[
  {
    "name": "AVG-2843",
    "packages": [
      "vim"
    ],
    "status": "Unknown",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "9.0.1224-1",
    "fixed": "9.0.1225-1",
    "ticket": null,
    "issues": [
      "CVE-2023-0433",
      "CVE-2023-0288",
      "CVE-2023-0054",
      "CVE-2023-0049",
      "CVE-2022-47024",
      "CVE-2022-3591",
      "CVE-2022-3324",
      "CVE-2022-3256",
      "CVE-2022-3099",
      "CVE-2022-2581",
      "CVE-2022-2345",
      "CVE-2022-0417",
      "CVE-2022-0392"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2842",
    "packages": [
      "libtiff"
    ],
    "status": "Unknown",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "4.4.0-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2022-48281",
      "CVE-2022-3970",
      "CVE-2022-3627",
      "CVE-2022-3599",
      "CVE-2022-3597",
      "CVE-2022-3570",
      "CVE-2022-34526",
      "CVE-2022-2953",
      "CVE-2022-2869",
      "CVE-2022-2868",
      "CVE-2022-2867",
      "CVE-2022-2521",
      "CVE-2022-2520",
      "CVE-2022-2519",
      "CVE-2022-2058",
      "CVE-2022-2057",
      "CVE-2022-2056",
      "CVE-2022-1623",
      "CVE-2022-1622"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2827",
    "packages": [
      "grunt-cli"
    ],
    "status": "Unknown",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "1.5.2-1",
    "fixed": "1.5.3-1",
    "ticket": null,
    "issues": [
      "CVE-2022-1537",
      "CVE-2022-0436"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2820",
    "packages": [
      "wpewebkit"
    ],
    "status": "Unknown",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "2.36.7-1",
    "fixed": "2.36.8-1",
    "ticket": null,
    "issues": [
      "CVE-2022-32893",
      "CVE-2022-32891",
      "CVE-2022-32886"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2818",
    "packages": [
      "connman"
    ],
    "status": "Unknown",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "1.41-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2022-32293",
      "CVE-2022-32292",
      "CVE-2022-23098",
      "CVE-2022-23097",
      "CVE-2022-23096"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2816",
    "packages": [
      "squid"
    ],
    "status": "Unknown",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "5.6-1",
    "fixed": "5.7-1",
    "ticket": null,
    "issues": [
      "CVE-2022-41318",
      "CVE-2022-41317"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2809",
    "packages": [
      "python-django"
    ],
    "status": "Unknown",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "4.1-1",
    "fixed": "4.1.2-1",
    "ticket": null,
    "issues": [
      "CVE-2022-41323"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2799",
    "packages": [
      "blender"
    ],
    "status": "Unknown",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "17:3.0.1-6",
    "fixed": "17:3.1.0-1",
    "ticket": null,
    "issues": [
      "CVE-2022-0546",
      "CVE-2022-0545",
      "CVE-2022-0544"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2781",
    "packages": [
      "python-pyjwt"
    ],
    "status": "Unknown",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "2.3.0-1",
    "fixed": "2.4.0-1",
    "ticket": null,
    "issues": [
      "CVE-2022-29217"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2780",
    "packages": [
      "wpewebkit"
    ],
    "status": "Unknown",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "2.36.3-1",
    "fixed": "2.36.4-1",
    "ticket": null,
    "issues": [
      "CVE-2022-26710",
      "CVE-2022-22677",
      "CVE-2022-22662"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2725",
    "packages": [
      "containerd"
    ],
    "status": "Unknown",
    "severity": "Unknown",
    "type": "information disclosure",
    "affected": "1.6.0-2",
    "fixed": "1.6.1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-23648"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2836",
    "packages": [
      "linux-zen"
    ],
    "status": "Unknown",
    "severity": "High",
    "type": "multiple issues",
    "affected": "6.0.12-1",
    "fixed": "6.2-1",
    "ticket": null,
    "issues": [
      "CVE-2023-25012",
      "CVE-2023-23455",
      "CVE-2023-23454",
      "CVE-2023-0394",
      "CVE-2023-0266",
      "CVE-2023-0122",
      "CVE-2022-47946",
      "CVE-2022-47943",
      "CVE-2022-47942",
      "CVE-2022-47941",
      "CVE-2022-47940",
      "CVE-2022-47939",
      "CVE-2022-47938",
      "CVE-2022-47929",
      "CVE-2022-43945",
      "CVE-2022-4382",
      "CVE-2022-4379",
      "CVE-2022-4378",
      "CVE-2022-43750",
      "CVE-2022-42896",
      "CVE-2022-42895",
      "CVE-2022-42703",
      "CVE-2022-42329",
      "CVE-2022-41850",
      "CVE-2022-41849",
      "CVE-2022-41218",
      "CVE-2022-40768",
      "CVE-2022-40307",
      "CVE-2022-39842",
      "CVE-2022-3977",
      "CVE-2022-3910",
      "CVE-2022-36946",
      "CVE-2022-36879",
      "CVE-2022-3649",
      "CVE-2022-3646",
      "CVE-2022-3643",
      "CVE-2022-3636",
      "CVE-2022-3635",
      "CVE-2022-36280",
      "CVE-2022-3628",
      "CVE-2022-3623",
      "CVE-2022-3621",
      "CVE-2022-3619",
      "CVE-2022-3606",
      "CVE-2022-3594",
      "CVE-2022-3586",
      "CVE-2022-3567",
      "CVE-2022-3566",
      "CVE-2022-3565",
      "CVE-2022-3564",
      "CVE-2022-3545",
      "CVE-2022-3544",
      "CVE-2022-3543",
      "CVE-2022-3541",
      "CVE-2022-3534",
      "CVE-2022-3524",
      "CVE-2022-34495",
      "CVE-2022-34494",
      "CVE-2022-3303",
      "CVE-2022-3239",
      "CVE-2022-32296",
      "CVE-2022-3061",
      "CVE-2022-3028",
      "CVE-2022-2978",
      "CVE-2022-2873",
      "CVE-2022-2663",
      "CVE-2022-2503",
      "CVE-2022-2153",
      "CVE-2022-1012",
      "CVE-2022-0812"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2835",
    "packages": [
      "linux-hardened"
    ],
    "status": "Unknown",
    "severity": "High",
    "type": "multiple issues",
    "affected": "6.0.19-1",
    "fixed": "6.2-1",
    "ticket": null,
    "issues": [
      "CVE-2023-25012",
      "CVE-2023-23455",
      "CVE-2023-23454",
      "CVE-2023-0394",
      "CVE-2023-0266",
      "CVE-2023-0122",
      "CVE-2022-47946",
      "CVE-2022-47943",
      "CVE-2022-47942",
      "CVE-2022-47941",
      "CVE-2022-47940",
      "CVE-2022-47939",
      "CVE-2022-47938",
      "CVE-2022-47929",
      "CVE-2022-43945",
      "CVE-2022-4382",
      "CVE-2022-4379",
      "CVE-2022-4378",
      "CVE-2022-43750",
      "CVE-2022-42896",
      "CVE-2022-42895",
      "CVE-2022-42703",
      "CVE-2022-42329",
      "CVE-2022-41850",
      "CVE-2022-41849",
      "CVE-2022-41218",
      "CVE-2022-40768",
      "CVE-2022-40307",
      "CVE-2022-39842",
      "CVE-2022-3977",
      "CVE-2022-3910",
      "CVE-2022-36946",
      "CVE-2022-36879",
      "CVE-2022-3649",
      "CVE-2022-3646",
      "CVE-2022-3643",
      "CVE-2022-3636",
      "CVE-2022-3635",
      "CVE-2022-36280",
      "CVE-2022-3628",
      "CVE-2022-3623",
      "CVE-2022-3621",
      "CVE-2022-3619",
      "CVE-2022-3606",
      "CVE-2022-3594",
      "CVE-2022-3586",
      "CVE-2022-3567",
      "CVE-2022-3566",
      "CVE-2022-3565",
      "CVE-2022-3564",
      "CVE-2022-3545",
      "CVE-2022-3544",
      "CVE-2022-3543",
      "CVE-2022-3541",
      "CVE-2022-3534",
      "CVE-2022-3524",
      "CVE-2022-34495",
      "CVE-2022-34494",
      "CVE-2022-3303",
      "CVE-2022-3239",
      "CVE-2022-32296",
      "CVE-2022-3061",
      "CVE-2022-3028",
      "CVE-2022-2978",
      "CVE-2022-2873",
      "CVE-2022-2663",
      "CVE-2022-2503",
      "CVE-2022-2153",
      "CVE-2022-1012",
      "CVE-2022-0812"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2834",
    "packages": [
      "linux-lts"
    ],
    "status": "Unknown",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.15.94-1",
    "fixed": "6.2-1",
    "ticket": null,
    "issues": [
      "CVE-2023-25012",
      "CVE-2023-23455",
      "CVE-2023-23454",
      "CVE-2023-0394",
      "CVE-2023-0266",
      "CVE-2023-0122",
      "CVE-2022-47946",
      "CVE-2022-47943",
      "CVE-2022-47942",
      "CVE-2022-47941",
      "CVE-2022-47940",
      "CVE-2022-47939",
      "CVE-2022-47938",
      "CVE-2022-47929",
      "CVE-2022-43945",
      "CVE-2022-4382",
      "CVE-2022-4379",
      "CVE-2022-4378",
      "CVE-2022-43750",
      "CVE-2022-42896",
      "CVE-2022-42895",
      "CVE-2022-42703",
      "CVE-2022-42329",
      "CVE-2022-41850",
      "CVE-2022-41849",
      "CVE-2022-41218",
      "CVE-2022-40768",
      "CVE-2022-40307",
      "CVE-2022-39842",
      "CVE-2022-3977",
      "CVE-2022-3910",
      "CVE-2022-36946",
      "CVE-2022-36879",
      "CVE-2022-3649",
      "CVE-2022-3646",
      "CVE-2022-3643",
      "CVE-2022-3636",
      "CVE-2022-3635",
      "CVE-2022-36280",
      "CVE-2022-3628",
      "CVE-2022-3623",
      "CVE-2022-3621",
      "CVE-2022-3606",
      "CVE-2022-3594",
      "CVE-2022-3586",
      "CVE-2022-3567",
      "CVE-2022-3566",
      "CVE-2022-3565",
      "CVE-2022-3564",
      "CVE-2022-3545",
      "CVE-2022-3543",
      "CVE-2022-3541",
      "CVE-2022-3534",
      "CVE-2022-3524",
      "CVE-2022-34495",
      "CVE-2022-34494",
      "CVE-2022-3303",
      "CVE-2022-3239",
      "CVE-2022-32296",
      "CVE-2022-3061",
      "CVE-2022-3028",
      "CVE-2022-2978",
      "CVE-2022-2873",
      "CVE-2022-2663",
      "CVE-2022-2503",
      "CVE-2022-2153",
      "CVE-2022-1012",
      "CVE-2022-0812"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2764",
    "packages": [
      "ruby-puma"
    ],
    "status": "Unknown",
    "severity": "High",
    "type": "unknown",
    "affected": "5.6.3-1",
    "fixed": "5.6.4-1",
    "ticket": null,
    "issues": [
      "CVE-2022-24790",
      "CVE-2022-23634",
      "CVE-2021-41136"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2907",
    "packages": [
      "djvulibre"
    ],
    "status": "Vulnerable",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "3.5.28-6",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2025-53367"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2901",
    "packages": [
      "pam"
    ],
    "status": "Vulnerable",
    "severity": "High",
    "type": "arbitrary filesystem access",
    "affected": "1.7.0-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2025-6020"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2898",
    "packages": [
      "libxml2"
    ],
    "status": "Vulnerable",
    "severity": "High",
    "type": "denial of service",
    "affected": "2.14.4-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2025-6170",
      "CVE-2025-49796",
      "CVE-2025-49795",
      "CVE-2025-49794"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2889",
    "packages": [
      "tomcat9"
    ],
    "status": "Vulnerable",
    "severity": "High",
    "type": "multiple issues",
    "affected": "9.0.100-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2025-49125",
      "CVE-2025-48988",
      "CVE-2025-48976",
      "CVE-2025-46701",
      "CVE-2025-31650"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2888",
    "packages": [
      "tomcat10"
    ],
    "status": "Vulnerable",
    "severity": "High",
    "type": "multiple issues",
    "affected": "10.1.40-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2025-49125",
      "CVE-2025-48988",
      "CVE-2025-48976",
      "CVE-2025-46701",
      "CVE-2025-31650"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2886",
    "packages": [
      "kea"
    ],
    "status": "Vulnerable",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.6.2-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2025-32803",
      "CVE-2025-32802",
      "CVE-2025-32801"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2762",
    "packages": [
      "grub"
    ],
    "status": "Vulnerable",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2:2.06-5",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2022-28737",
      "CVE-2022-28736",
      "CVE-2022-28735",
      "CVE-2022-28734",
      "CVE-2022-28733",
      "CVE-2021-3697",
      "CVE-2021-3696",
      "CVE-2021-3695"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2701",
    "packages": [
      "linux-lts"
    ],
    "status": "Vulnerable",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.15.14-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2022-28390",
      "CVE-2022-28389",
      "CVE-2022-28388",
      "CVE-2022-27666",
      "CVE-2022-26490",
      "CVE-2022-1516",
      "CVE-2022-1353",
      "CVE-2022-1205",
      "CVE-2022-1204",
      "CVE-2022-1199",
      "CVE-2022-1198",
      "CVE-2022-1195",
      "CVE-2022-1158",
      "CVE-2022-1048",
      "CVE-2022-1016",
      "CVE-2022-1015",
      "CVE-2022-0168",
      "CVE-2021-44879",
      "CVE-2021-4197"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2275",
    "packages": [
      "nim"
    ],
    "status": "Vulnerable",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.4.8-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-41259",
      "CVE-2020-23171"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2272",
    "packages": [
      "exim"
    ],
    "status": "Vulnerable",
    "severity": "High",
    "type": "man-in-the-middle",
    "affected": "4.95-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-38371"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2190",
    "packages": [
      "jre8-openjdk-headless",
      "jdk8-openjdk"
    ],
    "status": "Vulnerable",
    "severity": "High",
    "type": "multiple issues",
    "affected": "8.u292-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-2388",
      "CVE-2021-2369",
      "CVE-2021-2341"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2893",
    "packages": [
      "systemd"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "257.6-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2025-4598"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2885",
    "packages": [
      "coreutils"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "9.7-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2025-5278"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2884",
    "packages": [
      "grafana"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "11.6.1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2025-3454",
      "CVE-2025-2703"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2875",
    "packages": [
      "postgresql"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "17.4-4",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2025-4207"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2850",
    "packages": [
      "openjpeg2"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.5.0-3",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3575"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2765",
    "packages": [
      "openssl"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "arbitrary command execution",
    "affected": "1.1.1.o-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2022-2068"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2721",
    "packages": [
      "libtiff"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "4.3.0-2",
    "fixed": null,
    "ticket": "74772",
    "issues": [
      "CVE-2022-1355",
      "CVE-2022-1354"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2683",
    "packages": [
      "linux-lts"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.15.34-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2022-0002",
      "CVE-2022-0001"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2663",
    "packages": [
      "python-twisted"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "21.7.0-4",
    "fixed": null,
    "ticket": "74362",
    "issues": [
      "CVE-2022-24801",
      "CVE-2022-21716",
      "CVE-2022-21712"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2646",
    "packages": [
      "teeworlds"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "0.7.5-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-43518"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2631",
    "packages": [
      "cpanminus"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "signature forgery",
    "affected": "1.7044-5",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-16154"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2630",
    "packages": [
      "perl"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "signature forgery",
    "affected": "5.34.0-3",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-16156"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1881",
    "packages": [
      "linux-hardened"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.15.7.hardened1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-43976",
      "CVE-2021-4095",
      "CVE-2021-4028",
      "CVE-2021-3847",
      "CVE-2021-3752",
      "CVE-2021-3669"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1880",
    "packages": [
      "linux-zen"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.15.8.zen1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-43976",
      "CVE-2021-4095",
      "CVE-2021-4028",
      "CVE-2021-3847",
      "CVE-2021-3752",
      "CVE-2021-3669"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1879",
    "packages": [
      "linux"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.15.8.arch1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-43976",
      "CVE-2021-4095",
      "CVE-2021-4028",
      "CVE-2021-3847",
      "CVE-2021-3752",
      "CVE-2021-3669"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2616",
    "packages": [
      "privoxy"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "3.0.32-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-44543",
      "CVE-2021-44542",
      "CVE-2021-44541",
      "CVE-2021-44540"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1360",
    "packages": [
      "edk2-shell"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "certificate verification bypass",
    "affected": "202111-4",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2019-14560"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2067",
    "packages": [
      "opendmarc"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.4.1.1-2",
    "fixed": null,
    "ticket": "72812",
    "issues": [
      "CVE-2021-34555"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2576",
    "packages": [
      "librecad"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.1.3-6",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-21900",
      "CVE-2021-21899",
      "CVE-2021-21898"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2520",
    "packages": [
      "libheif"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.12.0-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-23109"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2493",
    "packages": [
      "gitlab-gitaly"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "open redirect",
    "affected": "14.3.0-3",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-22942"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2405",
    "packages": [
      "libgig"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "4.3.0-3",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-32294"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1823",
    "packages": [
      "gpac"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1:1.0.1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-36584",
      "CVE-2021-33366",
      "CVE-2021-33365",
      "CVE-2021-33364",
      "CVE-2021-33363",
      "CVE-2021-33362",
      "CVE-2021-33361",
      "CVE-2021-32440",
      "CVE-2021-32439",
      "CVE-2021-32438",
      "CVE-2021-32437",
      "CVE-2021-32139",
      "CVE-2021-32138",
      "CVE-2021-32137",
      "CVE-2021-32136",
      "CVE-2021-32135",
      "CVE-2021-32134",
      "CVE-2021-32132",
      "CVE-2021-31262",
      "CVE-2021-31261",
      "CVE-2021-31260",
      "CVE-2021-31259",
      "CVE-2021-31258",
      "CVE-2021-31257",
      "CVE-2021-31256",
      "CVE-2021-31255",
      "CVE-2021-31254",
      "CVE-2021-30199",
      "CVE-2021-30022",
      "CVE-2021-30020",
      "CVE-2021-30019",
      "CVE-2021-30015",
      "CVE-2021-30014",
      "CVE-2021-29279",
      "CVE-2021-28300",
      "CVE-2021-21862",
      "CVE-2021-21861",
      "CVE-2021-21860",
      "CVE-2021-21859",
      "CVE-2021-21858",
      "CVE-2021-21857",
      "CVE-2021-21856",
      "CVE-2021-21855",
      "CVE-2021-21854",
      "CVE-2021-21853",
      "CVE-2021-21852",
      "CVE-2021-21851",
      "CVE-2021-21850",
      "CVE-2021-21849",
      "CVE-2021-21848",
      "CVE-2021-21847",
      "CVE-2021-21846",
      "CVE-2021-21845",
      "CVE-2021-21844",
      "CVE-2021-21843",
      "CVE-2021-21842",
      "CVE-2021-21841",
      "CVE-2021-21840",
      "CVE-2021-21839",
      "CVE-2021-21838",
      "CVE-2021-21837",
      "CVE-2021-21836",
      "CVE-2021-21835",
      "CVE-2021-21834",
      "CVE-2020-35982",
      "CVE-2020-35981",
      "CVE-2020-35980",
      "CVE-2020-35979"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2394",
    "packages": [
      "kube-apiserver"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.23.0-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-8561"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2367",
    "packages": [
      "openvpn"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "2.5.5-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3773"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2345",
    "packages": [
      "linux"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.15.8.arch1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-31615",
      "CVE-2020-26560",
      "CVE-2020-26559",
      "CVE-2020-26557",
      "CVE-2020-26556",
      "CVE-2020-26555"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1427",
    "packages": [
      "podofo"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "0.9.7-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-30472",
      "CVE-2021-30471",
      "CVE-2021-30470",
      "CVE-2021-30469",
