Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Not VulnerablePackages which do not exist in the archive, are not affected by the vulnerability or have a fix applied in the archive.
PendingA fix has been applied and updated packages are awaiting arrival into the archive. For example, this might be used when wider testing is requested for the updated package.
UnknownOpen vulnerability where the priority is currently unknown and needs to be triaged.
NegligibleOpen vulnerability that may be a problem but otherwise does not impose a security risk due to various factors. Examples include when the vulnerability is only theoretical in nature, requires a very special situation, has almost no install base or does no real damage. These typically will not receive security updates unless there is an easy fix and some other issue causes an update.
LowOpen vulnerability that is a problem but does very little damage or is otherwise hard to exploit due to small user base or other factors such as requiring specific environment, uncommon configuration, user assistance, etc. These tend to be included in security updates only when higher priority issues require an update or if many low priority issues have built up.
MediumOpen vulnerability that is a real problem and is exploitable for many users of the affected software. Examples include network daemon denial of service, cross-site scripting and gaining user privileges.
HighOpen vulnerability that is a real problem and is exploitable for many users in the default configuration of the affected software. Examples include serious remote denial of service of the system, local root privilege escalations or local data theft.
CriticalOpen vulnerability that is a world-burning problem and is exploitable for most Ubuntu users. Examples include remote root privilege escalations or remote data theft.


CVE #BlueprintBlueprint OS/VerURL Showing OS Patch Not AvailableContact NameContact EmailCommentVendor CVSS ScoreVendor Patch AvailableException Status
CVE-2016-1585EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2016-1585srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2017-18342EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2017-18342srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2017-8283EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2017-8283srinivasanselvam2014@gmail.com

Negligible

NoApproved
CVE-2018-20839EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2018-20839srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2019-17041EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-17041srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-17042EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-17042srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-19814EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-19814srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2016-1585ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2016-1585srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2017-18342ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2017-18342srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2017-8283ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2017-8283srinivasanselvam2014@gmail.com

Negligible

NoApproved
CVE-2018-20839ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2018-20839srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2019-17041ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2019-17041srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-17042ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2019-17042srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-19814ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2019-19814srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2016-1585ELIOT SD-WAN/WAN Edge/uCPE Ubuntu 18.04https://ubuntu.com/security/CVE-2016-1585srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2017-18342ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2017-18342srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2017-8283ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2017-8283srinivasanselvam2014@gmail.com

Negligible

NoApproved
CVE-2018-20839ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2018-20839srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2019-17041ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2019-17041srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-17042ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2019-17042srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-19814ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2019-19814srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2016-1585ICNUbuntu 18.04https://ubuntu.com/security/CVE-2016-1585

@Kuralamdhan Ramakrishnan

kuralamudhan.ramakrishnan@intel.com

Medium

No

Approved

CVE-2017-18342ICNUbuntu 18.04https://ubuntu.com/security/CVE-2017-18342@Kuralamdhan Ramakrishnankuralamudhan.ramakrishnan@intel.com

Low

NoApproved
CVE-2017-8283ICNUbuntu 18.04https://ubuntu.com/security/CVE-2017-8283@Kuralamdhan Ramakrishnankuralamudhan.ramakrishnan@intel.com

Negligible

18.04 Not vulnerable

1.18..24ubuntu1

Image Modified

Image Modified

Approved
CVE-2018-20839ICNUbuntu 18.04https://ubuntu.com/security/CVE-2018-20839

@Kuralamdhan Ramakrishnan

kuralamudhan.ramakrishnan@intel.com

Medium

NoApproved
CVE-2019-19814ICNUbuntu 18.04https://ubuntu.com/security/CVE-2019-19814

@Kuralamdhan Ramakrishnan

kuralamudhan.ramakrishnan@intel.com

Low

NoApproved
CVE-2019-17041ICNUbuntu 18.04https://ubuntu.com/security/CVE-2019-17041@Kuralamdhan Ramakrishnankuralamudhan.ramakrishnan@intel.com

Low

NoApproved
CVE-2019-17042ICNUbuntu 18.04https://ubuntu.com/security/CVE-2019-17042@Kuralamdhan Ramakrishnankuralamudhan.ramakrishnan@intel.com

Low

NoApproved
CVE-2016-1585Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2016-1585oberzin@equinix.com

Medium

NoApproved
CVE-2017-18342Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2017-18342oberzin@equinix.com

