7 7.74.0-1.3+deb11u8
libcurl4 CVE-2023-27534 HIGH 7.74.0-1.3+deb11u7 7.74.0-1.3+deb11u8
libcurl4 CVE-2024-2398 HIGH 7.74.0-1.3+deb11u7 7.74.0-1.3+deb11u12
libgnutls30 CVE-2024-0553 HIGH 3.7.1-5+deb11u3 3.7.1-5+deb11u5
libgnutls30 CVE-2024-0567 HIGH 3.7.1-5+deb11u3 3.7.1-5+deb11u5
libgssapi-krb5-2 CVE-2024-37371 CRITICAL 1.18.3-6+deb11u3 1.18.3-6+deb11u5
libgssapi-krb5-2 CVE-2024-37370 HIGH 1.18.3-6+deb11u3 1.18.3-6+deb11u5
libk5crypto3 CVE-2024-37371 CRITICAL 1.18.3-6+deb11u3 1.18.3-6+deb11u5
libk5crypto3 CVE-2024-37370 HIGH 1.18.3-6+deb11u3 1.18.3-6+deb11u5
libkrb5-3 CVE-2024-37371 CRITICAL 1.18.3-6+deb11u3 1.18.3-6+deb11u5
libkrb5-3 CVE-2024-37370 HIGH 1.18.3-6+deb11u3 1.18.3-6+deb11u5
libkrb5support0 CVE-2024-37371 CRITICAL 1.18.3-6+deb11u3 1.18.3-6+deb11u5
libkrb5support0 CVE-2024-37370 HIGH 1.18.3-6+deb11u3 1.18.3-6+deb11u5
libmount1 CVE-2024-28085 HIGH 2.36.1-8+deb11u1 2.36.1-8+deb11u2
libncurses6 CVE-2023-29491 HIGH 6.2+20201114-2+deb11u1 6.2+20201114-2+deb11u2
libncursesw6 CVE-2023-29491 HIGH 6.2+20201114-2+deb11u1 6.2+20201114-2+deb11u2
libnghttp2-14 CVE-2023-44487 HIGH 1.43.0-1 1.43.0-1+deb11u1
libsmartcols1 CVE-2024-28085 HIGH 2.36.1-8+deb11u1 2.36.1-8+deb11u2
libssh2-1 CVE-2020-22218 HIGH 1.9.0-2 1.9.0-2+deb11u1
libsystemd0 CVE-2023-50387 HIGH 247.3-7+deb11u2 247.3-7+deb11u6
libsystemd0 CVE-2023-50868 HIGH 247.3-7+deb11u2 247.3-7+deb11u6
libtinfo6 CVE-2023-29491 HIGH 6.2+20201114-2+deb11u1 6.2+20201114-2+deb11u2
libudev1 CVE-2023-50387 HIGH 247.3-7+deb11u2 247.3-7+deb11u6
libudev1 CVE-2023-50868 HIGH 247.3-7+deb11u2 247.3-7+deb11u6
libuuid1 CVE-2024-28085 HIGH 2.36.1-8+deb11u1 2.36.1-8+deb11u2
locales CVE-2023-4911 HIGH 2.31-13+deb11u6 2.31-13+deb11u7
locales CVE-2024-2961 HIGH 2.31-13+deb11u6 2.31-13+deb11u9
locales CVE-2024-33599 HIGH 2.31-13+deb11u6 2.31-13+deb11u10
mount CVE-2024-28085 HIGH 2.36.1-8+deb11u1 2.36.1-8+deb11u2
ncurses-base CVE-2023-29491 HIGH 6.2+20201114-2+deb11u1 6.2+20201114-2+deb11u2
perl-base CVE-2020-16156 HIGH 5.32.1-4+deb11u2 5.32.1-4+deb11u4
perl-base CVE-2023-31484 HIGH 5.32.1-4+deb11u2 5.32.1-4+deb11u4
perl-base CVE-2023-47038 HIGH 5.32.1-4+deb11u2 5.32.1-4+deb11u3
util-linux CVE-2024-28085 HIGH 2.36.1-8+deb11u1 2.36.1-8+deb11u2
bitnami
dockerfile
Type Misconf ID Check Severity Message
Dockerfile Security Check DS002 Image user should not be 'root' HIGH
Dockerfile Security Check DS029 'apt-get' missing '--no-install-recommends' HIGH

Last check: 2025-02-28 22:04:25.146098542 +0100 CET m=+1.925056519