      "CVE-2020-18972",
      "CVE-2020-18971",
      "CVE-2019-20093",
      "CVE-2019-10723",
      "CVE-2018-8002",
      "CVE-2018-20797",
      "CVE-2018-12983"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2313",
    "packages": [
      "apr"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.7.0-3",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-35940"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2142",
    "packages": [
      "prusa-slicer"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.3.3-3",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-28598",
      "CVE-2020-28594"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2264",
    "packages": [
      "perl"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "5.34.0-3",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-36770"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2262",
    "packages": [
      "cpio"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "arbitrary command execution",
    "affected": "2.13-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-38185"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1941",
    "packages": [
      "ansible-core"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "2.12.1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3681",
      "CVE-2021-3620"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2186",
    "packages": [
      "lib32-libsndfile"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.0.31-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3246"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2117",
    "packages": [
      "keystone"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "0.9.2-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-36405",
      "CVE-2020-36404"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2114",
    "packages": [
      "tensorflow"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "arbitrary file overwrite",
    "affected": "2.7.0-4",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-35958"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2111",
    "packages": [
      "dcraw"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "9.28.0-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3624"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2102",
    "packages": [
      "nginx"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "1.20.2-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3618"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2101",
    "packages": [
      "vsftpd"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "3.0.3-7",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3618"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2100",
    "packages": [
      "sox"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "14.4.2-7",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-33844",
      "CVE-2021-23210",
      "CVE-2021-23172",
      "CVE-2021-23159"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2048",
    "packages": [
      "ming"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "0.4.8.r68.g04aee523-3",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-34342",
      "CVE-2021-34341",
      "CVE-2021-34340",
      "CVE-2021-34339",
      "CVE-2021-34338"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1977",
    "packages": [
      "gocr"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "0.52-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-33481",
      "CVE-2021-33480",
      "CVE-2021-33479"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1676",
    "packages": [
      "upx"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "3.96-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-30501",
      "CVE-2021-30500",
      "CVE-2021-20285",
      "CVE-2020-24119"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1957",
    "packages": [
      "python-flask-caching"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.10.1-3",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-33026"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1892",
    "packages": [
      "wget"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.21.3-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-31879"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1855",
    "packages": [
      "giflib"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.2.1-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-23922"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1782",
    "packages": [
      "gnuchess"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "6.2.9-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-30184"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1516",
    "packages": [
      "evolution"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "3.42.2-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3349"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1420",
    "packages": [
      "xdg-utils"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.1.3+19+g9816ebb-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-27748"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1346",
    "packages": [
      "phpldapadmin"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "cross-site scripting",
    "affected": "1.2.6.2-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-35132"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1354",
    "packages": [
      "xerces-c"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "3.2.3-5",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2018-1311"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1342",
    "packages": [
      "pass"
    ],
    "status": "Vulnerable",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "1.7.4-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-28086"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2904",
    "packages": [
      "kube-apiserver"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "privilege escalation",
    "affected": "1.33.1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2025-4563"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2890",
    "packages": [
      "perl"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "unknown",
    "affected": "5.40.2-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2025-40909"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2882",
    "packages": [
      "openssl"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "certificate verification bypass",
    "affected": "3.5.0-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2025-4575"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2880",
    "packages": [
      "busybox"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "content spoofing",
    "affected": "1.36.1-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2025-46394"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2569",
    "packages": [
      "go-ethereum"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.10.13-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-43668"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1311",
    "packages": [
      "audacity"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "information disclosure",
    "affected": "1:2.4.1-4",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-11867"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2644",
    "packages": [
      "mruby"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "denial of service",
    "affected": "3.0.0-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-4110"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2615",
    "packages": [
      "ruby-bundler"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "arbitrary command execution",
    "affected": "2.2.26-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-43809"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1302",
    "packages": [
      "lua51"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.1.5-9",
    "fixed": null,
    "ticket": "68703",
    "issues": [
      "CVE-2021-43519",
      "CVE-2014-5461"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2537",
    "packages": [
      "lua52"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.2.4-5",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-43519"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2536",
    "packages": [
      "lua53"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.3.6-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-43519"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2404",
    "packages": [
      "faust"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2.37.3-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-32275"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2372",
    "packages": [
      "python-rencode"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.0.6-7",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-40839"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1594",
    "packages": [
      "linux"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "insufficient validation",
    "affected": "5.15.8.arch1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-35501"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2325",
    "packages": [
      "nasm"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2.15.05-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-18974"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2254",
    "packages": [
      "libelfin"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "denial of service",
    "affected": "0.3-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-24827",
      "CVE-2020-24826",
      "CVE-2020-24825",
      "CVE-2020-24824",
      "CVE-2020-24823",
      "CVE-2020-24822",
      "CVE-2020-24821"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2207",
    "packages": [
      "darkhttpd"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.13-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-25691"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1915",
    "packages": [
      "kube-apiserver",
      "kube-scheduler",
      "kube-controller-manager",
      "kubelet",
      "kube-proxy"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "multiple issues",
    "affected": "1.23.0-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-25740",
      "CVE-2020-8562"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2089",
    "packages": [
      "python-mpmath"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.2.1-5",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-29063"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1896",
    "packages": [
      "samurai"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.2-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-30219",
      "CVE-2021-30218"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1777",
    "packages": [
      "vigra"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.11.1.r45+g8acd73a5-5",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-30046"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1673",
    "packages": [
      "kexec-tools"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "information disclosure",
    "affected": "2.0.21-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-20269"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1370",
    "packages": [
      "python-jsonpickle"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "arbitrary code execution",
    "affected": "1.5.2-3",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-22083"
    ],
    "advisories": []
  },
  {
    "name": "AVG-366",
    "packages": [
      "vorbis-tools"
    ],
    "status": "Vulnerable",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.4.2-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2017-11331"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2812",
    "packages": [
      "poppler",
      "poppler-qt6",
      "poppler-qt5",
      "poppler-glib"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "22.08.0-1",
    "fixed": "22.08.0-2",
    "ticket": null,
    "issues": [
      "CVE-2022-38784",
      "CVE-2022-27337"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2777",
    "packages": [
      "dovecot"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "2.3.19.1-1",
    "fixed": "2.3.20-1",
    "ticket": null,
    "issues": [
      "CVE-2022-30550"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2768",
    "packages": [
      "php"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "8.1.6-2",
    "fixed": "8.1.7-1",
    "ticket": null,
    "issues": [
      "CVE-2022-31626",
      "CVE-2022-31625"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2755",
    "packages": [
      "containerd"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "denial of service",
    "affected": "1.6.5-1",
    "fixed": "1.6.6-1",
    "ticket": null,
    "issues": [
      "CVE-2022-31030"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2749",
    "packages": [
      "ntfs-3g"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "2021.8.22-1",
    "fixed": "2022.5.17-1",
    "ticket": null,
    "issues": [
      "CVE-2022-30789",
      "CVE-2022-30788",
      "CVE-2022-30786",
      "CVE-2022-30784"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2743",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "5.15.41-1",
    "fixed": "5.15.42-1",
    "ticket": null,
    "issues": [
      "CVE-2022-21499"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2742",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "5.17.9.hardened1-1",
    "fixed": "5.17.10.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-21499"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2741",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "5.17.9.zen1-1",
    "fixed": "5.17.10.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-21499"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2740",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "5.17.9.arch1-1",
    "fixed": "5.17.10.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-21499"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2735",
    "packages": [
      "nvidia-open-dkms",
      "nvidia-open"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "510.73.04-1",
    "fixed": "510.73.05-1",
    "ticket": null,
    "issues": [
      "CVE-2022-28192",
      "CVE-2022-28191",
      "CVE-2022-28185",
      "CVE-2022-28184",
      "CVE-2022-28183",
      "CVE-2022-28181"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2833",
    "packages": [
      "glibc",
      "lib32-glibc"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "2.37-1",
    "fixed": "2.37-2",
    "ticket": null,
    "issues": [
      "CVE-2023-25139"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2832",
    "packages": [
      "openssh"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "9.1p1-3",
    "fixed": "9.2p1-1",
    "ticket": null,
    "issues": [
      "CVE-2023-25136"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2828",
    "packages": [
      "samba"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "4.17.4-4",
    "fixed": "4.17.5-1",
    "ticket": null,
    "issues": [
      "CVE-2022-45141",
      "CVE-2022-42898",
      "CVE-2022-38023",
      "CVE-2022-37967",
      "CVE-2022-37966",
      "CVE-2022-3492",
      "CVE-2022-3437"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2824",
    "packages": [
      "apache"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "2.4.54-3",
    "fixed": "2.4.55-1",
    "ticket": null,
    "issues": [
      "CVE-2022-37436",
      "CVE-2022-36760",
      "CVE-2006-20001"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2823",
    "packages": [
      "mediawiki"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "1.38.2-1",
    "fixed": "1.38.3-1",
    "ticket": null,
    "issues": [
      "CVE-2022-41767",
      "CVE-2022-41765",
      "CVE-2022-34912",
      "CVE-2022-34911",
      "CVE-2022-31091",
      "CVE-2022-31090",
      "CVE-2022-31043",
      "CVE-2022-31042",
      "CVE-2022-29248",
      "CVE-2022-28203",
      "CVE-2022-28201",
      "CVE-2021-44856",
      "CVE-2021-44855",
      "CVE-2021-44854"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2822",
    "packages": [
      "lighttpd"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "1.4.66-1",
    "fixed": "1.4.67-1",
    "ticket": null,
    "issues": [
      "CVE-2022-41556",
      "CVE-2022-37797"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2817",
    "packages": [
      "libcurl-gnutls",
      "libcurl-compat",
      "curl"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "7.83.1-1",
    "fixed": "7.84.0-1",
    "ticket": null,
    "issues": [
      "CVE-2022-32208",
      "CVE-2022-32207",
      "CVE-2022-32206"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2815",
    "packages": [
      "expat"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "2.4.8-1",
    "fixed": "2.4.9-1",
    "ticket": null,
    "issues": [
      "CVE-2022-40674"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2814",
    "packages": [
      "strongswan"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "5.9.7-1",
    "fixed": "5.9.8-1",
    "ticket": null,
    "issues": [
      "CVE-2022-40617"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2813",
    "packages": [
      "xpdf"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "4.03-1",
    "fixed": "4.04-1",
    "ticket": null,
    "issues": [
      "CVE-2022-38171"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2811",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "9.18.6-1",
    "fixed": "9.18.7-1",
    "ticket": null,
    "issues": [
      "CVE-2022-38178",
      "CVE-2022-3080",
      "CVE-2022-2795"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2810",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "4.0.6-1",
    "fixed": "4.0.7-1",
    "ticket": null,
    "issues": [
      "CVE-2022-36359"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2808",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "3.2.10-1",
    "fixed": "4.0.2-1",
    "ticket": null,
    "issues": [
      "CVE-2022-23833",
      "CVE-2022-22818"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2807",
    "packages": [
      "libreoffice-still"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "7.3.5-3",
    "fixed": "7.3.6-1",
    "ticket": null,
    "issues": [
      "CVE-2022-3140"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2806",
    "packages": [
      "libreoffice-fresh"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "7.4.0-4",
    "fixed": "7.4.1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-3140"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2805",
    "packages": [
      "dbus"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "1.14.3-1",
    "fixed": "1.14.4-1",
    "ticket": null,
    "issues": [
      "CVE-2022-42012",
      "CVE-2022-42011",
      "CVE-2022-42010"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2804",
    "packages": [
      "libksba"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "1.6.2-1",
    "fixed": "1.6.3-1",
    "ticket": null,
    "issues": [
      "CVE-2022-47629",
      "CVE-2022-3515"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2798",
    "packages": [
      "mat2"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "directory traversal",
    "affected": "0.12.4-1",
    "fixed": "0.13.0-1",
    "ticket": null,
    "issues": [
      "CVE-2022-35410"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2775",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "5.18.10.arch1-1",
    "fixed": "5.18.11.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-2318",
      "CVE-2022-1789",
      "CVE-2021-33655"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2774",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "5.18.10.zen1-1",
    "fixed": "5.18.11.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-2318",
      "CVE-2022-1789",
      "CVE-2021-33655"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2773",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "5.18.10.hardened1-1",
    "fixed": "5.18.11.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-2318",
      "CVE-2022-1789",
      "CVE-2021-33655"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2786",
    "packages": [
      "gdk-pixbuf2"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "arbitrary code execution",
    "affected": "2.42.6-2",
    "fixed": "2.42.8-1",
    "ticket": null,
    "issues": [
      "CVE-2021-46829"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2784",
    "packages": [
      "libreoffice-still"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "7.2.6-3",
    "fixed": "7.2.7-1",
    "ticket": null,
    "issues": [
      "CVE-2022-26307",
      "CVE-2022-26306",
      "CVE-2022-26305"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2783",
    "packages": [
      "libreoffice-fresh"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "7.3.2-2",
    "fixed": "7.3.3-1",
    "ticket": null,
    "issues": [
      "CVE-2022-26307",
      "CVE-2022-26306",
      "CVE-2022-26305"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2778",
    "packages": [
      "git"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "2.37.0-1",
    "fixed": "2.37.1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-29187"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2776",
    "packages": [
      "gnupg"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "2.2.35-2",
    "fixed": "2.2.36-1",
    "ticket": null,
    "issues": [
      "CVE-2022-34903"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2772",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "5.15.53-2",
    "fixed": "5.15.54-1",
    "ticket": null,
    "issues": [
      "CVE-2022-33981",
      "CVE-2022-1789",
      "CVE-2022-0500",
      "CVE-2021-33655"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2737",
    "packages": [
      "gnome-remote-desktop"
    ],
    "status": "Not affected",
    "severity": "Unknown",
    "type": "unknown",
    "affected": "42.1-1",
    "fixed": "42.1.1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-1736"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2903",