Low

NoApproved
CVE-2017-8283Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2017-8283oberzin@equinix.com

Negligible

NoApproved
CVE-2018-20839Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2018-20839oberzin@equinix.com

Medium

NoApproved
CVE-2019-17041Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2019-17041oberzin@equinix.com

Low

NoApproved
CVE-2019-17042Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2019-17042oberzin@equinix.com

Low

NoApproved
CVE-2019-19814Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2019-19814oberzin@equinix.com

Low

NoApproved
CVE-2016-1585ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2016-1585salvador.fuentes@intel.com

Medium

NoApproved
CVE-2017-18342ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2017-18342salvador.fuentes@intel.com

Low

NoApproved
CVE-2017-8283ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2017-8283salvador.fuentes@intel.com

Negligible

NoApproved
CVE-2018-20839ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2018-20839salvador.fuentes@intel.com

Medium

NoApproved
CVE-2019-17041ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2019-17041salvador.fuentes@intel.com

Low

NoApproved
CVE-2019-17042ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2019-17042salvador.fuentes@intel.com

Low

NoApproved
CVE-2019-19814ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2019-19814salvador.fuentes@intel.com

Low

NoApproved
CVE-2019-12900The AI Edge: Federated ML application at edgeCentOS 7.9https://access.redhat.com/security/cve/cve-2019-12900wuzifan0817@gmail.com
LowNoApproved
CVE-2017-12652AI Edge: School/Education Video SecurityCentOS 7.9https://access.redhat.com/security/cve/cve-2017-12652Yu, Liyayulia@baidu.com
Low

Yes, however, patch has been installed (see below) however, vuls still reporting CVE.

Image Modified

Approved

CVE-2019-5482AI Edge: School/Education Video SecurityCentOS 7.9https://access.redhat.com/security/cve/cve-2019-5482Yu, Liyayulia@baidu.com
Medium

Yes, however, patch has been installed (see below) however, vuls still reporting CVE.

Image Modified

Approved

CVE-2016-1585Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2016-1585Colin Peterscolin.peters@fujitsu.com
MediumNo
CVE-2021-20236Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-20236colin.peters@fujitsu.com
MediumNo
CVE-2021-31870Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-31870colin.peters@fujitsu.com
LowNo
CVE-2021-31872Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-31872colin.peters@fujitsu.com
LowNo
CVE-2021-31873Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-31873colin.peters@fujitsu.com
LowNo
CVE-2021-33574Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-33574colin.peters@fujitsu.com
LowNo
CVE-2021-45951Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-45951colin.peters@fujitsu.com
MediumNo
CVE-2021-45952Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-45952colin.peters@fujitsu.com
MediumNo
CVE-2021-45953Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-45953colin.peters@fujitsu.com
MediumNo
CVE-2021-45954Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-45954colin.peters@fujitsu.com
MediumNo
CVE-2021-45955Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-45955colin.peters@fujitsu.com
MediumNo
CVE-2021-45956Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-45956colin.peters@fujitsu.com
MediumNo
CVE-2021-45957Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-45957colin.peters@fujitsu.com
MediumNo
CVE-2022-23218Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2022-23218colin.peters@fujitsu.com
LowReported fixed in 2.31-0ubuntu9.7 (installed), but still reported by Vuls.
CVE-2022-23219Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2022-23219colin.peters@fujitsu.com
LowReported fixed in 2.31-0ubuntu9.7 (installed), but still reported by Vuls.
CVE-2016-9180Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2016-9180colin.peters@fujitsu.com
LowNo
CVE-2021-35942Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-35942colin.peters@fujitsu.com
LowReported fixed in 2.31-0ubuntu9.7 (installed), but still reported by Vuls.

CVE-2016-1585

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2016-1585

inoue.reo@fujitsu.com



MediumNo

CVE-2017-18201

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2017-18201

inoue.reo@fujitsu.com



LowNo

CVE-2017-7827

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2017-7827

inoue.reo@fujitsu.com


MediumNo

CVE-2018-5090

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2018-5090inoue.reo@fujitsu.com
Medium

Reported fixed in 58 and later version (installed), but still reported by Vuls


CVE-2018-5126

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2018-5126inoue.reo@fujitsu.com
Medium

Reported fixed in 58 and later version (installed), but still reported by Vuls


CVE-2018-5145

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2018-5145inoue.reo@fujitsu.com
Medium

Reported fixed in 1:52.7.0 and later version (installed), but still reported by Vuls


CVE-2018-5151

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2018-5151inoue.reo@fujitsu.com
Medium