    "packages": [
      "clamav"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "1.4.2-2",
    "fixed": "1.4.3-1",
    "ticket": null,
    "issues": [
      "CVE-2025-20260",
      "CVE-2025-20234"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2891",
    "packages": [
      "roundcubemail"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "1.6.10-1",
    "fixed": "1.6.11-1",
    "ticket": null,
    "issues": [
      "CVE-2025-49113"
    ],
    "advisories": [
      "ASA-202506-1"
    ]
  },
  {
    "name": "AVG-2847",
    "packages": [
      "minizip"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "1:1.3-1",
    "fixed": "1:1.3.1-1",
    "ticket": null,
    "issues": [
      "CVE-2023-45853"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2858",
    "packages": [
      "rsync"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "3.3.0-2",
    "fixed": "3.4.0-1",
    "ticket": null,
    "issues": [
      "CVE-2024-12747",
      "CVE-2024-12088",
      "CVE-2024-12087",
      "CVE-2024-12086",
      "CVE-2024-12085",
      "CVE-2024-12084"
    ],
    "advisories": [
      "ASA-202501-1"
    ]
  },
  {
    "name": "AVG-2851",
    "packages": [
      "xz"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "authentication bypass",
    "affected": "5.6.0-1",
    "fixed": "5.6.1-2",
    "ticket": null,
    "issues": [
      "CVE-2024-3094"
    ],
    "advisories": [
      "ASA-202403-1"
    ]
  },
  {
    "name": "AVG-2844",
    "packages": [
      "libcue"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "2.2.1-3",
    "fixed": "2.2.1-4",
    "ticket": null,
    "issues": [
      "CVE-2023-43641"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2756",
    "packages": [
      "freerdp"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "authentication bypass",
    "affected": "2:2.6.1-3",
    "fixed": "2:2.7.0-1",
    "ticket": null,
    "issues": [
      "CVE-2022-24883",
      "CVE-2022-24882"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2739",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "101.0.4951.54-1",
    "fixed": "102.0.5005.61-1",
    "ticket": null,
    "issues": [
      "CVE-2022-1876",
      "CVE-2022-1875",
      "CVE-2022-1874",
      "CVE-2022-1873",
      "CVE-2022-1872",
      "CVE-2022-1871",
      "CVE-2022-1870",
      "CVE-2022-1869",
      "CVE-2022-1868",
      "CVE-2022-1867",
      "CVE-2022-1866",
      "CVE-2022-1865",
      "CVE-2022-1864",
      "CVE-2022-1863",
      "CVE-2022-1862",
      "CVE-2022-1861",
      "CVE-2022-1860",
      "CVE-2022-1859",
      "CVE-2022-1858",
      "CVE-2022-1857",
      "CVE-2022-1856",
      "CVE-2022-1855",
      "CVE-2022-1854",
      "CVE-2022-1853"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2729",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "91.9.0-1",
    "fixed": "91.9.1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-1802",
      "CVE-2022-1529"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2728",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "100.0.1-1",
    "fixed": "100.0.2-1",
    "ticket": null,
    "issues": [
      "CVE-2022-1802",
      "CVE-2022-1529"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2724",
    "packages": [
      "openldap"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "sql injection",
    "affected": "2.6.1-1",
    "fixed": "2.6.2-1",
    "ticket": null,
    "issues": [
      "CVE-2022-29155"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2626",
    "packages": [
      "zaproxy"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "2.11.1-1",
    "fixed": "2.11.1-2",
    "ticket": "72975",
    "issues": [
      "CVE-2021-44228"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2800",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "5.1-1",
    "fixed": "5.19.15.hardened2-1",
    "ticket": null,
    "issues": [
      "CVE-2022-42722",
      "CVE-2022-42721",
      "CVE-2022-42720",
      "CVE-2022-42719",
      "CVE-2022-41674"
    ],
    "advisories": [
      "ASA-202210-1"
    ]
  },
  {
    "name": "AVG-2803",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "5.1-1",
    "fixed": "6.0.1.zen2-1",
    "ticket": null,
    "issues": [
      "CVE-2022-42722",
      "CVE-2022-42721",
      "CVE-2022-42720",
      "CVE-2022-42719",
      "CVE-2022-41674"
    ],
    "advisories": [
      "ASA-202210-4"
    ]
  },
  {
    "name": "AVG-2802",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "5.1-1",
    "fixed": "5.15.73-3",
    "ticket": null,
    "issues": [
      "CVE-2022-42722",
      "CVE-2022-42721",
      "CVE-2022-42720",
      "CVE-2022-42719",
      "CVE-2022-41674"
    ],
    "advisories": [
      "ASA-202210-3"
    ]
  },
  {
    "name": "AVG-2801",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "5.1-1",
    "fixed": "6.0.1.arch2-1",
    "ticket": null,
    "issues": [
      "CVE-2022-42722",
      "CVE-2022-42721",
      "CVE-2022-42720",
      "CVE-2022-42719",
      "CVE-2022-41674"
    ],
    "advisories": [
      "ASA-202210-2"
    ]
  },
  {
    "name": "AVG-2718",
    "packages": [
      "python-httpx"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "access restriction bypass",
    "affected": "0.22.0-1",
    "fixed": "0.22.0-2",
    "ticket": null,
    "issues": [
      "CVE-2021-41945"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2789",
    "packages": [
      "wpewebkit"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "2.36.4-2",
    "fixed": "2.36.5-1",
    "ticket": null,
    "issues": [
      "CVE-2022-32816",
      "CVE-2022-32792"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2791",
    "packages": [
      "webkit2gtk-4.1"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "2.36.4-2",
    "fixed": "2.36.5-1",
    "ticket": null,
    "issues": [
      "CVE-2022-32816",
      "CVE-2022-32792"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2736",
    "packages": [
      "maven"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary command execution",
    "affected": "3.3.2-1",
    "fixed": "3.3.3-1",
    "ticket": null,
    "issues": [
      "CVE-2022-29599"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2708",
    "packages": [
      "couchdb"
    ],
    "status": "Not affected",
    "severity": "Critical",
    "type": "privilege escalation",
    "affected": "3.2.1-1",
    "fixed": "3.2.2-2",
    "ticket": null,
    "issues": [
      "CVE-2022-24706"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2695",
    "packages": [
      "php"
    ],
    "status": "Not affected",
    "severity": "Critical",
    "type": "arbitrary file upload",
    "affected": "8.1.3-1",
    "fixed": "8.1.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21708"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2664",
    "packages": [
      "deno"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "1.20.2-1",
    "fixed": "1.20.3-1",
    "ticket": null,
    "issues": [
      "CVE-2022-24783"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2676",
    "packages": [
      "mediawiki"
    ],
    "status": "Not affected",
    "severity": "Critical",
    "type": "unknown",
    "affected": "1.37.1-1",
    "fixed": "1.37.2-1",
    "ticket": null,
    "issues": [
      "CVE-2022-28209",
      "CVE-2022-28206",
      "CVE-2022-28205"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2634",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "5.0.2497.28-1",
    "fixed": "5.0.2497.30-1",
    "ticket": null,
    "issues": [
      "CVE-2021-4102",
      "CVE-2021-4101",
      "CVE-2021-4100",
      "CVE-2021-4099",
      "CVE-2021-4098"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2632",
    "packages": [
      "mediathekview"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "13.8.0-2",
    "fixed": "13.8.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-44228"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2624",
    "packages": [
      "openfire"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "4.6.4-1",
    "fixed": "4.6.5-1",
    "ticket": "72975",
    "issues": [
      "CVE-2021-44228"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2622",
    "packages": [
      "solr"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "8.11.0-1",
    "fixed": "8.11.0-2",
    "ticket": "72975",
    "issues": [
      "CVE-2021-44228"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2621",
    "packages": [
      "ghidra"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "10.0.4-1",
    "fixed": "10.1-1",
    "ticket": "72975",
    "issues": [
      "CVE-2021-44228"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2648",
    "packages": [
      "samba"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "4.15.4-1",
    "fixed": "4.15.5-1",
    "ticket": null,
    "issues": [
      "CVE-2022-0336",
      "CVE-2021-44142",
      "CVE-2021-44141"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2633",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "96.0.4664.93-1",
    "fixed": "96.0.4664.110-1",
    "ticket": null,
    "issues": [
      "CVE-2021-4102",
      "CVE-2021-4101",
      "CVE-2021-4100",
      "CVE-2021-4099",
      "CVE-2021-4098"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2526",
    "packages": [
      "jenkins"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "2.318-1",
    "fixed": "2.319-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21697",
      "CVE-2021-21696",
      "CVE-2021-21695",
      "CVE-2021-21694",
      "CVE-2021-21693",
      "CVE-2021-21692",
      "CVE-2021-21691",
      "CVE-2021-21690",
      "CVE-2021-21689",
      "CVE-2021-21688",
      "CVE-2021-21687",
      "CVE-2021-21686",
      "CVE-2021-21685"
    ],
    "advisories": [
      "ASA-202111-1"
    ]
  },
  {
    "name": "AVG-2445",
    "packages": [
      "grafana"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "authentication bypass",
    "affected": "8.1.5-1",
    "fixed": "8.1.6-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39226"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2450",
    "packages": [
      "apache"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "directory traversal",
    "affected": "2.4.50-1",
    "fixed": "2.4.51-1",
    "ticket": null,
    "issues": [
      "CVE-2021-42013"
    ],
    "advisories": [
      "ASA-202110-1"
    ]
  },
  {
    "name": "AVG-2344",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "78.13.0-1",
    "fixed": "78.14.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38493"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2292",
    "packages": [
      "tensorflow"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "2.5.0-6",
    "fixed": "2.5.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37692",
      "CVE-2021-37691",
      "CVE-2021-37690",
      "CVE-2021-37689",
      "CVE-2021-37688",
      "CVE-2021-37687",
      "CVE-2021-37686",
      "CVE-2021-37685",
      "CVE-2021-37684",
      "CVE-2021-37683",
      "CVE-2021-37682",
      "CVE-2021-37681",
      "CVE-2021-37680",
      "CVE-2021-37679",
      "CVE-2021-37678",
      "CVE-2021-37677",
      "CVE-2021-37676",
      "CVE-2021-37675",
      "CVE-2021-37674",
      "CVE-2021-37673",
      "CVE-2021-37672",
      "CVE-2021-37671",
      "CVE-2021-37670",
      "CVE-2021-37669",
      "CVE-2021-37668",
      "CVE-2021-37667",
      "CVE-2021-37666",
      "CVE-2021-37665",
      "CVE-2021-37664",
      "CVE-2021-37663",
      "CVE-2021-37662",
      "CVE-2021-37661",
      "CVE-2021-37660",
      "CVE-2021-37659",
      "CVE-2021-37658",
      "CVE-2021-37657",
      "CVE-2021-37656",
      "CVE-2021-37655",
      "CVE-2021-37654",
      "CVE-2021-37653",
      "CVE-2021-37652",
      "CVE-2021-37651",
      "CVE-2021-37650",
      "CVE-2021-37649",
      "CVE-2021-37648",
      "CVE-2021-37647",
      "CVE-2021-37646",
      "CVE-2021-37645",
      "CVE-2021-37644",
      "CVE-2021-37643",
      "CVE-2021-37642",
      "CVE-2021-37641",
      "CVE-2021-37640",
      "CVE-2021-37639",
      "CVE-2021-37638",
      "CVE-2021-37637",
      "CVE-2021-37636",
      "CVE-2021-37635"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2134",
    "packages": [
      "spice-gtk"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "0.38-1",
    "fixed": "0.39-1",
    "ticket": null,
    "issues": [
      "CVE-2020-14355"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1239",
    "packages": [
      "spice"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "0.14.3-3",
    "fixed": "0.15.0-1",
    "ticket": "68166",
    "issues": [
      "CVE-2021-20201",
      "CVE-2020-14355"
    ],
    "advisories": [
      "ASA-202107-12"
    ]
  },
  {
    "name": "AVG-2113",
    "packages": [
      "istio"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "information disclosure",
    "affected": "1.10.1-1",
    "fixed": "1.10.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-34824"
    ],
    "advisories": [
      "ASA-202107-3"
    ]
  },
  {
    "name": "AVG-1947",
    "packages": [
      "istio"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "1.9.2-1",
    "fixed": "1.10.0-1",
    "ticket": "70808",
    "issues": [
      "CVE-2021-31921",
      "CVE-2021-31920",
      "CVE-2021-29492",
      "CVE-2021-29258",
      "CVE-2021-28683",
      "CVE-2021-28682"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2058",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "4.0.2312.24-1",
    "fixed": "4.0.2312.25-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30553",
      "CVE-2021-30552",
      "CVE-2021-30551",
      "CVE-2021-30550",
      "CVE-2021-30549",
      "CVE-2021-30548",
      "CVE-2021-30547",
      "CVE-2021-30546",
      "CVE-2021-30545",
      "CVE-2021-30544"
    ],
    "advisories": [
      "ASA-202106-32"
    ]
  },
  {
    "name": "AVG-2057",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "91.0.4472.77-2",
    "fixed": "91.0.4472.101-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30553",
      "CVE-2021-30552",
      "CVE-2021-30551",
      "CVE-2021-30550",
      "CVE-2021-30549",
      "CVE-2021-30548",
      "CVE-2021-30547",
      "CVE-2021-30546",
      "CVE-2021-30545",
      "CVE-2021-30544"
    ],
    "advisories": [
      "ASA-202106-31",
      "ASA-202106-31"
    ]
  },
  {
    "name": "AVG-2015",
    "packages": [
      "deno"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "access restriction bypass",
    "affected": "1.10.1-1",
    "fixed": "1.10.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32619"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1962",
    "packages": [
      "tensorflow"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "2.4.1-10",
    "fixed": "2.5.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29619",
      "CVE-2021-29618",
      "CVE-2021-29617",
      "CVE-2021-29616",
      "CVE-2021-29615",
      "CVE-2021-29614",
      "CVE-2021-29613",
      "CVE-2021-29612",
      "CVE-2021-29611",
      "CVE-2021-29610",
      "CVE-2021-29609",
      "CVE-2021-29608",
      "CVE-2021-29607",
      "CVE-2021-29606",
      "CVE-2021-29605",
      "CVE-2021-29604",
      "CVE-2021-29603",
      "CVE-2021-29602",
      "CVE-2021-29601",
      "CVE-2021-29600",
      "CVE-2021-29599",
      "CVE-2021-29598",
      "CVE-2021-29597",
      "CVE-2021-29596",
      "CVE-2021-29595",
      "CVE-2021-29594",
      "CVE-2021-29593",
      "CVE-2021-29592",
      "CVE-2021-29591",
      "CVE-2021-29590",
      "CVE-2021-29589",
      "CVE-2021-29588",
      "CVE-2021-29587",
      "CVE-2021-29586",
      "CVE-2021-29585",
      "CVE-2021-29584",
      "CVE-2021-29583",
      "CVE-2021-29582",
      "CVE-2021-29581",
      "CVE-2021-29580",
      "CVE-2021-29579",
      "CVE-2021-29578",
      "CVE-2021-29577",
      "CVE-2021-29576",
      "CVE-2021-29575",
      "CVE-2021-29574",
      "CVE-2021-29573",
      "CVE-2021-29572",
      "CVE-2021-29571",
      "CVE-2021-29570",
      "CVE-2021-29569",
      "CVE-2021-29568",
      "CVE-2021-29567",
      "CVE-2021-29566",
      "CVE-2021-29565",
      "CVE-2021-29564",
      "CVE-2021-29563",
      "CVE-2021-29562",
      "CVE-2021-29561",
      "CVE-2021-29560",
      "CVE-2021-29559",
      "CVE-2021-29558",
      "CVE-2021-29557",
      "CVE-2021-29556",
      "CVE-2021-29555",
      "CVE-2021-29554",
      "CVE-2021-29553",
      "CVE-2021-29552",
      "CVE-2021-29551",
      "CVE-2021-29550",
      "CVE-2021-29549",
      "CVE-2021-29548",
      "CVE-2021-29547",
      "CVE-2021-29546",
      "CVE-2021-29545",
      "CVE-2021-29544",
      "CVE-2021-29543",
      "CVE-2021-29542",
      "CVE-2021-29541",
      "CVE-2021-29540",
      "CVE-2021-29539",
      "CVE-2021-29538",
      "CVE-2021-29537",
      "CVE-2021-29536",
      "CVE-2021-29535",
      "CVE-2021-29534",
      "CVE-2021-29533",
      "CVE-2021-29532",
      "CVE-2021-29531",
      "CVE-2021-29530",
      "CVE-2021-29529",
      "CVE-2021-29528",
      "CVE-2021-29527",
      "CVE-2021-29526",
      "CVE-2021-29525",
      "CVE-2021-29524",
      "CVE-2021-29523",
      "CVE-2021-29522",
      "CVE-2021-29521",
      "CVE-2021-29520",
      "CVE-2021-29519",
      "CVE-2021-29518",
      "CVE-2021-29517",
      "CVE-2021-29516",
      "CVE-2021-29515",
      "CVE-2021-29514",
      "CVE-2021-29513",
      "CVE-2021-29512"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1743",
    "packages": [
      "redmine"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "4.1.1-2",
    "fixed": "4.2.1-1",
    "ticket": "70203",
    "issues": [
      "CVE-2021-31866",
      "CVE-2021-31865",
      "CVE-2021-31864",
      "CVE-2021-31863",
      "CVE-2021-30164",
      "CVE-2021-30163",
      "CVE-2021-29274"
    ],
    "advisories": [
      "ASA-202105-1"
    ]
  },
  {
    "name": "AVG-1463",
    "packages": [
      "drupal"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "9.0.6-2",
    "fixed": "9.1.7-1",
    "ticket": null,
    "issues": [
      "CVE-2020-36193",
      "CVE-2020-13672"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1918",
    "packages": [
      "firefox"
    ],
    "status": "Not affected",
    "severity": "Critical",
    "type": "cross-site scripting",
    "affected": "88.0-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-29953"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1789",
    "packages": [
      "ruby"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "incorrect calculation",
    "affected": "2.7.2-1",
    "fixed": "3.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28965"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1770",
    "packages": [
      "gitlab"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "13.9.4-1",
    "fixed": "13.10.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22203",
      "CVE-2021-22202",
      "CVE-2021-22201",
      "CVE-2021-22200",
      "CVE-2021-22199",
      "CVE-2021-22198",
      "CVE-2021-22197",
      "CVE-2021-22196"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1822",
    "packages": [
      "gitlab"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "13.10.2-1",
    "fixed": "13.10.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28965",
      "CVE-2021-22205"
    ],
    "advisories": [
      "ASA-202104-1"
    ]
  },
  {
    "name": "AVG-1788",
    "packages": [
      "ruby-rexml"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "incorrect calculation",
    "affected": "3.2.4-1",
    "fixed": "3.2.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28965"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1710",
    "packages": [
      "gitlab"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "13.9.3-1",
    "fixed": "13.9.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22192"
    ],
    "advisories": [
      "ASA-202103-13"
    ]
  },
  {
    "name": "AVG-1478",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "3.5.2115.87-2",
    "fixed": "3.6.2165.36-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21148",
      "CVE-2021-21147",
      "CVE-2021-21146",
      "CVE-2021-21145",
      "CVE-2021-21144",
      "CVE-2021-21143",
      "CVE-2021-21142",
      "CVE-2021-21141",
      "CVE-2021-21140",
      "CVE-2021-21139",
      "CVE-2021-21138",
      "CVE-2021-21137",
      "CVE-2021-21136",
      "CVE-2021-21135",
      "CVE-2021-21134",
      "CVE-2021-21133",
      "CVE-2021-21132",
      "CVE-2021-21131",
      "CVE-2021-21130",
      "CVE-2021-21129",
      "CVE-2021-21128",
      "CVE-2021-21127",
      "CVE-2021-21126",
      "CVE-2021-21125",
      "CVE-2021-21124",
      "CVE-2021-21123",
      "CVE-2021-21122",
      "CVE-2021-21121",
      "CVE-2021-21120",
      "CVE-2021-21119",
      "CVE-2021-21118",
      "CVE-2021-21117",
      "CVE-2020-16044"
    ],
    "advisories": [
      "ASA-202102-4"
    ]
  },
  {
    "name": "AVG-1543",
    "packages": [
      "connman"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "1.38-1",
    "fixed": "1.39-1",
    "ticket": "69583",
    "issues": [
      "CVE-2021-26676",
      "CVE-2021-26675"
    ],
    "advisories": [
      "ASA-202102-24"
    ]
  },
  {
    "name": "AVG-1525",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "88.0.4324.96-2",
    "fixed": "88.0.4324.150-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21148",
      "CVE-2021-21147",
      "CVE-2021-21146",
      "CVE-2021-21145",
      "CVE-2021-21144",
      "CVE-2021-21143",
      "CVE-2021-21142"
    ],
    "advisories": [
      "ASA-202102-6",
      "ASA-202102-6"
    ]
  },
  {
    "name": "AVG-1477",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "87.0.4280.141-1",
    "fixed": "88.0.4324.96-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21141",
      "CVE-2021-21140",
      "CVE-2021-21139",
      "CVE-2021-21138",
      "CVE-2021-21137",
      "CVE-2021-21136",
      "CVE-2021-21135",
      "CVE-2021-21134",
      "CVE-2021-21133",
      "CVE-2021-21132",
      "CVE-2021-21131",
      "CVE-2021-21130",
      "CVE-2021-21129",
      "CVE-2021-21128",
      "CVE-2021-21127",
      "CVE-2021-21126",
      "CVE-2021-21125",
      "CVE-2021-21124",
      "CVE-2021-21123",
      "CVE-2021-21122",
      "CVE-2021-21121",
      "CVE-2021-21120",
      "CVE-2021-21119",
      "CVE-2021-21118",
      "CVE-2021-21117",
      "CVE-2020-16044"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1487",
    "packages": [
      "python-pysaml2"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "signature forgery",
    "affected": "6.4.1-1",
    "fixed": "6.5.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21239",
      "CVE-2021-21238"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1505",
    "packages": [
      "libgcrypt"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "1.9.0-2",
    "fixed": "1.9.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3345"
    ],
    "advisories": [
      "ASA-202101-45"
    ]
  },
  {
    "name": "AVG-1431",
    "packages": [
      "sudo"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "1.9.4.p2-2",
    "fixed": "1.9.5.p2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3156",
      "CVE-2021-23239"
    ],
    "advisories": [
      "ASA-202101-25"
    ]
  },
  {
    "name": "AVG-1240",
    "packages": [
      "libvirt"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "1:6.5.0-3",
    "fixed": "1:7.0.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-25637"
    ],
    "advisories": [
      "ASA-202101-42"
    ]
  },
  {
    "name": "AVG-1440",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "78.6.0-3",
    "fixed": "78.6.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-16044"
    ],
    "advisories": [
      "ASA-202101-17"
    ]
  },
  {
    "name": "AVG-1413",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "84.0.1-1",
    "fixed": "84.0.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-16044"
    ],
    "advisories": [
      "ASA-202101-5"
    ]
  },
  {
    "name": "AVG-1348",
    "packages": [
      "tensorflow"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "2.4.0rc4-2",
    "fixed": "2.4.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26271",
      "CVE-2020-26270",
      "CVE-2020-26269",
      "CVE-2020-26268",
      "CVE-2020-26267",
      "CVE-2020-26266"
    ],
    "advisories": [
      "ASA-202012-22"
    ]
  },
  {
    "name": "AVG-1279",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "82.0.3-1",
    "fixed": "83.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26969",
      "CVE-2020-26968",
      "CVE-2020-26967",
      "CVE-2020-26965",
      "CVE-2020-26963",
      "CVE-2020-26962",
      "CVE-2020-26961",
      "CVE-2020-26960",
      "CVE-2020-26959",
      "CVE-2020-26958",
      "CVE-2020-26956",
      "CVE-2020-26953",
      "CVE-2020-26952",
      "CVE-2020-26951",
      "CVE-2020-16012",
      "CVE-2020-15999"
    ],
    "advisories": [
      "ASA-202011-12"
    ]
  },
  {
    "name": "AVG-1265",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "82.0.2-1",
    "fixed": "82.0.3-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26950"
    ],
    "advisories": [
      "ASA-202011-6"
    ]
  },
  {
    "name": "AVG-1261",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "86.0.4240.111-2",
    "fixed": "86.0.4240.183-1",
    "ticket": null,
    "issues": [
      "CVE-2020-16009",
      "CVE-2020-16008",
      "CVE-2020-16007",
      "CVE-2020-16006",
      "CVE-2020-16005",
      "CVE-2020-16004"
    ],
    "advisories": [
      "ASA-202011-2",
      "ASA-202011-2"
    ]
  },
  {
    "name": "AVG-1257",
    "packages": [
      "wordpress"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "5.5.1-1",
    "fixed": "5.5.3-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28040",
      "CVE-2020-28039",
      "CVE-2020-28038",
      "CVE-2020-28037",
      "CVE-2020-28036",
      "CVE-2020-28035",
      "CVE-2020-28034",
      "CVE-2020-28033",
      "CVE-2020-28032"
    ],
    "advisories": [
      "ASA-202011-3"
    ]
  },
  {
    "name": "AVG-1256",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "81.0.2-1",
    "fixed": "82.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-15969",
      "CVE-2020-15684",
      "CVE-2020-15683",
      "CVE-2020-15682",
      "CVE-2020-15681",
      "CVE-2020-15680",
      "CVE-2020-15254"
    ],
    "advisories": [
      "ASA-202011-1"
    ]
  },
  {
    "name": "AVG-1238",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "85.0.4183.121-1",
    "fixed": "86.0.4240.75-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6557",
      "CVE-2020-15992",
      "CVE-2020-15991",
      "CVE-2020-15990",
      "CVE-2020-15989",
      "CVE-2020-15988",
      "CVE-2020-15987",
      "CVE-2020-15986",
      "CVE-2020-15985",
      "CVE-2020-15984",
      "CVE-2020-15983",
      "CVE-2020-15982",
      "CVE-2020-15981",
      "CVE-2020-15980",
      "CVE-2020-15979",
      "CVE-2020-15978",
      "CVE-2020-15977",
      "CVE-2020-15976",
      "CVE-2020-15975",
      "CVE-2020-15974",
      "CVE-2020-15973",
      "CVE-2020-15972",
      "CVE-2020-15971",
      "CVE-2020-15970",
      "CVE-2020-15969",
      "CVE-2020-15968",
      "CVE-2020-15967"
    ],
    "advisories": [
      "ASA-202010-1",
      "ASA-202010-1"
    ]
  },
  {
    "name": "AVG-1221",
    "packages": [
      "netbeans"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "12.0-1",
    "fixed": "12.0_u1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-11986"
    ],
    "advisories": [
      "ASA-202009-7"
    ]
  },
  {
    "name": "AVG-1218",
    "packages": [
      "gnupg"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "2.2.21-2",
    "fixed": "2.2.23-1",
    "ticket": null,
    "issues": [
      "CVE-2020-25125"
    ],
    "advisories": [
      "ASA-202009-5"
    ]
  },
  {
    "name": "AVG-1206",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "83.0.4103.116-3",
    "fixed": "84.0.4147.89-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6536",
      "CVE-2020-6535",
      "CVE-2020-6534",
      "CVE-2020-6533",
      "CVE-2020-6531",
      "CVE-2020-6530",
      "CVE-2020-6529",
      "CVE-2020-6528",
      "CVE-2020-6527",
      "CVE-2020-6526",
      "CVE-2020-6525",
      "CVE-2020-6524",
      "CVE-2020-6523",
      "CVE-2020-6522",
      "CVE-2020-6521",
      "CVE-2020-6520",
      "CVE-2020-6519",
      "CVE-2020-6518",
      "CVE-2020-6517",
      "CVE-2020-6516",
      "CVE-2020-6515",
      "CVE-2020-6514",
      "CVE-2020-6513",
      "CVE-2020-6512",
      "CVE-2020-6511",
      "CVE-2020-6510"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1146",
    "packages": [
      "squid"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "4.10-2",
    "fixed": "4.12-1",
    "ticket": null,
    "issues": [
      "CVE-2020-11945",
      "CVE-2019-12521",
      "CVE-2019-12519"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1155",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "68.7.0-2",
    "fixed": "68.8.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6831",
      "CVE-2020-12397",
      "CVE-2020-12395",
      "CVE-2020-12392",
      "CVE-2020-12387"
    ],
    "advisories": [
      "ASA-202005-7"
    ]
  },
  {
    "name": "AVG-1131",
    "packages": [
      "freerdp"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "1:2.0.0_rc4-8",
    "fixed": "2:2.0.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-11526",
      "CVE-2020-11525",
      "CVE-2020-11524",
      "CVE-2020-11523",
      "CVE-2020-11522",
      "CVE-2020-11521",
      "CVE-2020-11049",
      "CVE-2020-11048",
      "CVE-2020-11047",
      "CVE-2020-11046",
      "CVE-2020-11045",
      "CVE-2020-11044",
      "CVE-2020-11042"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1148",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "75.0-1",
    "fixed": "76.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6831",
      "CVE-2020-12396",
      "CVE-2020-12395",
      "CVE-2020-12394",
      "CVE-2020-12392",
      "CVE-2020-12391",
      "CVE-2020-12390",
      "CVE-2020-12387"
    ],
    "advisories": [
      "ASA-202005-3"
    ]
  },
  {
    "name": "AVG-1136",
    "packages": [
      "libmicrodns"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "0.1.0-1",
    "fixed": "0.1.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6080",
      "CVE-2020-6079",
      "CVE-2020-6078",
      "CVE-2020-6077",
      "CVE-2020-6073",
      "CVE-2020-6072",
      "CVE-2020-6071"
    ],
    "advisories": [
      "ASA-202004-24"
    ]
  },
  {
    "name": "AVG-1134",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "81.0.4044.92-1",
    "fixed": "81.0.4044.113-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6457"
    ],
    "advisories": [
      "ASA-202004-15",
      "ASA-202004-15"
    ]
  },
  {
    "name": "AVG-1132",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "68.6.0-2",
    "fixed": "68.7.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6821",
      "CVE-2020-6820",
      "CVE-2020-6819",
      "CVE-2020-6815"
    ],
    "advisories": [
      "ASA-202004-12"
    ]
  },
  {
    "name": "AVG-1129",
    "packages": [
      "wireshark-cli"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "3.2.2-1",
    "fixed": "3.2.3-1",
    "ticket": null,
    "issues": [
      "CVE-2020-11647"
    ],
    "advisories": [
      "ASA-202004-10"
    ]
  },
  {
    "name": "AVG-1124",
    "packages": [
      "haproxy"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "2.1.3-1",
    "fixed": "2.1.4-1",
    "ticket": null,
    "issues": [
      "CVE-2020-11100"
    ],
    "advisories": [
      "ASA-202004-7"
    ]
  },
  {
    "name": "AVG-1127",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "74.0.1-1",
    "fixed": "75.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6826",
      "CVE-2020-6825",
      "CVE-2020-6824",
      "CVE-2020-6823",
      "CVE-2020-6821"
    ],
    "advisories": [
      "ASA-202004-8"
    ]
  },
  {
    "name": "AVG-1125",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "74.0-2",
    "fixed": "74.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6820",
      "CVE-2020-6819"
    ],
    "advisories": [
      "ASA-202004-6"
    ]
  },
  {
    "name": "AVG-1115",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "68.5.0-1",
    "fixed": "68.6.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6814",
      "CVE-2020-6812",
      "CVE-2020-6811",
      "CVE-2020-6807",
      "CVE-2020-6806",
      "CVE-2020-6805",
      "CVE-2019-20503"
    ],
    "advisories": [
      "ASA-202003-11"
    ]
  },
  {
    "name": "AVG-1112",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "73.0.1-1",
    "fixed": "74.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6815",
      "CVE-2020-6814",
      "CVE-2020-6813",
      "CVE-2020-6812",
      "CVE-2020-6811",
      "CVE-2020-6810",
      "CVE-2020-6809",
      "CVE-2020-6808",
      "CVE-2020-6807",
      "CVE-2020-6806",
      "CVE-2020-6805",
      "CVE-2019-20503"
    ],
    "advisories": [
      "ASA-202003-8"
    ]
  },
  {
    "name": "AVG-1103",
    "packages": [
      "weechat"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "2.7-2",
    "fixed": "2.7.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-9760",
      "CVE-2020-9759",
      "CVE-2020-8955"
    ],
    "advisories": [
      "ASA-202002-12"
    ]
  },
  {
    "name": "AVG-1105",
    "packages": [
      "opensmtpd"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary command execution",
    "affected": "6.6.3p1-1",
    "fixed": "6.6.4p1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-8794"
    ],
    "advisories": [
      "ASA-202002-13"
    ]
  },
  {
    "name": "AVG-1099",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "68.4.2-1",
    "fixed": "68.5.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6800",
      "CVE-2020-6798",
      "CVE-2020-6795",
      "CVE-2020-6794",
      "CVE-2020-6793",
      "CVE-2020-6792"
    ],
    "advisories": [
      "ASA-202002-9"
    ]
  },
  {
    "name": "AVG-1096",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "72.0.2-1",
    "fixed": "73.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6801",
      "CVE-2020-6800",
      "CVE-2020-6798",
      "CVE-2020-6796"
    ],
    "advisories": [
      "ASA-202002-5"
    ]
  },
  {
    "name": "AVG-1092",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "79.0.3945.130-2",
    "fixed": "80.0.3987.87-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6416",
      "CVE-2020-6415",
      "CVE-2020-6414",
      "CVE-2020-6413",
      "CVE-2020-6412",
      "CVE-2020-6411",
      "CVE-2020-6410",
      "CVE-2020-6409",
      "CVE-2020-6408",
      "CVE-2020-6406",
      "CVE-2020-6405",
      "CVE-2020-6404",
      "CVE-2020-6403",
      "CVE-2020-6402",
      "CVE-2020-6401",
      "CVE-2020-6400",
      "CVE-2020-6399",
      "CVE-2020-6398",
      "CVE-2020-6397",
      "CVE-2020-6396",
      "CVE-2020-6395",
      "CVE-2020-6394",
      "CVE-2020-6393",
      "CVE-2020-6392",
      "CVE-2020-6391",
      "CVE-2020-6390",
      "CVE-2020-6389",
      "CVE-2020-6388",
      "CVE-2020-6387",
      "CVE-2020-6385",
      "CVE-2020-6382",
      "CVE-2020-6381",
      "CVE-2019-19926",
      "CVE-2019-19925",
      "CVE-2019-19923",
      "CVE-2019-19880",
      "CVE-2019-18197"
    ],
    "advisories": [
      "ASA-202002-3",
      "ASA-202002-3"
    ]
  },
  {
    "name": "AVG-1090",
    "packages": [
      "opensmtpd"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary command execution",
    "affected": "6.6.1p1-1",
    "fixed": "6.6.2p1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-7247"
    ],
    "advisories": [
      "ASA-202001-6"
    ]
  },
  {
    "name": "AVG-1088",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "79.0.3945.117-1",
    "fixed": "79.0.3945.130-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6380",
      "CVE-2020-6379",
      "CVE-2020-6378"
    ],
    "advisories": [
      "ASA-202001-5",
      "ASA-202001-5"
    ]
  },
  {
    "name": "AVG-1086",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "68.3.1-1",
    "fixed": "68.4.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-17026",
      "CVE-2019-17024",
      "CVE-2019-17022",
      "CVE-2019-17017",
      "CVE-2019-17016"
    ],
    "advisories": [
      "ASA-202001-4"
    ]
  },
  {
    "name": "AVG-1085",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "72.0-1",
    "fixed": "72.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-17026"
    ],
    "advisories": [
      "ASA-202001-3"
    ]
  },
  {
    "name": "AVG-1084",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "71.0-1",
    "fixed": "72.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-17025",
      "CVE-2019-17024",
      "CVE-2019-17023",
      "CVE-2019-17022",
      "CVE-2019-17020",
      "CVE-2019-17017",
      "CVE-2019-17016"
    ],
    "advisories": [
      "ASA-202001-1"
    ]
  },
  {
    "name": "AVG-1076",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "78.0.3904.108-1",
    "fixed": "79.0.3945.79-1",
    "ticket": null,
    "issues": [
      "CVE-2019-13764",
      "CVE-2019-13763",
      "CVE-2019-13762",
      "CVE-2019-13761",
      "CVE-2019-13759",
      "CVE-2019-13758",
      "CVE-2019-13757",
      "CVE-2019-13756",
      "CVE-2019-13755",
      "CVE-2019-13754",
      "CVE-2019-13753",
      "CVE-2019-13752",
      "CVE-2019-13751",
      "CVE-2019-13750",
      "CVE-2019-13749",
      "CVE-2019-13748",
      "CVE-2019-13747",
      "CVE-2019-13746",
      "CVE-2019-13745",
      "CVE-2019-13744",
      "CVE-2019-13743",
      "CVE-2019-13742",
      "CVE-2019-13741",
      "CVE-2019-13740",
      "CVE-2019-13739",
      "CVE-2019-13738",
      "CVE-2019-13737",
      "CVE-2019-13736",
      "CVE-2019-13735",
      "CVE-2019-13734",
      "CVE-2019-13732",
      "CVE-2019-13730",
      "CVE-2019-13729",
      "CVE-2019-13728",
      "CVE-2019-13727",
      "CVE-2019-13726",
      "CVE-2019-13725"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1078",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "79.0.3945.79-1",
    "fixed": "79.0.3945.88-1",
    "ticket": null,
    "issues": [
      "CVE-2019-13767"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1072",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "68.2.2-2",
    "fixed": "68.3.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-17012",
      "CVE-2019-17011",
      "CVE-2019-17010",
      "CVE-2019-17008",
      "CVE-2019-17005",
      "CVE-2019-11745"
    ],
    "advisories": [
      "ASA-201912-2"
    ]
  },
  {
    "name": "AVG-1071",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "70.0.1-3",
    "fixed": "71.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-17014",
      "CVE-2019-17013",
      "CVE-2019-17012",
      "CVE-2019-17011",
      "CVE-2019-17010",
      "CVE-2019-17009",
      "CVE-2019-17008",
      "CVE-2019-17005",
      "CVE-2019-11756",
      "CVE-2019-11745"
    ],
    "advisories": [
      "ASA-201912-1"
    ]
  },
  {
    "name": "AVG-1066",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "5.3.8.1-1",
    "fixed": "5.3.9.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-17666"
    ],
    "advisories": [
      "ASA-201911-12"
    ]
  },
  {
    "name": "AVG-1065",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "4.19.81-1",
    "fixed": "4.19.82-1",
    "ticket": null,
    "issues": [
      "CVE-2019-17666"
    ],
    "advisories": [
      "ASA-201911-11"
    ]
  },
  {
    "name": "AVG-1064",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "5.3.8.1-1",
    "fixed": "5.3.9.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-17666"
    ],
    "advisories": [
      "ASA-201911-10"
    ]
  },
  {
    "name": "AVG-1063",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "5.3.7.a-1",
    "fixed": "5.3.7.b-1",
    "ticket": null,
    "issues": [
      "CVE-2019-17666"
    ],
    "advisories": [
      "ASA-201911-9"
    ]
  },
  {
    "name": "AVG-1062",
    "packages": [
      "squid"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "4.8-2",
    "fixed": "4.9-1",
    "ticket": null,
    "issues": [
      "CVE-2019-18679",
      "CVE-2019-18678",
      "CVE-2019-12526"
    ],
    "advisories": [
      "ASA-201911-8"
    ]
  },
  {
    "name": "AVG-1061",
    "packages": [
      "electron"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "7.0.0-1",
    "fixed": "7.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-13720"
    ],
    "advisories": [
      "ASA-201911-7"
    ]
  },
  {
    "name": "AVG-1058",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "78.0.3904.70-1",
    "fixed": "78.0.3904.87-1",
    "ticket": null,
    "issues": [
      "CVE-2019-13721",
      "CVE-2019-13720"
    ],
    "advisories": [
      "ASA-201911-1",
      "ASA-201911-1"
    ]
  },
  {
    "name": "AVG-1055",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "69.0.3-1",
    "fixed": "70.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-17002",
      "CVE-2019-17001",
      "CVE-2019-17000",
      "CVE-2019-15903",
      "CVE-2019-11765",
      "CVE-2019-11764",
      "CVE-2019-11763",
      "CVE-2019-11762",
      "CVE-2019-11761",
      "CVE-2019-11760",
      "CVE-2019-11759",
      "CVE-2019-11757",
      "CVE-2018-6156"
    ],
    "advisories": [
      "ASA-201910-16"
    ]
  },
  {
    "name": "AVG-1054",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "68.1.1-1",
    "fixed": "68.2.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-15903",
      "CVE-2019-11764",
      "CVE-2019-11763",
      "CVE-2019-11762",
      "CVE-2019-11761",
      "CVE-2019-11760",
      "CVE-2019-11759",
      "CVE-2019-11757"
    ],
    "advisories": [
      "ASA-201910-15"
    ]
  },
  {
    "name": "AVG-1052",
    "packages": [
      "php"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "7.3.10-1",
    "fixed": "7.3.11-1",
    "ticket": null,
    "issues": [
      "CVE-2019-11043"
    ],
    "advisories": [
      "ASA-201910-14"
    ]
  },
  {
    "name": "AVG-1038",
    "packages": [
      "exim"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "4.92.2-1",
    "fixed": "4.92.3-1",
    "ticket": null,
    "issues": [
      "CVE-2019-16928"
    ],
    "advisories": [
      "ASA-201910-1"
    ]
  },
  {
    "name": "AVG-1037",
    "packages": [
      "exim"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary command execution",
    "affected": "4.92.1-1",
    "fixed": "4.92.2-1",
    "ticket": null,
    "issues": [
      "CVE-2019-15846"
    ],
    "advisories": [
      "ASA-201909-3"
    ]
  },
  {
    "name": "AVG-1027",
    "packages": [
      "pigeonhole"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "0.5.7.1-1",
    "fixed": "0.5.7.2-1",
    "ticket": null,
    "issues": [
      "CVE-2019-11500"
    ],
    "advisories": [
      "ASA-201908-19"
    ]
  },
  {
    "name": "AVG-1026",
    "packages": [
      "dovecot"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "2.3.7.1-1",
    "fixed": "2.3.7.2-1",
    "ticket": null,
    "issues": [
      "CVE-2019-11500"
    ],
    "advisories": [
      "ASA-201908-18"
    ]
  },
  {
    "name": "AVG-1011",
    "packages": [
      "exim"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "4.92-1",
    "fixed": "4.92.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-13917"
    ],
    "advisories": [
      "ASA-201908-4"
    ]
  },
  {
    "name": "AVG-1004",
    "packages": [
      "squid"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "4.7-2",
    "fixed": "4.8-1",
    "ticket": null,
    "issues": [
      "CVE-2019-12527"
    ],
    "advisories": [
      "ASA-201907-5"
    ]
  },
  {
    "name": "AVG-1002",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "67.0.4-2",
    "fixed": "68.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-9811",
      "CVE-2019-11730",
      "CVE-2019-11729",
      "CVE-2019-11728",
      "CVE-2019-11727",
      "CVE-2019-11725",
      "CVE-2019-11724",
      "CVE-2019-11723",
      "CVE-2019-11721",
      "CVE-2019-11720",
      "CVE-2019-11719",
      "CVE-2019-11718",
      "CVE-2019-11717",
      "CVE-2019-11716",
      "CVE-2019-11715",
      "CVE-2019-11714",
      "CVE-2019-11713",
      "CVE-2019-11712",
      "CVE-2019-11711",
      "CVE-2019-11710",
      "CVE-2019-11709"
    ],
    "advisories": [
      "ASA-201907-4"
    ]
  },
  {
    "name": "AVG-998",
    "packages": [
      "vlc"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "3.0.6-13",
    "fixed": "3.0.7.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5439",