Reported fixed in 60 and later version (installed), but still reported by Vuls


CVE-2019-17041

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2019-17041inoue.reo@fujitsu.com
LowNo

CVE-2019-17042

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2019-17042inoue.reo@fujitsu.com
LowNo

CVE-2021-31870

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2021-31870inoue.reo@fujitsu.com
LowNo

CVE-2021-31872

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2021-31872inoue.reo@fujitsu.com
LowNo

CVE-2021-31873

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2021-31873inoue.reo@fujitsu.com
LowNo

CVE-2021-39713

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2021-39713inoue.reo@fujitsu.com
LowNo

CVE-2022-22822

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2022-22822inoue.reo@fujitsu.com
MediumNo

CVE-2022-22823

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2022-22823inoue.reo@fujitsu.com
MediumNo

CVE-2022-22824

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2022-22824inoue.reo@fujitsu.com
MediumNo

CVE-2022-23852

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2022-23852inoue.reo@fujitsu.com
MediumNo

CVE-2022-23990

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2022-23990inoue.reo@fujitsu.com
MediumNo

CVE-2022-25235

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2022-25235inoue.reo@fujitsu.com
HighNo

CVE-2022-25236

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2022-25236inoue.reo@fujitsu.com
HighNo

CVE-2022-25315

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2022-25315inoue.reo@fujitsu
.com
.com
MediumNo

CVE-2016-9180

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2016-9180inoue.reo@fujitsu.com
LowNo

CVE-2019-20433

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2019-20433inoue.reo@fujitsu.com
Inoue Reo

LowNo

CVE-2005-2541

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2005-2541inoue.reo@fujitsu.com
HighNo

CVE-2014-2830

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2014-2830inoue.reo@fujitsu.com
HighNo

CVE-2016-1585

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2016-1585inoue.reo@fujitsu.com
HighNo

CVE-2017-17479

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2017-17479inoue.reo@fujitsu.com
HighNo

CVE-2017-9117

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2017-9117inoue.reo@fujitsu.com

CVE-2018-13410

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/

HighNo

CVE-2018-13410

inoue.reo@fujitsu.comCVE-2019-1010022

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-
2019
2018-
1010022
13410inoue.reo@fujitsu.com
HighNo

CVE-2019-

8341

1010022

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2019-
8341
1010022inoue.reo@fujitsu.com
HighNo

CVE-

2020

2019-

27619

8341

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-
2020
2019-
27619
8341inoue.reo@fujitsu.com
HighNo

CVE-

2021

2020-

29462

27619

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-
2021
2020-
29462
27619inoue.reo@fujitsu.com
High

CVE-2021-

29921

29462

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-
29921
29462inoue.reo@fujitsu.com
HighNo

CVE-2021-

30473

29921

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-
30473
29921inoue.reo@fujitsu.com
HighReported fixed in python3.9 (installed), but still reported by Vuls

CVE-2021-

30474

30473

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-
30474
30473inoue.reo@fujitsu.
com
com
HighNo

CVE-2021-

30475

30474

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-
30475
30474inoue.reo@fujitsu.com
HighNo

CVE-2021-

30498

30475

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-
30498
30475inoue.reo@fujitsu.com
HighNo

CVE-2021-

30499

30498

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-
30499
30498inoue.reo@fujitsu.com
HighNo

CVE-2021-

3756

30499

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-
3756
30499inoue.reo@fujitsu.com
HighNo

CVE-2021-42377

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-42377inoue.reo@fujitsu.com
MediumNo

CVE-2021-45951

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-45951inoue.reo@fujitsu.com
HighNo

CVE-2021-45952

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-45952inoue.reo@fujitsu.com
HighNo

CVE-2021-45953

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-45953inoue.reo@fujitsu.com
HighNo

CVE-2021-45954

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-45954inoue.reo@fujitsu.com
HighNo

CVE-2021-45955

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-45955inoue.reo@fujitsu.com
HighNo

CVE-2021-45956

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-45956inoue.reo@fujitsu.com
HighNo

CVE-2022-23303

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2022-23303inoue.reo@fujitsu.com
MediumNo

CVE-2022-23304

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2022-23304inoue.reo@fujitsu.com
MediumNo

CVE-2021-4048

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-4048inoue.reo@fujitsu.com
MediumNo

CVE-2021-43400

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-43400inoue.reo@fujitsu.com
MediumNo














https://ubuntu.com/security/CVE-2017-7827