      "CVE-2019-12874"
    ],
    "advisories": [
      "ASA-201906-22"
    ]
  },
  {
    "name": "AVG-995",
    "packages": [
      "firefox-developer-edition"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "68.0b10-1",
    "fixed": "68.0b11-1",
    "ticket": null,
    "issues": [
      "CVE-2019-11707"
    ],
    "advisories": [
      "ASA-201906-19"
    ]
  },
  {
    "name": "AVG-994",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "67.0.2-1",
    "fixed": "67.0.3-1",
    "ticket": null,
    "issues": [
      "CVE-2019-11707"
    ],
    "advisories": [
      "ASA-201906-18"
    ]
  },
  {
    "name": "AVG-989",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "4.20.11.arch1-1",
    "fixed": "4.20.12.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-8912"
    ],
    "advisories": []
  },
  {
    "name": "AVG-982",
    "packages": [
      "exim"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "4.91-1",
    "fixed": "4.92-1",
    "ticket": null,
    "issues": [
      "CVE-2019-10149"
    ],
    "advisories": []
  },
  {
    "name": "AVG-972",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "74.0.3729.169-2",
    "fixed": "75.0.3770.80-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5840",
      "CVE-2019-5839",
      "CVE-2019-5838",
      "CVE-2019-5837",
      "CVE-2019-5836",
      "CVE-2019-5835",
      "CVE-2019-5833",
      "CVE-2019-5832",
      "CVE-2019-5831",
      "CVE-2019-5830",
      "CVE-2019-5829",
      "CVE-2019-5828"
    ],
    "advisories": [
      "ASA-201906-4",
      "ASA-201906-4"
    ]
  },
  {
    "name": "AVG-966",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "66.0.5-1",
    "fixed": "67.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-9821",
      "CVE-2019-9820",
      "CVE-2019-9819",
      "CVE-2019-9817",
      "CVE-2019-9816",
      "CVE-2019-9814",
      "CVE-2019-9800",
      "CVE-2019-7317",
      "CVE-2019-11701",
      "CVE-2019-11699",
      "CVE-2019-11698",
      "CVE-2019-11697",
      "CVE-2019-11696",
      "CVE-2019-11695",
      "CVE-2019-11693",
      "CVE-2019-11692",
      "CVE-2019-11691"
    ],
    "advisories": [
      "ASA-201905-9"
    ]
  },
  {
    "name": "AVG-965",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "60.6.1-2",
    "fixed": "60.7.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-9819",
      "CVE-2019-9817",
      "CVE-2019-9816",
      "CVE-2019-9800",
      "CVE-2019-7317",
      "CVE-2019-5798",
      "CVE-2019-18511",
      "CVE-2019-11698",
      "CVE-2019-11693",
      "CVE-2019-11692",
      "CVE-2019-11691"
    ],
    "advisories": [
      "ASA-201905-8"
    ]
  },
  {
    "name": "AVG-952",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "73.0.3683.103-2",
    "fixed": "74.0.3729.108-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5823",
      "CVE-2019-5822",
      "CVE-2019-5821",
      "CVE-2019-5820",
      "CVE-2019-5819",
      "CVE-2019-5818",
      "CVE-2019-5815",
      "CVE-2019-5814",
      "CVE-2019-5813",
      "CVE-2019-5811",
      "CVE-2019-5810",
      "CVE-2019-5809",
      "CVE-2019-5808",
      "CVE-2019-5807",
      "CVE-2019-5806",
      "CVE-2019-5805"
    ],
    "advisories": [
      "ASA-201904-12",
      "ASA-201904-12"
    ]
  },
  {
    "name": "AVG-947",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "60.5.3-1",
    "fixed": "60.6.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-9813",
      "CVE-2019-9810"
    ],
    "advisories": [
      "ASA-201904-4"
    ]
  },
  {
    "name": "AVG-946",
    "packages": [
      "apache"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "2.4.38-1",
    "fixed": "2.4.39-1",
    "ticket": null,
    "issues": [
      "CVE-2019-0220",
      "CVE-2019-0217",
      "CVE-2019-0215",
      "CVE-2019-0211",
      "CVE-2019-0197",
      "CVE-2019-0196"
    ],
    "advisories": [
      "ASA-201904-3"
    ]
  },
  {
    "name": "AVG-945",
    "packages": [
      "gnutls"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "3.6.6-3",
    "fixed": "3.6.7-1",
    "ticket": null,
    "issues": [
      "CVE-2019-3836",
      "CVE-2019-3829"
    ],
    "advisories": [
      "ASA-201904-2"
    ]
  },
  {
    "name": "AVG-935",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "47.0.1-1",
    "fixed": "48.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2016-5258"
    ],
    "advisories": []
  },
  {
    "name": "AVG-934",
    "packages": [
      "freeradius"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "2.2.0-1",
    "fixed": "2.2.9-1",
    "ticket": null,
    "issues": [
      "CVE-2017-10981",
      "CVE-2017-10980",
      "CVE-2017-10979"
    ],
    "advisories": []
  },
  {
    "name": "AVG-931",
    "packages": [
      "imagemagick"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "7.0.8.34-1",
    "fixed": "7.0.8.35-1",
    "ticket": null,
    "issues": [
      "CVE-2019-9956"
    ],
    "advisories": [
      "ASA-201903-15"
    ]
  },
  {
    "name": "AVG-930",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "66.0-1",
    "fixed": "66.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-9813",
      "CVE-2019-9810"
    ],
    "advisories": [
      "ASA-201903-14"
    ]
  },
  {
    "name": "AVG-926",
    "packages": [
      "libssh2"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "1.8.0-3",
    "fixed": "1.8.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-3863",
      "CVE-2019-3862",
      "CVE-2019-3861",
      "CVE-2019-3860",
      "CVE-2019-3859",
      "CVE-2019-3858",
      "CVE-2019-3857",
      "CVE-2019-3856",
      "CVE-2019-3855"
    ],
    "advisories": [
      "ASA-201903-12"
    ]
  },
  {
    "name": "AVG-925",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "65.0.2-1",
    "fixed": "66.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-9809",
      "CVE-2019-9808",
      "CVE-2019-9807",
      "CVE-2019-9806",
      "CVE-2019-9805",
      "CVE-2019-9803",
      "CVE-2019-9802",
      "CVE-2019-9799",
      "CVE-2019-9797",
      "CVE-2019-9796",
      "CVE-2019-9795",
      "CVE-2019-9793",
      "CVE-2019-9792",
      "CVE-2019-9791",
      "CVE-2019-9790",
      "CVE-2019-9789",
      "CVE-2019-9788"
    ],
    "advisories": [
      "ASA-201903-11"
    ]
  },
  {
    "name": "AVG-924",
    "packages": [
      "bash"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "4.3.026-1",
    "fixed": "4.3.027-1",
    "ticket": null,
    "issues": [
      "CVE-2014-6277"
    ],
    "advisories": []
  },
  {
    "name": "AVG-910",
    "packages": [
      "wordpress"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "5.0.0-1",
    "fixed": "5.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-8942"
    ],
    "advisories": []
  },
  {
    "name": "AVG-908",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "60.5.0-1",
    "fixed": "60.5.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5785",
      "CVE-2018-18509",
      "CVE-2018-18356",
      "CVE-2018-18335"
    ],
    "advisories": [
      "ASA-201902-23"
    ]
  },
  {
    "name": "AVG-870",
    "packages": [
      "live-media"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "2018.10.17-1",
    "fixed": "2019.05.12-1",
    "ticket": null,
    "issues": [
      "CVE-2019-7733",
      "CVE-2019-7314"
    ],
    "advisories": [
      "ASA-201905-17"
    ]
  },
  {
    "name": "AVG-866",
    "packages": [
      "spice"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "0.14.0-2",
    "fixed": "0.14.0-3",
    "ticket": "61650",
    "issues": [
      "CVE-2019-3813"
    ],
    "advisories": [
      "ASA-201902-4"
    ]
  },
  {
    "name": "AVG-865",
    "packages": [
      "gd"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "2.2.5-1",
    "fixed": "2.2.5-2",
    "ticket": null,
    "issues": [
      "CVE-2019-6978",
      "CVE-2019-6977",
      "CVE-2018-5711",
      "CVE-2018-1000222"
    ],
    "advisories": []
  },
  {
    "name": "AVG-862",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "64.0.2-1",
    "fixed": "65.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-18506",
      "CVE-2018-18505",
      "CVE-2018-18504",
      "CVE-2018-18503",
      "CVE-2018-18502",
      "CVE-2018-18501",
      "CVE-2018-18500"
    ],
    "advisories": [
      "ASA-201902-2"
    ]
  },
  {
    "name": "AVG-861",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "71.0.3578.98-3",
    "fixed": "72.0.3626.81-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5783",
      "CVE-2019-5782",
      "CVE-2019-5781",
      "CVE-2019-5780",
      "CVE-2019-5779",
      "CVE-2019-5778",
      "CVE-2019-5777",
      "CVE-2019-5776",
      "CVE-2019-5775",
      "CVE-2019-5774",
      "CVE-2019-5773",
      "CVE-2019-5772",
      "CVE-2019-5771",
      "CVE-2019-5770",
      "CVE-2019-5769",
      "CVE-2019-5768",
      "CVE-2019-5767",
      "CVE-2019-5766",
      "CVE-2019-5765",
      "CVE-2019-5764",
      "CVE-2019-5763",
      "CVE-2019-5762",
      "CVE-2019-5761",
      "CVE-2019-5760",
      "CVE-2019-5759",
      "CVE-2019-5758",
      "CVE-2019-5757",
      "CVE-2019-5756",
      "CVE-2019-5755",
      "CVE-2019-5754"
    ],
    "advisories": [
      "ASA-201902-3",
      "ASA-201902-3"
    ]
  },
  {
    "name": "AVG-850",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "4.20.arch1-1",
    "fixed": "4.20.8.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-7222",
      "CVE-2019-7221",
      "CVE-2019-6974"
    ],
    "advisories": []
  },
  {
    "name": "AVG-840",
    "packages": [
      "sqlite"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "3.25.3-1",
    "fixed": "3.26.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-20346"
    ],
    "advisories": []
  },
  {
    "name": "AVG-833",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "63.0.3-1",
    "fixed": "64.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-18497",
      "CVE-2018-18495",
      "CVE-2018-18494",
      "CVE-2018-18493",
      "CVE-2018-18492",
      "CVE-2018-17466",
      "CVE-2018-12407",
      "CVE-2018-12406",
      "CVE-2018-12405"
    ],
    "advisories": [
      "ASA-201812-9"
    ]
  },
  {
    "name": "AVG-827",
    "packages": [
      "lib32-cairo"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "1.16.0-1",
    "fixed": "1.16.0-2",
    "ticket": null,
    "issues": [
      "CVE-2018-19876"
    ],
    "advisories": []
  },
  {
    "name": "AVG-826",
    "packages": [
      "cairo"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "1.16.0-1",
    "fixed": "1.16.0-2",
    "ticket": null,
    "issues": [
      "CVE-2018-19876"
    ],
    "advisories": [
      "ASA-201902-19"
    ]
  },
  {
    "name": "AVG-825",
    "packages": [
      "wireshark-cli"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "2.6.4-2",
    "fixed": "2.6.5-1",
    "ticket": null,
    "issues": [
      "CVE-2018-19628",
      "CVE-2018-19627",
      "CVE-2018-19626",
      "CVE-2018-19625",
      "CVE-2018-19624",
      "CVE-2018-19623",
      "CVE-2018-19622"
    ],
    "advisories": [
      "ASA-201812-3"
    ]
  },
  {
    "name": "AVG-824",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "70.0.3538.110-1",
    "fixed": "71.0.3578.80-1",
    "ticket": null,
    "issues": [
      "CVE-2018-18359",
      "CVE-2018-18358",
      "CVE-2018-18357",
      "CVE-2018-18356",
      "CVE-2018-18355",
      "CVE-2018-18354",
      "CVE-2018-18353",
      "CVE-2018-18352",
      "CVE-2018-18351",
      "CVE-2018-18350",
      "CVE-2018-18349",
      "CVE-2018-18348",
      "CVE-2018-18347",
      "CVE-2018-18346",
      "CVE-2018-18345",
      "CVE-2018-18344",
      "CVE-2018-18343",
      "CVE-2018-18342",
      "CVE-2018-18341",
      "CVE-2018-18340",
      "CVE-2018-18339",
      "CVE-2018-18338",
      "CVE-2018-18337",
      "CVE-2018-18336",
      "CVE-2018-18335",
      "CVE-2018-17481",
      "CVE-2018-17480"
    ],
    "advisories": [
      "ASA-201812-2",
      "ASA-201812-2"
    ]
  },
  {
    "name": "AVG-803",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "60.2.1-2",
    "fixed": "60.3.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-12392",
      "CVE-2018-12390",
      "CVE-2018-12389"
    ],
    "advisories": [
      "ASA-201811-10"
    ]
  },
  {
    "name": "AVG-794",
    "packages": [
      "gitlab"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "11.4.0-1",
    "fixed": "11.4.3-1",
    "ticket": null,
    "issues": [
      "CVE-2018-18649",
      "CVE-2018-18648",
      "CVE-2018-18646",
      "CVE-2018-18645",
      "CVE-2018-18643",
      "CVE-2018-18641",
      "CVE-2018-18640"
    ],
    "advisories": [
      "ASA-201810-16"
    ]
  },
  {
    "name": "AVG-789",
    "packages": [
      "systemd"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "239.2-1",
    "fixed": "239.300-1",
    "ticket": "60609",
    "issues": [
      "CVE-2018-15688",
      "CVE-2018-15687",
      "CVE-2018-15686"
    ],
    "advisories": [
      "ASA-201811-11"
    ]
  },
  {
    "name": "AVG-787",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "62.0.3-2",
    "fixed": "63.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-12403",
      "CVE-2018-12402",
      "CVE-2018-12401",
      "CVE-2018-12399",
      "CVE-2018-12398",
      "CVE-2018-12397",
      "CVE-2018-12396",
      "CVE-2018-12395",
      "CVE-2018-12392",
      "CVE-2018-12390",
      "CVE-2018-12388"
    ],
    "advisories": [
      "ASA-201810-14"
    ]
  },
  {
    "name": "AVG-782",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "60.0-4",
    "fixed": "60.2.1-1",
    "ticket": "60424",
    "issues": [
      "CVE-2018-12385",
      "CVE-2018-12383",
      "CVE-2018-12379",
      "CVE-2018-12378",
      "CVE-2018-12377",
      "CVE-2018-12376"
    ],
    "advisories": [
      "ASA-201810-13"
    ]
  },
  {
    "name": "AVG-781",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "69.0.3497.100-1",
    "fixed": "70.0.3538.67-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5179",
      "CVE-2018-17477",
      "CVE-2018-17476",
      "CVE-2018-17475",
      "CVE-2018-17474",
      "CVE-2018-17473",
      "CVE-2018-17471",
      "CVE-2018-17470",
      "CVE-2018-17469",
      "CVE-2018-17468",
      "CVE-2018-17467",
      "CVE-2018-17466",
      "CVE-2018-17465",
      "CVE-2018-17464",
      "CVE-2018-17463",
      "CVE-2018-17462"
    ],
    "advisories": [
      "ASA-201810-12",
      "ASA-201810-12"
    ]
  },
  {
    "name": "AVG-780",
    "packages": [
      "libssh"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "authentication bypass",
    "affected": "0.8.3-1",
    "fixed": "0.8.4-1",
    "ticket": null,
    "issues": [
      "CVE-2018-10933"
    ],
    "advisories": [
      "ASA-201810-10"
    ]
  },
  {
    "name": "AVG-775",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "62.0.2-1",
    "fixed": "62.0.3-1",
    "ticket": null,
    "issues": [
      "CVE-2018-12387",
      "CVE-2018-12386"
    ],
    "advisories": [
      "ASA-201810-6"
    ]
  },
  {
    "name": "AVG-751",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "52.9.1-1",
    "fixed": "60.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5187",
      "CVE-2018-5156",
      "CVE-2018-12371",
      "CVE-2018-12367",
      "CVE-2018-12361"
    ],
    "advisories": [
      "ASA-201808-8"
    ]
  },
  {
    "name": "AVG-735",
    "packages": [
      "qutebrowser"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "1.4.0-1",
    "fixed": "1.4.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-10895"
    ],
    "advisories": [
      "ASA-201807-3"
    ]
  },
  {
    "name": "AVG-728",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "52.8.0-1",
    "fixed": "52.9.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5188",
      "CVE-2018-12374",
      "CVE-2018-12373",
      "CVE-2018-12372",
      "CVE-2018-12366",
      "CVE-2018-12365",
      "CVE-2018-12364",
      "CVE-2018-12363",
      "CVE-2018-12362",
      "CVE-2018-12360",
      "CVE-2018-12359"
    ],
    "advisories": [
      "ASA-201807-4"
    ]
  },
  {
    "name": "AVG-727",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "60.0.2-1",
    "fixed": "61.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5188",
      "CVE-2018-5187",
      "CVE-2018-5186",
      "CVE-2018-12371",
      "CVE-2018-12370",
      "CVE-2018-12369",
      "CVE-2018-12367",
      "CVE-2018-12366",
      "CVE-2018-12365",
      "CVE-2018-12364",
      "CVE-2018-12363",
      "CVE-2018-12362",
      "CVE-2018-12361",
      "CVE-2018-12360",
      "CVE-2018-12359",
      "CVE-2018-12358",
      "CVE-2018-12356"
    ],
    "advisories": [
      "ASA-201806-14"
    ]
  },
  {
    "name": "AVG-711",
    "packages": [
      "git"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "2.17.0-1",
    "fixed": "2.17.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-11235",
      "CVE-2018-11233"
    ],
    "advisories": [
      "ASA-201806-1"
    ]
  },
  {
    "name": "AVG-708",
    "packages": [
      "wireshark-cli",
      "wireshark-qt"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "2.6.0-1",
    "fixed": "2.6.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-11362",
      "CVE-2018-11361",
      "CVE-2018-11360",
      "CVE-2018-11359",
      "CVE-2018-11358",
      "CVE-2018-11357",
      "CVE-2018-11356",
      "CVE-2018-11355",
      "CVE-2018-11354"
    ],
    "advisories": [
      "ASA-201805-25",
      "ASA-201805-23"
    ]
  },
  {
    "name": "AVG-707",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "52.7.0-2",
    "fixed": "52.8.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5185",
      "CVE-2018-5184",
      "CVE-2018-5183",
      "CVE-2018-5178",
      "CVE-2018-5170",
      "CVE-2018-5168",
      "CVE-2018-5162",
      "CVE-2018-5161",
      "CVE-2018-5159",
      "CVE-2018-5155",
      "CVE-2018-5154",
      "CVE-2018-5150"
    ],
    "advisories": [
      "ASA-201805-21"
    ]
  },
  {
    "name": "AVG-699",
    "packages": [
      "libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "7.59.0-1",
    "fixed": "7.60.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000301",
      "CVE-2018-1000300"
    ],
    "advisories": [
      "ASA-201805-18"
    ]
  },
  {
    "name": "AVG-698",
    "packages": [
      "libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "7.59.0-1",
    "fixed": "7.60.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000301",
      "CVE-2018-1000300"
    ],
    "advisories": [
      "ASA-201805-17"
    ]
  },
  {
    "name": "AVG-697",
    "packages": [
      "lib32-libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "7.59.0-1",
    "fixed": "7.60.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000301",
      "CVE-2018-1000300"
    ],
    "advisories": [
      "ASA-201805-16"
    ]
  },
  {
    "name": "AVG-696",
    "packages": [
      "lib32-libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "7.59.0-1",
    "fixed": "7.60.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000301",
      "CVE-2018-1000300"
    ],
    "advisories": [
      "ASA-201805-15"
    ]
  },
  {
    "name": "AVG-695",
    "packages": [
      "lib32-curl"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "7.59.0-1",
    "fixed": "7.60.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000301",
      "CVE-2018-1000300"
    ],
    "advisories": [
      "ASA-201805-14"
    ]
  },
  {
    "name": "AVG-694",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "7.59.0-2",
    "fixed": "7.60.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000301",
      "CVE-2018-1000300"
    ],
    "advisories": [
      "ASA-201805-13"
    ]
  },
  {
    "name": "AVG-693",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "59.0.2-3",
    "fixed": "60.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5182",
      "CVE-2018-5181",
      "CVE-2018-5180",
      "CVE-2018-5177",
      "CVE-2018-5176",
      "CVE-2018-5175",
      "CVE-2018-5173",
      "CVE-2018-5172",
      "CVE-2018-5169",
      "CVE-2018-5168",
      "CVE-2018-5167",
      "CVE-2018-5166",
      "CVE-2018-5164",
      "CVE-2018-5163",
      "CVE-2018-5160",
      "CVE-2018-5159",
      "CVE-2018-5158",
      "CVE-2018-5157",
      "CVE-2018-5155",
      "CVE-2018-5154",
      "CVE-2018-5153",
      "CVE-2018-5152",
      "CVE-2018-5151",
      "CVE-2018-5150"
    ],
    "advisories": [
      "ASA-201805-10"
    ]
  },
  {
    "name": "AVG-681",
    "packages": [
      "libraw"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "0.18.9-1",
    "fixed": "0.18.10-1",
    "ticket": "58393",
    "issues": [
      "CVE-2018-10529",
      "CVE-2018-10528"
    ],
    "advisories": [
      "ASA-201805-2"
    ]
  },
  {
    "name": "AVG-680",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "66.0.3359.117-1",
    "fixed": "66.0.3359.139-1",
    "ticket": null,
    "issues": [
      "CVE-2018-6118"
    ],
    "advisories": []
  },
  {
    "name": "AVG-679",
    "packages": [
      "drupal"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary command execution",
    "affected": "8.5.2-1",
    "fixed": "8.5.3-1",
    "ticket": null,
    "issues": [
      "CVE-2018-7602"
    ],
    "advisories": [
      "ASA-201804-10"
    ]
  },
  {
    "name": "AVG-678",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "65.0.3325.181-7",
    "fixed": "66.0.3359.117-1",
    "ticket": null,
    "issues": [
      "CVE-2018-6117",
      "CVE-2018-6116",
      "CVE-2018-6115",
      "CVE-2018-6114",
      "CVE-2018-6113",
      "CVE-2018-6112",
      "CVE-2018-6111",
      "CVE-2018-6110",
      "CVE-2018-6109",
      "CVE-2018-6108",
      "CVE-2018-6107",
      "CVE-2018-6106",
      "CVE-2018-6105",
      "CVE-2018-6104",
      "CVE-2018-6103",
      "CVE-2018-6102",
      "CVE-2018-6101",
      "CVE-2018-6100",
      "CVE-2018-6099",
      "CVE-2018-6098",
      "CVE-2018-6097",
      "CVE-2018-6096",
      "CVE-2018-6095",
      "CVE-2018-6094",
      "CVE-2018-6093",
      "CVE-2018-6092",
      "CVE-2018-6091",
      "CVE-2018-6090",
      "CVE-2018-6089",
      "CVE-2018-6088",
      "CVE-2018-6087",
      "CVE-2018-6086",
      "CVE-2018-6085"
    ],
    "advisories": []
  },
  {
    "name": "AVG-665",
    "packages": [
      "drupal"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "8.5.0-1",
    "fixed": "8.5.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-7600"
    ],
    "advisories": [
      "ASA-201804-1"
    ]
  },
  {
    "name": "AVG-663",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "52.6.0-2",
    "fixed": "52.7.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5146",
      "CVE-2018-5145",
      "CVE-2018-5144",
      "CVE-2018-5129",
      "CVE-2018-5127",
      "CVE-2018-5125"
    ],
    "advisories": [
      "ASA-201803-22"
    ]
  },
  {
    "name": "AVG-659",
    "packages": [
      "firefox"
    ],
    "status": "Not affected",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "59.0-2",
    "fixed": "59.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5147"
    ],
    "advisories": []
  },
  {
    "name": "AVG-658",
    "packages": [
      "lib32-libvorbis"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "1.3.5-1",
    "fixed": "1.3.6-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5146",
      "CVE-2017-14633",
      "CVE-2017-14632"
    ],
    "advisories": [
      "ASA-201803-21"
    ]
  },
  {
    "name": "AVG-657",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "59.0-2",
    "fixed": "59.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5146"
    ],
    "advisories": [
      "ASA-201803-13"
    ]
  },
  {
    "name": "AVG-651",
    "packages": [
      "samba"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "4.7.5-1",
    "fixed": "4.7.6-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1057",
      "CVE-2018-1050"
    ],
    "advisories": [
      "ASA-201803-10"
    ]
  },
  {
    "name": "AVG-604",
    "packages": [
      "libunrar",
      "unrar"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "1:5.5.4-1",
    "fixed": "1:5.5.5-1",
    "ticket": null,
    "issues": [
      "CVE-2012-6706"
    ],
    "advisories": []
  },
  {
    "name": "AVG-603",
    "packages": [
      "libmspack"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "0.5alpha-1",
    "fixed": "1:0.6alpha-1",
    "ticket": null,
    "issues": [
      "CVE-2017-6419",
      "CVE-2017-11423"
    ],
    "advisories": [
      "ASA-201802-9"
    ]
  },
  {
    "name": "AVG-602",
    "packages": [
      "clamav"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "0.99.3-1",
    "fixed": "0.99.4-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000085",
      "CVE-2018-0202",
      "CVE-2017-6419",
      "CVE-2017-11423",
      "CVE-2012-6706"
    ],
    "advisories": [
      "ASA-201803-14"
    ]
  },
  {
    "name": "AVG-601",
    "packages": [
      "clamav"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "0.99.2-1",
    "fixed": "0.99.3-1",
    "ticket": "57233",
    "issues": [
      "CVE-2017-6420",
      "CVE-2017-6418",
      "CVE-2017-12380",
      "CVE-2017-12379",
      "CVE-2017-12378",
      "CVE-2017-12377",
      "CVE-2017-12376",
      "CVE-2017-12375",
      "CVE-2017-12374"
    ],
    "advisories": [
      "ASA-201802-1"
    ]
  },
  {
    "name": "AVG-544",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "62.0.3202.94-2",
    "fixed": "63.0.3239.84-1",
    "ticket": null,
    "issues": [
      "CVE-2017-15427",
      "CVE-2017-15426",
      "CVE-2017-15425",
      "CVE-2017-15424",
      "CVE-2017-15423",
      "CVE-2017-15422",
      "CVE-2017-15420",
      "CVE-2017-15419",
      "CVE-2017-15418",
      "CVE-2017-15417",
      "CVE-2017-15416",
      "CVE-2017-15415",
      "CVE-2017-15413",
      "CVE-2017-15412",
      "CVE-2017-15411",
      "CVE-2017-15410",
      "CVE-2017-15409",
      "CVE-2017-15408",
      "CVE-2017-15407"
    ],
    "advisories": [
      "ASA-201712-5",
      "ASA-201712-5"
    ]
  },
  {
    "name": "AVG-542",
    "packages": [
      "rsync"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "3.1.2-8",
    "fixed": "3.1.3pre1-1",
    "ticket": "57111",
    "issues": [
      "CVE-2018-5764",
      "CVE-2017-17434",
      "CVE-2017-17433",
      "CVE-2017-16548",
      "CVE-2017-15994"
    ],
    "advisories": [
      "ASA-201801-21"
    ]
  },
  {
    "name": "AVG-533",
    "packages": [
      "vlc"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "2.2.6-5",
    "fixed": "2.2.7-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9300",
      "CVE-2017-10699"
    ],
    "advisories": [
      "ASA-201712-4"
    ]
  },
  {
    "name": "AVG-530",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "52.4.0-2",
    "fixed": "52.5.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7830",
      "CVE-2017-7828",
      "CVE-2017-7826"
    ],
    "advisories": [
      "ASA-201711-43"
    ]
  },
  {
    "name": "AVG-518",
    "packages": [
      "exim"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "4.89-1",
    "fixed": "4.89.1-1",
    "ticket": "56478",
    "issues": [
      "CVE-2017-16944",
      "CVE-2017-16943",
      "CVE-2017-10140",
      "CVE-2017-1000369"
    ],
    "advisories": [
      "ASA-201711-32"
    ]
  },
  {
    "name": "AVG-507",
    "packages": [
      "lib32-icu"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "59.1-1",
    "fixed": "60.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-14952"
    ],
    "advisories": [
      "ASA-201711-26"
    ]
  },
  {
    "name": "AVG-505",
    "packages": [
      "krb5"
    ],
    "status": "Not affected",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "1.15.2-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2017-15088"
    ],
    "advisories": []
  },
  {
    "name": "AVG-504",
    "packages": [
      "icu"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "59.1-1",
    "fixed": "60.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-14952"
    ],
    "advisories": [
      "ASA-201711-25"
    ]
  },
  {
    "name": "AVG-494",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "56.0.2-1",
    "fixed": "57.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7842",
      "CVE-2017-7840",
      "CVE-2017-7839",
      "CVE-2017-7838",
      "CVE-2017-7837",
      "CVE-2017-7836",
      "CVE-2017-7835",
      "CVE-2017-7834",
      "CVE-2017-7833",
      "CVE-2017-7832",
      "CVE-2017-7831",
      "CVE-2017-7830",
      "CVE-2017-7828",
      "CVE-2017-7827",
      "CVE-2017-7826"
    ],
    "advisories": [
      "ASA-201711-23"
    ]
  },
  {
    "name": "AVG-491",
    "packages": [
      "mediawiki"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "1.28.2-1",
    "fixed": "1.28.3-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9841"
    ],
    "advisories": []
  },
  {
    "name": "AVG-482",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "62.0.3202.75-1",
    "fixed": "62.0.3202.89-1",
    "ticket": null,
    "issues": [
      "CVE-2017-15399",
      "CVE-2017-15398"
    ],
    "advisories": [
      "ASA-201711-12",
      "ASA-201711-12"
    ]
  },
  {
    "name": "AVG-473",
    "packages": [
      "wget"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "1.19.1-2",
    "fixed": "1.19.2-1",
    "ticket": null,
    "issues": [
      "CVE-2017-6508",
      "CVE-2017-13090",
      "CVE-2017-13089"
    ],
    "advisories": [
      "ASA-201710-34"
    ]
  },
  {
    "name": "AVG-472",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "62.0.3202.62-1",
    "fixed": "62.0.3202.75-1",
    "ticket": null,
    "issues": [
      "CVE-2017-15396"
    ],
    "advisories": [
      "ASA-201710-31",
      "ASA-201710-31"
    ]
  },
  {
    "name": "AVG-457",
    "packages": [
      "musl"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "1.1.16-2",
    "fixed": "1.1.17-1",
    "ticket": null,
    "issues": [
      "CVE-2017-15650"
    ],
    "advisories": [
      "ASA-201710-28"
    ]
  },
  {
    "name": "AVG-456",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "62.0.3202.52-5",
    "fixed": "62.0.3202.62-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5133",
      "CVE-2017-5132",
      "CVE-2017-5131",
      "CVE-2017-5130",
      "CVE-2017-5129",
      "CVE-2017-5128",
      "CVE-2017-5127",
      "CVE-2017-5126",
      "CVE-2017-5125",
      "CVE-2017-5124",
      "CVE-2017-15395",
      "CVE-2017-15394",
      "CVE-2017-15393",
      "CVE-2017-15392",
      "CVE-2017-15391",
      "CVE-2017-15390",
      "CVE-2017-15389",
      "CVE-2017-15388",
      "CVE-2017-15387",
      "CVE-2017-15386"
    ],
    "advisories": [
      "ASA-201710-27",
      "ASA-201710-27"
    ]
  },
  {
    "name": "AVG-441",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "52.3.0-2",
    "fixed": "52.4.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7824",
      "CVE-2017-7823",
      "CVE-2017-7819",
      "CVE-2017-7818",
      "CVE-2017-7814",
      "CVE-2017-7810",
      "CVE-2017-7805",
      "CVE-2017-7793"
    ],
    "advisories": [
      "ASA-201710-19"
    ]
  },
  {
    "name": "AVG-421",
    "packages": [
      "dnsmasq"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "2.77-1",
    "fixed": "2.78-1",
    "ticket": null,
    "issues": [
      "CVE-2017-14496",
      "CVE-2017-14495",
      "CVE-2017-14494",
      "CVE-2017-14493",
      "CVE-2017-14492",
      "CVE-2017-14491"
    ],
    "advisories": [
      "ASA-201710-1"
    ]
  },
  {
    "name": "AVG-411",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "61.0.3163.91-1",
    "fixed": "61.0.3163.100-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5122",
      "CVE-2017-5121"
    ],
    "advisories": [
      "ASA-201709-19",
      "ASA-201709-19"
    ]
  },
  {
    "name": "AVG-391",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "60.0.3112.113-1",
    "fixed": "61.0.3163.79-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5120",
      "CVE-2017-5119",
      "CVE-2017-5118",
      "CVE-2017-5117",
      "CVE-2017-5116",
      "CVE-2017-5115",
      "CVE-2017-5114",
      "CVE-2017-5113",
      "CVE-2017-5112",
      "CVE-2017-5111"
    ],
    "advisories": [
      "ASA-201709-1",
      "ASA-201709-1"
    ]
  },
  {
    "name": "AVG-385",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "52.2.1-1",
    "fixed": "52.3.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7809",
      "CVE-2017-7807",
      "CVE-2017-7803",
      "CVE-2017-7802",
      "CVE-2017-7801",
      "CVE-2017-7800",
      "CVE-2017-7792",
      "CVE-2017-7791",
      "CVE-2017-7787",
      "CVE-2017-7786",
      "CVE-2017-7785",
      "CVE-2017-7784",
      "CVE-2017-7779",
      "CVE-2017-7753"
    ],
    "advisories": [
      "ASA-201708-18"
    ]
  },
  {
    "name": "AVG-379",
    "packages": [
      "subversion"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary command execution",
    "affected": "1.9.6-1",
    "fixed": "1.9.7-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9800"
    ],
    "advisories": [
      "ASA-201708-14"
    ]
  },
  {
    "name": "AVG-378",
    "packages": [
      "mercurial"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "4.2.2-1",
    "fixed": "4.2.3-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000116",
      "CVE-2017-1000115"
    ],
    "advisories": [
      "ASA-201708-7"
    ]
  },
  {
    "name": "AVG-377",
    "packages": [
      "git"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary command execution",
    "affected": "2.14.0-1",
    "fixed": "2.14.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000117"
    ],
    "advisories": [
      "ASA-201708-6"
    ]
  },
  {
    "name": "AVG-376",
    "packages": [
      "libsoup"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "2.58.1-1",
    "fixed": "2.58.2-1",
    "ticket": null,
    "issues": [
      "CVE-2017-2885"
    ],
    "advisories": [
      "ASA-201708-5"
    ]
  },
  {
    "name": "AVG-375",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "54.0.1-1",
    "fixed": "55.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7809",
      "CVE-2017-7808",
      "CVE-2017-7807",
      "CVE-2017-7806",
      "CVE-2017-7803",
      "CVE-2017-7802",
      "CVE-2017-7801",
      "CVE-2017-7800",
      "CVE-2017-7799",
      "CVE-2017-7798",
      "CVE-2017-7797",
      "CVE-2017-7794",
      "CVE-2017-7792",
      "CVE-2017-7791",
      "CVE-2017-7789",
      "CVE-2017-7788",
      "CVE-2017-7787",
      "CVE-2017-7786",
      "CVE-2017-7785",
      "CVE-2017-7784",
      "CVE-2017-7783",
      "CVE-2017-7781",
      "CVE-2017-7780",
      "CVE-2017-7779",
      "CVE-2017-7753"
    ],
    "advisories": [
      "ASA-201708-3"
    ]
  },
  {
    "name": "AVG-369",
    "packages": [
      "lib32-glibc"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "2.25-7",
    "fixed": "2.26-1",
    "ticket": null,
    "issues": [
      "CVE-2017-12133",
      "CVE-2017-12132"
    ],
    "advisories": []
  },
  {
    "name": "AVG-368",
    "packages": [
      "glibc"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "2.25-7",
    "fixed": "2.26-1",
    "ticket": null,
    "issues": [
      "CVE-2017-12133",
      "CVE-2017-12132"
    ],
    "advisories": []
  },
  {
    "name": "AVG-367",
    "packages": [
      "libvorbis"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "1.3.5-1",
    "fixed": "1.3.6-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5146",
      "CVE-2017-14633",
      "CVE-2017-14632",
      "CVE-2017-11333"
    ],
    "advisories": [
      "ASA-201803-12"
    ]
  },
  {
    "name": "AVG-363",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "59.0.3071.115-1",
    "fixed": "60.0.3112.78-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7000",
      "CVE-2017-5110",
      "CVE-2017-5109",
      "CVE-2017-5108",
      "CVE-2017-5107",
      "CVE-2017-5106",
      "CVE-2017-5105",
      "CVE-2017-5104",
      "CVE-2017-5103",
      "CVE-2017-5102",
      "CVE-2017-5101",
      "CVE-2017-5100",
      "CVE-2017-5099",
      "CVE-2017-5098",
      "CVE-2017-5097",
      "CVE-2017-5095",
      "CVE-2017-5094",
      "CVE-2017-5093",
      "CVE-2017-5092",
      "CVE-2017-5091"
    ],
    "advisories": [
      "ASA-201707-29",
      "ASA-201707-29"
    ]
  },
  {
    "name": "AVG-361",
    "packages": [
      "tcpdump"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "4.9.1-1",
    "fixed": "4.9.2-1",
    "ticket": null,
    "issues": [
      "CVE-2017-13725",
      "CVE-2017-13690",
      "CVE-2017-13689",
      "CVE-2017-13688",
      "CVE-2017-13687",
      "CVE-2017-13055",
      "CVE-2017-13054",
      "CVE-2017-13053",
      "CVE-2017-13052",
      "CVE-2017-13051",
      "CVE-2017-13050",
      "CVE-2017-13049",
      "CVE-2017-13048",
      "CVE-2017-13047",
      "CVE-2017-13046",
      "CVE-2017-13045",
      "CVE-2017-13044",
      "CVE-2017-13043",
      "CVE-2017-13042",
      "CVE-2017-13041",
      "CVE-2017-13040",
      "CVE-2017-13039",
      "CVE-2017-13038",
      "CVE-2017-13037",
      "CVE-2017-13036",
      "CVE-2017-13035",
      "CVE-2017-13034",
      "CVE-2017-13033",
      "CVE-2017-13032",
      "CVE-2017-13031",
      "CVE-2017-13030",
      "CVE-2017-13029",
      "CVE-2017-13028",
      "CVE-2017-13027",
      "CVE-2017-13026",
      "CVE-2017-13025",
      "CVE-2017-13024",
      "CVE-2017-13023",
      "CVE-2017-13022",
      "CVE-2017-13021",
      "CVE-2017-13020",
      "CVE-2017-13019",
      "CVE-2017-13018",
      "CVE-2017-13017",
      "CVE-2017-13016",
      "CVE-2017-13015",
      "CVE-2017-13014",
      "CVE-2017-13013",
      "CVE-2017-13012",
      "CVE-2017-13011",
      "CVE-2017-13010",
      "CVE-2017-13009",
      "CVE-2017-13008",
      "CVE-2017-13007",
      "CVE-2017-13006",
      "CVE-2017-13005",
      "CVE-2017-13004",
      "CVE-2017-13003",
      "CVE-2017-13002",
      "CVE-2017-13001",
      "CVE-2017-13000",
      "CVE-2017-12999",
      "CVE-2017-12998",
      "CVE-2017-12997",
      "CVE-2017-12996",
      "CVE-2017-12995",
      "CVE-2017-12994",
      "CVE-2017-12993",
      "CVE-2017-12992",
      "CVE-2017-12991",
      "CVE-2017-12990",
      "CVE-2017-12989",
      "CVE-2017-12988",
      "CVE-2017-12987",
      "CVE-2017-12986",
      "CVE-2017-12985",
      "CVE-2017-12902",
      "CVE-2017-12901",
      "CVE-2017-12900",
      "CVE-2017-12899",
      "CVE-2017-12898",
      "CVE-2017-12897",
      "CVE-2017-12896",
      "CVE-2017-12895",
      "CVE-2017-12894",
      "CVE-2017-12893",
      "CVE-2017-11543",
      "CVE-2017-11542",
      "CVE-2017-11541"
    ],
    "advisories": [
      "ASA-201709-5"
    ]
  },
  {
    "name": "AVG-357",
    "packages": [
      "freeradius"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "3.0.14-4",
    "fixed": "3.0.15-1",
    "ticket": null,
    "issues": [
      "CVE-2017-10987",
      "CVE-2017-10986",
      "CVE-2017-10985",
      "CVE-2017-10984",
      "CVE-2017-10983",
      "CVE-2017-10978"
    ],
    "advisories": [
      "ASA-201707-23"
    ]
  },
  {
    "name": "AVG-350",
    "packages": [
      "apache"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "2.4.26-3",
    "fixed": "2.4.27-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9789",
      "CVE-2017-9788"
    ],
    "advisories": [
      "ASA-201707-15"
    ]
  },
  {
    "name": "AVG-348",
    "packages": [
      "evince"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary command execution",
    "affected": "3.24.0+8+ga8363215-1",
    "fixed": "3.24.0+12+g717df38f-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000083"
    ],
    "advisories": [
      "ASA-201707-14"
    ]
  },
  {
    "name": "AVG-342",
    "packages": [
      "irssi"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "1.0.3-1",
    "fixed": "1.0.4-1",
    "ticket": null,
    "issues": [
      "CVE-2017-10966",
      "CVE-2017-10965"
    ],
    "advisories": [
      "ASA-201707-13"
    ]
  },
  {
    "name": "AVG-329",
    "packages": [
      "systemd"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "232-8",
    "fixed": "233-6",
    "ticket": "54619",
    "issues": [
      "CVE-2017-9445"
    ],
    "advisories": [
      "ASA-201707-2"
    ]
  },
  {
    "name": "AVG-318",
    "packages": [
      "openvpn"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "2.4.2-1",
    "fixed": "2.4.3-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7521",
      "CVE-2017-7520",
      "CVE-2017-7512",
      "CVE-2017-7508"
    ],
    "advisories": [
      "ASA-201706-27"
    ]
  },
  {
    "name": "AVG-303",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "52.1.1-1",
    "fixed": "52.2.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7778",
      "CVE-2017-7777",
      "CVE-2017-7776",
      "CVE-2017-7775",
      "CVE-2017-7774",
      "CVE-2017-7773",
      "CVE-2017-7772",
      "CVE-2017-7771",
      "CVE-2017-7764",
      "CVE-2017-7758",
      "CVE-2017-7757",
      "CVE-2017-7756",
      "CVE-2017-7754",
      "CVE-2017-7752",
      "CVE-2017-7751",
      "CVE-2017-7750",
      "CVE-2017-7749",
      "CVE-2017-5472",
      "CVE-2017-5470"
    ],
    "advisories": [
      "ASA-201706-20"
    ]
  },
  {
    "name": "AVG-302",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "53.0.3-1",
    "fixed": "54.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7778",
      "CVE-2017-7777",
      "CVE-2017-7776",
      "CVE-2017-7775",
      "CVE-2017-7774",
      "CVE-2017-7773",
      "CVE-2017-7772",
      "CVE-2017-7771",
      "CVE-2017-7764",
      "CVE-2017-7762",
      "CVE-2017-7758",
      "CVE-2017-7757",
      "CVE-2017-7756",
      "CVE-2017-7754",
      "CVE-2017-7752",
      "CVE-2017-7751",
      "CVE-2017-7750",
      "CVE-2017-7749",
      "CVE-2017-5472",
      "CVE-2017-5471",
      "CVE-2017-5470"
    ],
    "advisories": [
      "ASA-201706-19"
    ]
  },
  {
    "name": "AVG-289",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "58.0.3029.110-1",
    "fixed": "59.0.3071.86-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5086",
      "CVE-2017-5085",
      "CVE-2017-5083",
      "CVE-2017-5082",
      "CVE-2017-5081",
      "CVE-2017-5080",
      "CVE-2017-5079",
      "CVE-2017-5078",
      "CVE-2017-5077",
      "CVE-2017-5076",
      "CVE-2017-5075",
      "CVE-2017-5074",
      "CVE-2017-5073",
      "CVE-2017-5072",
      "CVE-2017-5071",
      "CVE-2017-5070"
    ],
    "advisories": [
      "ASA-201706-8",
      "ASA-201706-8"
    ]
  },
  {
    "name": "AVG-250",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "57.0.2987.133-1",
    "fixed": "58.0.3029.81-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5069",
      "CVE-2017-5067",
      "CVE-2017-5066",
      "CVE-2017-5065",
      "CVE-2017-5064",
      "CVE-2017-5063",
      "CVE-2017-5062",
      "CVE-2017-5061",
      "CVE-2017-5060",
      "CVE-2017-5059",
      "CVE-2017-5058",
      "CVE-2017-5057"
    ],
    "advisories": [
      "ASA-201704-5",
      "ASA-201704-5"
    ]
  },
  {
    "name": "AVG-249",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "52.0.2-1",
    "fixed": "53.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5469",
      "CVE-2017-5468",
      "CVE-2017-5467",
      "CVE-2017-5466",
      "CVE-2017-5465",
      "CVE-2017-5464",
      "CVE-2017-5461",
      "CVE-2017-5460",
      "CVE-2017-5459",
      "CVE-2017-5458",
      "CVE-2017-5456",
      "CVE-2017-5455",
      "CVE-2017-5454",
      "CVE-2017-5453",
      "CVE-2017-5451",
      "CVE-2017-5449",
      "CVE-2017-5448",
      "CVE-2017-5447",
      "CVE-2017-5446",
      "CVE-2017-5445",
      "CVE-2017-5444",
      "CVE-2017-5443",
      "CVE-2017-5442",
      "CVE-2017-5441",
      "CVE-2017-5440",
      "CVE-2017-5439",
      "CVE-2017-5438",
      "CVE-2017-5437",
      "CVE-2017-5436",
      "CVE-2017-5435",
      "CVE-2017-5434",
      "CVE-2017-5433",
      "CVE-2017-5432",
      "CVE-2017-5430",
      "CVE-2017-5429"
    ],
    "advisories": [
      "ASA-201704-6"
    ]
  },
  {
    "name": "AVG-248",
    "packages": [
      "lib32-nss"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "3.27.1-1",
    "fixed": "3.30.2-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5461"
    ],
    "advisories": [
      "ASA-201705-21"
    ]
  },
  {
    "name": "AVG-247",
    "packages": [
      "nss"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "3.30-1",
    "fixed": "3.30.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5461"
    ],
    "advisories": [
      "ASA-201704-4"
    ]
  },
  {
    "name": "AVG-240",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "4.4.5-1",
    "fixed": "4.5-1",
    "ticket": null,
    "issues": [
      "CVE-2016-10229"
    ],
    "advisories": []
  },
  {
    "name": "AVG-231",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "57.0.2987.110-1",
    "fixed": "57.0.2987.133-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5056",
      "CVE-2017-5055",
      "CVE-2017-5054",
      "CVE-2017-5053",
      "CVE-2017-5052"
    ],
    "advisories": [
      "ASA-201703-19",
      "ASA-201703-19"
    ]
  },
  {
    "name": "AVG-198",
    "packages": [
      "mbedtls"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "2.4.0-1",
    "fixed": "2.4.2-1",
    "ticket": null,
    "issues": [
      "CVE-2017-2784"
    ],
    "advisories": [
      "ASA-201703-16"
    ]
  },
  {
    "name": "AVG-197",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "56.0.2924.87-1",
    "fixed": "57.0.2987.98-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5046",
      "CVE-2017-5045",
      "CVE-2017-5044",
      "CVE-2017-5043",
      "CVE-2017-5042",
      "CVE-2017-5041",
      "CVE-2017-5040",
      "CVE-2017-5039",
      "CVE-2017-5038",
      "CVE-2017-5037",
      "CVE-2017-5036",
      "CVE-2017-5035",
      "CVE-2017-5034",
      "CVE-2017-5033",
      "CVE-2017-5032",
      "CVE-2017-5031",
      "CVE-2017-5030",
      "CVE-2017-5029"
    ],
    "advisories": [
      "ASA-201703-4",
      "ASA-201703-4"
    ]
  },
  {
    "name": "AVG-196",
    "packages": [
      "lib32-libxslt"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "1.1.29-1",
    "fixed": "1.1.29+42+gac341cbd-1",
    "ticket": "53270",
    "issues": [
      "CVE-2017-5029"
    ],
    "advisories": []
  },
  {
    "name": "AVG-195",
    "packages": [
      "libxslt"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "1.1.29+23+geb1030d-1",
    "fixed": "1.1.29+41+gdf5330d1-1",
    "ticket": "53257",
    "issues": [
      "CVE-2017-5029"
    ],
    "advisories": [
      "ASA-201703-5"
    ]
  },
  {
    "name": "AVG-194",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "51.0.1-1",
    "fixed": "52.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5427",
      "CVE-2017-5426",
      "CVE-2017-5422",
      "CVE-2017-5421",
      "CVE-2017-5420",
      "CVE-2017-5419",
      "CVE-2017-5418",
      "CVE-2017-5417",
      "CVE-2017-5416",
      "CVE-2017-5415",
      "CVE-2017-5414",
      "CVE-2017-5413",
      "CVE-2017-5412",
      "CVE-2017-5410",
      "CVE-2017-5408",
      "CVE-2017-5407",
      "CVE-2017-5406",
      "CVE-2017-5405",
      "CVE-2017-5404",
      "CVE-2017-5403",
      "CVE-2017-5402",
      "CVE-2017-5401",
      "CVE-2017-5400",
      "CVE-2017-5399",
      "CVE-2017-5398"
    ],
    "advisories": [
      "ASA-201703-3"
    ]
  },
  {
    "name": "AVG-193",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "45.7.1-3",
    "fixed": "45.8.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5410",
      "CVE-2017-5408",
      "CVE-2017-5407",
      "CVE-2017-5405",
      "CVE-2017-5404",
      "CVE-2017-5402",
      "CVE-2017-5401",
      "CVE-2017-5400",
      "CVE-2017-5398"
    ],
    "advisories": [
      "ASA-201703-2"
    ]
  },
  {
    "name": "AVG-172",
    "packages": [
      "ffmpeg"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "1:3.2.3-1",
    "fixed": "1:3.2.4-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5025",
      "CVE-2017-5024"
    ],
    "advisories": [
      "ASA-201702-10"
    ]
  },
  {
    "name": "AVG-165",
    "packages": [
      "gst-plugins-bad"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "1.10.2-1",
    "fixed": "1.10.3-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5848",
      "CVE-2017-5843"
    ],
    "advisories": [
      "ASA-201702-5"
    ]
  },
  {
    "name": "AVG-164",
    "packages": [
      "gst-plugins-base-libs"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "1.10.2-1",
    "fixed": "1.10.3-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5844",
      "CVE-2017-5842",
      "CVE-2017-5839",
      "CVE-2017-5837"
    ],
    "advisories": [
      "ASA-201702-4"
    ]
  },
  {
    "name": "AVG-161",
    "packages": [
      "tcpdump"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "4.8.1-1",
    "fixed": "4.9.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5486",
      "CVE-2017-5485",
      "CVE-2017-5484",
      "CVE-2017-5483",
      "CVE-2017-5482",
      "CVE-2017-5342",
      "CVE-2017-5341",
      "CVE-2017-5205",
      "CVE-2017-5204",
      "CVE-2017-5203",
      "CVE-2017-5202",
      "CVE-2016-8575",
      "CVE-2016-8574",
      "CVE-2016-7993",
      "CVE-2016-7992",
      "CVE-2016-7986",
      "CVE-2016-7985",
      "CVE-2016-7984",
      "CVE-2016-7983",
      "CVE-2016-7975",
      "CVE-2016-7974",
      "CVE-2016-7973",
      "CVE-2016-7940",
      "CVE-2016-7939",
      "CVE-2016-7938",
      "CVE-2016-7937",
      "CVE-2016-7936",
      "CVE-2016-7935",
      "CVE-2016-7934",
      "CVE-2016-7933",
      "CVE-2016-7932",
      "CVE-2016-7931",
      "CVE-2016-7930",
      "CVE-2016-7929",
      "CVE-2016-7928",
      "CVE-2016-7927",
      "CVE-2016-7926",
      "CVE-2016-7925",
      "CVE-2016-7924",
      "CVE-2016-7923",
      "CVE-2016-7922"
    ],
    "advisories": [
      "ASA-201702-1"
    ]
  },
  {
    "name": "AVG-158",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "45.6.0-1",
    "fixed": "45.7.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5396",
      "CVE-2017-5390",
      "CVE-2017-5383",
      "CVE-2017-5380",
      "CVE-2017-5378",
      "CVE-2017-5376",
      "CVE-2017-5375",
      "CVE-2017-5373"
    ],
    "advisories": [
      "ASA-201701-40"
    ]
  },
  {
    "name": "AVG-157",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "50.1.0-1",
    "fixed": "51.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5396",
      "CVE-2017-5393",
      "CVE-2017-5391",
      "CVE-2017-5390",
      "CVE-2017-5389",
      "CVE-2017-5388",
      "CVE-2017-5387",
      "CVE-2017-5386",
      "CVE-2017-5385",
      "CVE-2017-5384",
      "CVE-2017-5383",
      "CVE-2017-5382",
      "CVE-2017-5381",
      "CVE-2017-5380",
      "CVE-2017-5379",
      "CVE-2017-5378",
      "CVE-2017-5377",
      "CVE-2017-5376",
      "CVE-2017-5375",
      "CVE-2017-5374",
      "CVE-2017-5373"
    ],
    "advisories": [
      "ASA-201701-39"
    ]
  },
  {
    "name": "AVG-156",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "55.0.2883.87-1",
    "fixed": "56.0.2924.76-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5026",
      "CVE-2017-5025",
      "CVE-2017-5024",
      "CVE-2017-5023",
      "CVE-2017-5022",
      "CVE-2017-5021",
      "CVE-2017-5020",
      "CVE-2017-5019",
      "CVE-2017-5018",
      "CVE-2017-5017",
      "CVE-2017-5016",
      "CVE-2017-5015",
      "CVE-2017-5014",
      "CVE-2017-5013",
      "CVE-2017-5012",
      "CVE-2017-5011",
      "CVE-2017-5010",
      "CVE-2017-5009",
      "CVE-2017-5008",
      "CVE-2017-5007",
      "CVE-2017-5006"
    ],
    "advisories": [
      "ASA-201701-33",
      "ASA-201701-33"
    ]
  },
  {
    "name": "AVG-124",
    "packages": [
      "libvncserver"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "0.9.10-4",
    "fixed": "0.9.11-1",
    "ticket": "52481",
    "issues": [
      "CVE-2016-9942",
      "CVE-2016-9941"
    ],
    "advisories": [
      "ASA-201701-20"
    ]
  },
  {
    "name": "AVG-111",
    "packages": [
      "samba"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "4.5.2-1",
    "fixed": "4.5.3-1",
    "ticket": "52219",
    "issues": [
      "CVE-2016-2126",
      "CVE-2016-2125",
      "CVE-2016-2123"
    ],
    "advisories": [
      "ASA-201612-19"
    ]
  },
  {
    "name": "AVG-106",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "50.0.2-1",
    "fixed": "50.1.0-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9904",
      "CVE-2016-9903",
      "CVE-2016-9902",
      "CVE-2016-9901",
      "CVE-2016-9900",
      "CVE-2016-9899",
      "CVE-2016-9898",
      "CVE-2016-9897",
      "CVE-2016-9896",
      "CVE-2016-9895",
      "CVE-2016-9894",
      "CVE-2016-9893",
      "CVE-2016-9080"
    ],
    "advisories": [
      "ASA-201612-15"
    ]
  },
  {
    "name": "AVG-99",
    "packages": [
      "jasper"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "1.900.1-15",
    "fixed": "1.900.5-1",
    "ticket": null,
    "issues": [
      "CVE-2016-1867",
      "CVE-2015-5221",
      "CVE-2014-9029",
      "CVE-2014-8158",
      "CVE-2014-8157",
      "CVE-2014-8138",
      "CVE-2014-8137",
      "CVE-2011-4517",
      "CVE-2011-4516",
      "CVE-2008-3522",
      "CVE-2008-3520"
    ],
    "advisories": []
  },
  {
    "name": "AVG-93",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "54.0.2840.100-1",
    "fixed": "55.0.2883.75-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9652",
      "CVE-2016-9651",
      "CVE-2016-9650",
      "CVE-2016-5226",
      "CVE-2016-5225",
      "CVE-2016-5224",
      "CVE-2016-5223",
      "CVE-2016-5222",
      "CVE-2016-5221",
      "CVE-2016-5220",
      "CVE-2016-5219",
      "CVE-2016-5218",
      "CVE-2016-5217",
      "CVE-2016-5216",
      "CVE-2016-5215",
      "CVE-2016-5214",
      "CVE-2016-5213",
      "CVE-2016-5212",
      "CVE-2016-5211",
      "CVE-2016-5210",
      "CVE-2016-5209",
      "CVE-2016-5208",
      "CVE-2016-5207",
      "CVE-2016-5206",
      "CVE-2016-5205",
      "CVE-2016-5204",
      "CVE-2016-5203"
    ],
    "advisories": [
      "ASA-201612-3",
      "ASA-201612-3"
    ]
  },
  {
    "name": "AVG-91",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "45.5.0-1",
    "fixed": "45.5.1-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9079"
    ],
    "advisories": [
      "ASA-201612-2"
    ]
  },
  {
    "name": "AVG-90",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "50.0-1",
    "fixed": "50.0.2-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9079",
      "CVE-2016-9078"
    ],
    "advisories": [
      "ASA-201612-1"
    ]
  },
  {
    "name": "AVG-87",
    "packages": [
      "lib32-libtiff"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "4.0.7-1",
    "fixed": "4.0.8-1",
    "ticket": "54842",
    "issues": [
      "CVE-2016-10095",
      "CVE-2015-7554"
    ],
    "advisories": [
      "ASA-201707-18"
    ]
  },
  {
    "name": "AVG-86",
    "packages": [
      "lib32-libtiff"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "4.0.6-2",
    "fixed": "4.0.7-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9540",
      "CVE-2016-9539",
      "CVE-2016-9538",
      "CVE-2016-9537",
      "CVE-2016-9536",
      "CVE-2016-9535",
      "CVE-2016-9534",
      "CVE-2016-9533",
      "CVE-2016-9532",
      "CVE-2016-9453",
      "CVE-2016-9448",
      "CVE-2016-9297",
      "CVE-2016-9273",
      "CVE-2016-6223",
      "CVE-2016-5875",
      "CVE-2016-5652",
      "CVE-2016-5323",
      "CVE-2016-5322",
      "CVE-2016-5321",
      "CVE-2016-5320",
      "CVE-2016-5319",
      "CVE-2016-5318",
      "CVE-2016-5317",
      "CVE-2016-5316",
      "CVE-2016-5315",
      "CVE-2016-5314",
      "CVE-2016-5102",
      "CVE-2016-3991",
      "CVE-2016-3990",
      "CVE-2016-3945",
      "CVE-2016-3658",
      "CVE-2016-3634",
      "CVE-2016-3633",
      "CVE-2016-3632",
      "CVE-2016-3631",
      "CVE-2016-3625",
      "CVE-2016-3624",
      "CVE-2016-3623",
      "CVE-2016-3622",
      "CVE-2016-3621",
      "CVE-2016-3620",
      "CVE-2016-3619",
      "CVE-2016-3186",
      "CVE-2015-8683",
      "CVE-2015-8668",
      "CVE-2015-8665",
      "CVE-2015-7313",
      "CVE-2014-8130",
      "CVE-2014-8127",
      "CVE-2010-2596"
    ],
    "advisories": [
      "ASA-201611-27"
    ]
  },
  {
    "name": "AVG-85",
    "packages": [
      "libtiff"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "4.0.6-2",
    "fixed": "4.0.7-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9540",
      "CVE-2016-9539",
      "CVE-2016-9538",
      "CVE-2016-9537",
      "CVE-2016-9536",
      "CVE-2016-9535",
      "CVE-2016-9534",
      "CVE-2016-9533",
      "CVE-2016-9532",
      "CVE-2016-9453",
      "CVE-2016-9448",
      "CVE-2016-9297",
      "CVE-2016-9273",
      "CVE-2016-6223",
      "CVE-2016-5875",
      "CVE-2016-5652",
      "CVE-2016-5323",
      "CVE-2016-5322",
      "CVE-2016-5321",
      "CVE-2016-5320",
      "CVE-2016-5319",
      "CVE-2016-5318",
      "CVE-2016-5317",
      "CVE-2016-5316",
      "CVE-2016-5315",
      "CVE-2016-5314",
      "CVE-2016-5102",
      "CVE-2016-3991",
      "CVE-2016-3990",
      "CVE-2016-3945",
      "CVE-2016-3658",
      "CVE-2016-3634",
      "CVE-2016-3633",
      "CVE-2016-3632",
      "CVE-2016-3631",
      "CVE-2016-3625",
      "CVE-2016-3624",
      "CVE-2016-3623",
      "CVE-2016-3622",
      "CVE-2016-3621",
      "CVE-2016-3620",
      "CVE-2016-3619",
      "CVE-2016-3186",
      "CVE-2015-8683",
      "CVE-2015-8668",
      "CVE-2015-8665",
      "CVE-2015-7313",
      "CVE-2014-8130",
      "CVE-2014-8127",
      "CVE-2010-2596"
    ],
    "advisories": [
      "ASA-201611-26"
    ]
  },
  {
    "name": "AVG-73",
    "packages": [
      "w3m"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "0.5.3.git20160413-1",
    "fixed": "0.5.3.git20161031-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9442",
      "CVE-2016-9441",
      "CVE-2016-9440",
      "CVE-2016-9439",
      "CVE-2016-9438",
      "CVE-2016-9437",
      "CVE-2016-9436",
      "CVE-2016-9435",
      "CVE-2016-9434",
      "CVE-2016-9433",
      "CVE-2016-9432",
      "CVE-2016-9431",
      "CVE-2016-9430",
      "CVE-2016-9429",
      "CVE-2016-9428",
      "CVE-2016-9426",
      "CVE-2016-9425",
      "CVE-2016-9424",
      "CVE-2016-9423",
      "CVE-2016-9422"
    ],
    "advisories": [
      "ASA-201611-18"
    ]
  },
  {
    "name": "AVG-72",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "49.0.2-1",
    "fixed": "50.0-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9077",
      "CVE-2016-9076",
      "CVE-2016-9075",
      "CVE-2016-9073",
      "CVE-2016-9071",
      "CVE-2016-9070",
      "CVE-2016-9068",
      "CVE-2016-9067",
      "CVE-2016-9066",
      "CVE-2016-9064",
      "CVE-2016-9063",
      "CVE-2016-5297",
      "CVE-2016-5296",
      "CVE-2016-5292",
      "CVE-2016-5291",
      "CVE-2016-5290",
      "CVE-2016-5289"
    ],
    "advisories": [
      "ASA-201611-16"
    ]
  },
  {
    "name": "AVG-56",
    "packages": [
      "libxml2"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "2.9.4+4+g3169602-1",
    "fixed": "2.9.4+12+ge905f08-1",
    "ticket": null,
    "issues": [
      "CVE-2016-5131",
      "CVE-2016-4658"
    ],
    "advisories": [
      "ASA-201611-2"
    ]
  },
  {
    "name": "AVG-55",
    "packages": [
      "memcached"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "1.4.31-1",
    "fixed": "1.4.32-1",
    "ticket": null,
    "issues": [
      "CVE-2016-8706",
      "CVE-2016-8705",
      "CVE-2016-8704"
    ],
    "advisories": [
      "ASA-201611-1"
    ]
  },
  {
    "name": "AVG-46",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "53.0.2785.143-1",
    "fixed": "54.0.2840.59-1",
    "ticket": null,
    "issues": [
      "CVE-2016-5194",
      "CVE-2016-5193",
      "CVE-2016-5192",
      "CVE-2016-5191",
      "CVE-2016-5190",
      "CVE-2016-5189",
      "CVE-2016-5188",
      "CVE-2016-5187",
      "CVE-2016-5186",
      "CVE-2016-5185",
      "CVE-2016-5184",
      "CVE-2016-5183",
      "CVE-2016-5182",
      "CVE-2016-5181"
    ],
    "advisories": [
      "ASA-201610-15",
      "ASA-201610-15"
    ]
  },
  {
    "name": "AVG-42",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "53.0.2785.116-1",
    "fixed": "53.0.2785.143-1",
    "ticket": null,
    "issues": [
      "CVE-2016-5178",
      "CVE-2016-5177"
    ],
    "advisories": [
      "ASA-201610-1",
      "ASA-201610-1"
    ]
  },
  {
    "name": "AVG-32",
    "packages": [
      "lib32-openssl"
    ],
    "status": "Not affected",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "1:1.1.0a-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2016-6309"
    ],
    "advisories": []
  },
  {
    "name": "AVG-31",
    "packages": [
      "openssl"
    ],
    "status": "Not affected",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "1.1.0a-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2016-6309"
    ],
    "advisories": []
  },
  {
    "name": "AVG-24",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "48.0.2-1",
    "fixed": "49.0-1",
    "ticket": null,
    "issues": [
      "CVE-2016-5284",
      "CVE-2016-5283",
      "CVE-2016-5282",
      "CVE-2016-5281",
      "CVE-2016-5280",
      "CVE-2016-5279",
      "CVE-2016-5278",
      "CVE-2016-5277",
      "CVE-2016-5276",
      "CVE-2016-5275",
      "CVE-2016-5274",
      "CVE-2016-5273",
      "CVE-2016-5272",
      "CVE-2016-5271",
      "CVE-2016-5270",
      "CVE-2016-5257",
      "CVE-2016-5256"
    ],
    "advisories": [
      "ASA-201609-22"
    ]
  },
  {
    "name": "AVG-1",
    "packages": [
      "lib32-gdk-pixbuf2"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "2.34.0-1",
    "fixed": "2.36.0+2+ga7c869a-1",
    "ticket": null,
    "issues": [
      "CVE-2016-6352"
    ],
    "advisories": [
      "ASA-201611-12"
    ]
  },
  {
    "name": "AVG-2",
    "packages": [
      "gdk-pixbuf2"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "2.34.0-2",
    "fixed": "2.36.0+2+ga7c869a-1",
    "ticket": null,
    "issues": [
      "CVE-2016-6352"
    ],
    "advisories": [
      "ASA-201610-9"
    ]
  },
  {
    "name": "AVG-5",
    "packages": [
      "libtiff"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "arbitrary code execution",
    "affected": "4.0.8-1",
    "fixed": "4.0.8-2",
    "ticket": "54842",
    "issues": [
      "CVE-2016-10095",
      "CVE-2015-7554"
    ],
    "advisories": [
      "ASA-201707-17"
    ]
  },
  {
    "name": "AVG-14",
    "packages": [
      "jasper"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "1.900.1-15",
    "fixed": "1.900.31-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9560",
      "CVE-2016-9557",
      "CVE-2016-9388",
      "CVE-2016-9387",
      "CVE-2016-9262",
      "CVE-2016-8887",
      "CVE-2016-8885",
      "CVE-2016-8884",
      "CVE-2016-8693",
      "CVE-2016-8692",
      "CVE-2016-8691",
      "CVE-2016-8690",
      "CVE-2016-2089",
      "CVE-2015-8751",
      "CVE-2015-5203"
    ],
    "advisories": [
      "ASA-201612-9"
    ]
  },
  {
    "name": "AVG-16",
    "packages": [
      "libwmf"
    ],
    "status": "Fixed",
    "severity": "Critical",
    "type": "multiple issues",
    "affected": "0.2.8.4-13",
    "fixed": "0.2.8.4-14",
    "ticket": "49162",
    "issues": [
      "CVE-2016-9011",
      "CVE-2015-4696",
      "CVE-2015-4695",
      "CVE-2015-4588",
      "CVE-2015-0848",
      "CVE-2009-3546",
      "CVE-2009-1364",
      "CVE-2007-3477",
      "CVE-2007-3473",
      "CVE-2007-3472",
      "CVE-2007-2756",
      "CVE-2007-0455",
      "CVE-2006-3376"
    ],
    "advisories": [
      "ASA-201701-1"
    ]
  },
  {
    "name": "AVG-2906",
    "packages": [
      "python-pillow"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "11.2.0-1",
    "fixed": "11.3.0-1",
    "ticket": null,
    "issues": [
      "CVE-2025-48379"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2905",
    "packages": [
      "libblockdev"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "3.3.0-1",
    "fixed": "3.3.1-1",
    "ticket": null,
    "issues": [
      "CVE-2025-6019"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2899",
    "packages": [
      "libxml2"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "2.14.3-1",
    "fixed": "2.14.4-1",
    "ticket": null,
    "issues": [
      "CVE-2025-6021"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2897",
    "packages": [
      "konsole"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "25.04.1-1",
    "fixed": "25.04.2-1",
    "ticket": null,
    "issues": [
      "CVE-2025-49091"
    ],
    "advisories": [
      "ASA-202506-5"
    ]
  },
  {
    "name": "AVG-2881",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "9.20.8-2",
    "fixed": "9.20.9-1",
    "ticket": null,
    "issues": [
      "CVE-2025-40775"
    ],
    "advisories": [
      "ASA-202505-14"
    ]
  },
  {
    "name": "AVG-2879",
    "packages": [
      "varnish"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "content spoofing",
    "affected": "7.7.0-1",
    "fixed": "7.7.1-1",
    "ticket": null,
    "issues": [
      "CVE-2025-47905"
    ],
    "advisories": [
      "ASA-202505-13"
    ]
  },
  {
    "name": "AVG-2877",
    "packages": [
      "freetype2"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.13.0-1",
    "fixed": "2.13.3-3",
    "ticket": null,
    "issues": [
      "CVE-2025-27363"
    ],
    "advisories": [
      "ASA-202505-11"
    ]
  },
  {
    "name": "AVG-2873",
    "packages": [
      "nodejs-lts-iron"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "20.19.1-1",
    "fixed": "20.19.2-1",
    "ticket": null,
    "issues": [
      "CVE-2025-23167",
      "CVE-2025-23166",
      "CVE-2025-23165"
    ],
    "advisories": [
      "ASA-202505-8"
    ]
  },
  {
    "name": "AVG-2872",
    "packages": [
      "nodejs-lts-jod"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "22.14.0-2",
    "fixed": "22.15.1-1",
    "ticket": null,
    "issues": [
      "CVE-2025-23166",
      "CVE-2025-23165"
    ],
    "advisories": [
      "ASA-202505-7"
    ]
  },
  {
    "name": "AVG-2871",
    "packages": [
      "nodejs"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "23.9.0-1",
    "fixed": "23.11.1-1",
    "ticket": null,
    "issues": [
      "CVE-2025-23166"
    ],
    "advisories": [
      "ASA-202505-6"
    ]
  },
  {
    "name": "AVG-2870",
    "packages": [
      "wpewebkit"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.42.0-1",
    "fixed": "2.48.2-1",
    "ticket": null,
    "issues": [
      "CVE-2023-42970",
      "CVE-2023-42875"
    ],
    "advisories": [
      "ASA-202505-2"
    ]
  },
  {
    "name": "AVG-2868",
    "packages": [
      "webkit2gtk-4.1"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.42.0-1",
    "fixed": "2.48.2-1",
    "ticket": null,
    "issues": [
      "CVE-2023-42970",
      "CVE-2023-42875"
    ],
    "advisories": [
      "ASA-202505-4"
    ]
  },
  {
    "name": "AVG-2867",
    "packages": [
      "webkitgtk-6.0"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.42.0-1",
    "fixed": "2.48.2-1",
    "ticket": null,
    "issues": [
      "CVE-2023-42970",
      "CVE-2023-42875"
    ],
    "advisories": [
      "ASA-202505-5"
    ]
  },
  {
    "name": "AVG-2865",
    "packages": [
      "webkit2gtk-4.1"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.48.2-1",
    "fixed": "2.49.1-1",
    "ticket": null,
    "issues": [
      "CVE-2025-31257",
      "CVE-2025-31215",
      "CVE-2025-31206",
      "CVE-2025-31205",
      "CVE-2025-31204",
      "CVE-2025-24223"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2866",
    "packages": [
      "webkitgtk-6.0"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.48.2-1",
    "fixed": "2.49.1-1",
    "ticket": null,
    "issues": [
      "CVE-2025-31257",
      "CVE-2025-31215",
      "CVE-2025-31206",
      "CVE-2025-31205",
      "CVE-2025-31204",
      "CVE-2025-24223"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2863",
    "packages": [
      "wpewebkit"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.48.2-1",
    "fixed": "2.49.1-1",
    "ticket": null,
    "issues": [
      "CVE-2025-31257",
      "CVE-2025-31215",
      "CVE-2025-31206",
      "CVE-2025-31205",
      "CVE-2025-31204",
      "CVE-2025-24223"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2862",
    "packages": [
      "screen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.0.0-2",
    "fixed": "5.0.0-3",
    "ticket": null,
    "issues": [
      "CVE-2025-46805",
      "CVE-2025-46804",
      "CVE-2025-46803",
      "CVE-2025-46802",
      "CVE-2025-23395"
    ],
    "advisories": [
      "ASA-202505-1"
    ]
  },
  {
    "name": "AVG-2859",
    "packages": [
      "exim"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.98.1-1",
    "fixed": "4.98.2-1",
    "ticket": null,
    "issues": [
      "CVE-2025-30232"
    ],
    "advisories": [
      "ASA-202503-1"
    ]
  },
  {
    "name": "AVG-2857",
    "packages": [
      "oath-toolkit"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "2.6.11-1",
    "fixed": "2.6.12-1",
    "ticket": null,
    "issues": [
      "CVE-2024-47191"
    ],
    "advisories": [
      "ASA-202410-1"
    ]
  },
  {
    "name": "AVG-2855",
    "packages": [
      "openssh"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "authentication bypass",
    "affected": "9.7p1-2",
    "fixed": "9.8p1-1",
    "ticket": null,
    "issues": [
      "CVE-2024-6387"
    ],
    "advisories": [
      "ASA-202407-1"
    ]
  },
  {
    "name": "AVG-2852",
    "packages": [
      "nodejs"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "21.7.1-1",
    "fixed": "21.7.2-1",
    "ticket": null,
    "issues": [
      "CVE-2024-27983",
      "CVE-2024-27982"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2853",
    "packages": [
      "nodejs-lts-iron"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "20.11.1-1",
    "fixed": "20.12.1-1",
    "ticket": null,
    "issues": [
      "CVE-2024-27983",
      "CVE-2024-27982"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2837",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "6.0.12-1",
    "fixed": "6.2-1",
    "ticket": null,
    "issues": [
      "CVE-2023-25012",
      "CVE-2023-23454",
      "CVE-2023-0394",
      "CVE-2023-0266",
      "CVE-2023-0122",
      "CVE-2022-47946",
      "CVE-2022-47943",
      "CVE-2022-47941",
      "CVE-2022-47940",
      "CVE-2022-47939",
      "CVE-2022-47938",
      "CVE-2022-47929",
      "CVE-2022-43945",
      "CVE-2022-4382",
      "CVE-2022-4379",
      "CVE-2022-4378",
      "CVE-2022-43750",
      "CVE-2022-42896",
      "CVE-2022-42895",
      "CVE-2022-42703",
      "CVE-2022-42329",
      "CVE-2022-41850",
      "CVE-2022-41849",
      "CVE-2022-41218",
      "CVE-2022-40768",
      "CVE-2022-40307",
      "CVE-2022-39842",
      "CVE-2022-3977",
      "CVE-2022-3910",
      "CVE-2022-36946",
      "CVE-2022-3649",
      "CVE-2022-3646",
      "CVE-2022-3643",
      "CVE-2022-3636",
      "CVE-2022-3635",
      "CVE-2022-36280",
      "CVE-2022-3628",
      "CVE-2022-3623",
      "CVE-2022-3621",
      "CVE-2022-3619",
      "CVE-2022-3606",
      "CVE-2022-3594",
      "CVE-2022-3586",
      "CVE-2022-3567",
      "CVE-2022-3566",
      "CVE-2022-3565",
      "CVE-2022-3564",
      "CVE-2022-3545",
      "CVE-2022-3544",
      "CVE-2022-3543",
      "CVE-2022-3541",
      "CVE-2022-3534",
      "CVE-2022-34495",
      "CVE-2022-34494",
      "CVE-2022-3303",
      "CVE-2022-3239",
      "CVE-2022-32296",
      "CVE-2022-3061",
      "CVE-2022-3028",
      "CVE-2022-2978",
      "CVE-2022-2873",
      "CVE-2022-2663",
      "CVE-2022-2503",
      "CVE-2022-2153",
      "CVE-2022-1012",
      "CVE-2022-0812"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2846",
    "packages": [
      "lib32-libcurl-compat",
      "lib32-curl",
      "lib32-libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "8.3.0-1",
    "fixed": "8.4.0-1",
    "ticket": null,
    "issues": [
      "CVE-2023-38546",
      "CVE-2023-38545"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2845",
    "packages": [
      "libcurl-gnutls",
      "libcurl-compat",
      "curl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "8.3.0-1",
    "fixed": "8.4.0-1",
    "ticket": null,
    "issues": [
      "CVE-2023-38546",
      "CVE-2023-38545"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2782",
    "packages": [
      "samba"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.16.3-1",
    "fixed": "4.16.4-1",
    "ticket": null,
    "issues": [
      "CVE-2022-32746",
      "CVE-2022-32745",
      "CVE-2022-32744",
      "CVE-2022-32742",
      "CVE-2022-2031"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2770",
    "packages": [
      "xorg-server"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "21.1.3-7",
    "fixed": "21.1.4-1",
    "ticket": null,
    "issues": [
      "CVE-2022-2320",
      "CVE-2022-2319"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2761",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "91.9.1-1",
    "fixed": "91.10-1",
    "ticket": null,
    "issues": [
      "CVE-2022-31747",
      "CVE-2022-31742",
      "CVE-2022-31741",
      "CVE-2022-31738",
      "CVE-2022-31737",
      "CVE-2022-31736",
      "CVE-2022-1834"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2760",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "100.0.2-1",
    "fixed": "101.0-1",
    "ticket": null,
    "issues": [
      "CVE-2022-31748",
      "CVE-2022-31747",
      "CVE-2022-31745",
      "CVE-2022-31744",
      "CVE-2022-31743",
      "CVE-2022-31742",
      "CVE-2022-31741",
      "CVE-2022-31738",
      "CVE-2022-31737",
      "CVE-2022-31736",
      "CVE-2022-1919"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2759",
    "packages": [
      "wpewebkit"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.36.2-1",
    "fixed": "2.36.3-1",
    "ticket": null,
    "issues": [
      "CVE-2022-30294",
      "CVE-2022-30293",
      "CVE-2022-26719",
      "CVE-2022-26717",
      "CVE-2022-26716",
      "CVE-2022-26709",
      "CVE-2022-26700"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2753",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.18.1.zen1-1",
    "fixed": "5.18.2.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-1975",
      "CVE-2022-1974",
      "CVE-2022-1972",
      "CVE-2022-1966",
      "CVE-2022-1734"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2752",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.17.12.hardened2-2",
    "fixed": "5.17.13.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-1975",
      "CVE-2022-1974",
      "CVE-2022-1972",
      "CVE-2022-1966",
      "CVE-2022-1734"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2751",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.18.1-1",
    "fixed": "5.18.2-1",
    "ticket": null,
    "issues": [
      "CVE-2022-1975",
      "CVE-2022-1974",
      "CVE-2022-1972",
      "CVE-2022-1966",
      "CVE-2022-1734"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2750",
    "packages": [
      "subversion"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.14.1-6",
    "fixed": "1.14.2-1",
    "ticket": null,
    "issues": [
      "CVE-2022-24070",
      "CVE-2021-28544"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2747",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.17.9.hardened1-1",
    "fixed": "5.17.10.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-1729"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2746",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.17.9.zen1-1",
    "fixed": "5.17.10.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-1729"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2745",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.15.41-1",
    "fixed": "5.15.42-1",
    "ticket": null,
    "issues": [
      "CVE-2022-1729"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2744",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.17.9-1",
    "fixed": "5.17.10-1",
    "ticket": null,
    "issues": [
      "CVE-2022-1729"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2722",
    "packages": [
      "clamav"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "0.104.2-1",
    "fixed": "0.105.0-1",
    "ticket": null,
    "issues": [
      "CVE-2022-20803",
      "CVE-2022-20796",
      "CVE-2022-20792",
      "CVE-2022-20785",
      "CVE-2022-20771",
      "CVE-2022-20770"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2720",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "unknown",
    "affected": "101.0.4951.54-1",
    "fixed": "101.0.4951.64-1",
    "ticket": null,
    "issues": [
      "CVE-2022-1641",
      "CVE-2022-1640",
      "CVE-2022-1639",
      "CVE-2022-1638",
      "CVE-2022-1637",
      "CVE-2022-1636",
      "CVE-2022-1635",
      "CVE-2022-1634",
      "CVE-2022-1633"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2719",
    "packages": [
      "postgresql"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "14.2-1",
    "fixed": "14.3-1",
    "ticket": null,
    "issues": [
      "CVE-2022-1552"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2700",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.16.20.hardened1-1",
    "fixed": "5.17.5.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-28390",
      "CVE-2022-28389",
      "CVE-2022-28388",
      "CVE-2022-27666",
      "CVE-2022-26490",
      "CVE-2022-1516",
      "CVE-2022-1353",
      "CVE-2022-1205",
      "CVE-2022-1204",
      "CVE-2022-1199",
      "CVE-2022-1198",
      "CVE-2022-1195",
      "CVE-2022-1158",
      "CVE-2022-1048",
      "CVE-2022-1016",
      "CVE-2022-1015",
      "CVE-2022-0168",
      "CVE-2021-4197"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2699",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.17.2.zen3-1",
    "fixed": "5.17.3.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-28390",
      "CVE-2022-28389",
      "CVE-2022-28388",
      "CVE-2022-27666",
      "CVE-2022-26490",
      "CVE-2022-1516",
      "CVE-2022-1353",
      "CVE-2022-1205",
      "CVE-2022-1204",
      "CVE-2022-1199",
      "CVE-2022-1198",
      "CVE-2022-1195",
      "CVE-2022-1158",
      "CVE-2022-1048",
      "CVE-2022-1016",
      "CVE-2022-1015",
      "CVE-2022-0168",
      "CVE-2021-4197"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2698",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.17.2.arch3-1",
    "fixed": "5.17.3.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-28390",
      "CVE-2022-28389",
      "CVE-2022-28388",
      "CVE-2022-27666",
      "CVE-2022-26490",
      "CVE-2022-1516",
      "CVE-2022-1353",
      "CVE-2022-1205",
      "CVE-2022-1204",
      "CVE-2022-1199",
      "CVE-2022-1198",
      "CVE-2022-1195",
      "CVE-2022-1158",
      "CVE-2022-1048",
      "CVE-2022-1016",
      "CVE-2022-1015",
      "CVE-2022-0168",
      "CVE-2021-4197"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2696",
    "packages": [
      "gitlab"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "14.10-1",
    "fixed": "14.10.2-1",
    "ticket": null,
    "issues": [
      "CVE-2022-1510",
      "CVE-2022-1460",
      "CVE-2022-1433",
      "CVE-2022-1431",
      "CVE-2022-1428",
      "CVE-2022-1426",
      "CVE-2022-1423",
      "CVE-2022-1417",
      "CVE-2022-1416",
      "CVE-2022-1413",
      "CVE-2022-1406",
      "CVE-2022-1352",
      "CVE-2022-1124"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2694",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "sandbox escape",
    "affected": "5.15.33-1",
    "fixed": "5.15.34-1",
    "ticket": null,
    "issues": [
      "CVE-2022-29582"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2693",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "sandbox escape",
    "affected": "5.17.2.zen3-1",
    "fixed": "5.17.3.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-29582"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2692",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "sandbox escape",
    "affected": "5.17.3.hardened1-1",
    "fixed": "5.17.5.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-29582"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2691",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "sandbox escape",
    "affected": "5.17.2.arch3-1",
    "fixed": "5.17.3.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-29582"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2689",
    "packages": [
      "jre8-openjdk-headless",
      "jre8-openjdk",
      "jdk8-openjdk"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "unknown",
    "affected": "8.322-1",
    "fixed": "8.323-1",
    "ticket": null,
    "issues": [
      "CVE-2022-21496",
      "CVE-2022-21476",
      "CVE-2022-21443",
      "CVE-2022-21434",
      "CVE-2022-21426"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2688",
    "packages": [
      "jre11-openjdk-headless",
      "jdk11-openjdk",
      "jre11-openjdk"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "unknown",
    "affected": "11.0.14.1-1",
    "fixed": "11.0.15.u2-1",
    "ticket": null,
    "issues": [
      "CVE-2022-21496",
      "CVE-2022-21476",
      "CVE-2022-21443",
      "CVE-2022-21434",
      "CVE-2022-21426"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2687",
    "packages": [
      "jre17-openjdk",
      "jdk17-openjdk",
      "jre17-openjdk-headless"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "17.0.2-1",
    "fixed": "17.0.3.u7-2",
    "ticket": null,
    "issues": [
      "CVE-2022-21496",
      "CVE-2022-21476",
      "CVE-2022-21449",
      "CVE-2022-21443",
      "CVE-2022-21434",
      "CVE-2022-21426"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2686",
    "packages": [
      "jre-openjdk-headless",
      "jre-openjdk",
      "jdk-openjdk"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "18-1",
    "fixed": "18.0.1u10-1",
    "ticket": null,
    "issues": [
      "CVE-2022-21496",
      "CVE-2022-21449",
      "CVE-2022-21443",
      "CVE-2022-21434",
      "CVE-2022-21426"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2684",
    "packages": [
      "epiphany"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "42.1-1",
    "fixed": "42.2-1",
    "ticket": null,
    "issues": [
      "CVE-2022-29536"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2673",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.17.0-1",
    "fixed": "5.17.1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-28356"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2672",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.17.0-1",
    "fixed": "5.17.1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-28356"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2669",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.15.14.hardened1-1",
    "fixed": "5.15.15.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-23222"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2659",
    "packages": [
      "lib32-libtiff"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.3.0-1",
    "fixed": "4.3.0-2",
    "ticket": "74229",
    "issues": [
      "CVE-2022-22844",
      "CVE-2022-0924",
      "CVE-2022-0909",
      "CVE-2022-0908",
      "CVE-2022-0907",
      "CVE-2022-0891",
      "CVE-2022-0865",
      "CVE-2022-0562",
      "CVE-2022-0561"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2650",
    "packages": [
      "webkit2gtk-4.1"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.34.5-1",
    "fixed": "2.34.6-1",
    "ticket": null,
    "issues": [
      "CVE-2022-22620"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2821",
    "packages": [
      "zlib"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1:1.2.12-2",
    "fixed": "1:1.2.12-3",
    "ticket": null,
    "issues": [
      "CVE-2022-37434"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2710",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "91.8.1-1",
    "fixed": "91.9-1",
    "ticket": null,
    "issues": [
      "CVE-2022-29917",
      "CVE-2022-29916",
      "CVE-2022-29914",
      "CVE-2022-29913",
      "CVE-2022-29912",
      "CVE-2022-29911",
      "CVE-2022-29909",
      "CVE-2022-1520"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2662",
    "packages": [
      "vim",
      "gvim"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "8.2.4464-1",
    "fixed": "8.2.4651-1",
    "ticket": null,
    "issues": [
      "CVE-2022-1160",
      "CVE-2022-1154"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2709",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "99.0.1-1",
    "fixed": "100.0-1",
    "ticket": null,
    "issues": [
      "CVE-2022-29918",
      "CVE-2022-29917",
      "CVE-2022-29916",
      "CVE-2022-29915",
      "CVE-2022-29914",
      "CVE-2022-29912",
      "CVE-2022-29911",
      "CVE-2022-29909"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2754",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.15.44-1",
    "fixed": "5.15.45-1",
    "ticket": null,
    "issues": [
      "CVE-2022-2318",
      "CVE-2022-1975",
      "CVE-2022-1974",
      "CVE-2022-1972",
      "CVE-2022-1966",
      "CVE-2022-1734"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2788",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "sql injection",
    "affected": "4.0.5-1",
    "fixed": "4.0.6-1",
    "ticket": null,
    "issues": [
      "CVE-2022-34265"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2769",
    "packages": [
      "exo"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary command execution",
    "affected": "4.16.3-1",
    "fixed": "4.16.3-2",
    "ticket": null,
    "issues": [
      "CVE-2022-32278"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2766",
    "packages": [
      "liblouis"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "3.21.0-1",
    "fixed": "3.22.0-1",
    "ticket": null,
    "issues": [
      "CVE-2022-31783",
      "CVE-2022-26981"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2757",
    "packages": [
      "ruby"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "3.0.3-1",
    "fixed": "3.0.4-1",
    "ticket": null,
    "issues": [
      "CVE-2022-28739",
      "CVE-2022-28738"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2738",
    "packages": [
      "vim",
      "gvim"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "8.2.4150-1",
    "fixed": "8.2.4151-1",
    "ticket": null,
    "issues": [
      "CVE-2022-0318",
      "CVE-2022-0261",
      "CVE-2021-4192"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2727",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "incorrect calculation",
    "affected": "9.18.2-1",
    "fixed": "9.18.3-1",
    "ticket": null,
    "issues": [
      "CVE-2022-1183"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2726",
    "packages": [
      "libxml2"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.9.13-1",
    "fixed": "2.9.14-1",
    "ticket": null,
    "issues": [
      "CVE-2022-29824",
      "CVE-2022-23308"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2723",
    "packages": [
      "python-waitress"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "unknown",
    "affected": "2.1.0-1",
    "fixed": "2.1.1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-24761"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2712",
    "packages": [
      "thunderbird"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "multiple issues",
    "affected": "91.7.0-1",
    "fixed": "91.8.0-1",
    "ticket": null,
    "issues": [
      "CVE-2022-28289",
      "CVE-2022-28286",
      "CVE-2022-28285",
      "CVE-2022-28282",
      "CVE-2022-28281",
      "CVE-2022-24713",
      "CVE-2022-1197",
      "CVE-2022-1196",
      "CVE-2022-1097"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2715",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "unknown",
    "affected": "99.0.4844.82-1",
    "fixed": "99.0.4844.84-1",
    "ticket": null,
    "issues": [
      "CVE-2022-1096"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2714",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "97.0.2-1",
    "fixed": "98.0-1",
    "ticket": null,
    "issues": [
      "CVE-2022-26387",
      "CVE-2022-26385",
      "CVE-2022-26384",
      "CVE-2022-26383",
      "CVE-2022-26382",
      "CVE-2022-26381",
      "CVE-2022-0843"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2713",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "91.6.2-1",
    "fixed": "91.7.0-1",
    "ticket": null,
    "issues": [
      "CVE-2022-26387",
      "CVE-2022-26386",
      "CVE-2022-26384",
      "CVE-2022-26383",
      "CVE-2022-26381"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2711",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "98.0.2-1",
    "fixed": "99.0-1",
    "ticket": null,
    "issues": [
      "CVE-2022-28289",
      "CVE-2022-28288",
      "CVE-2022-28287",
      "CVE-2022-28286",
      "CVE-2022-28285",
      "CVE-2022-28284",
      "CVE-2022-28283",
      "CVE-2022-28282",
      "CVE-2022-28281",
      "CVE-2022-24713",
      "CVE-2022-1097"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2705",
    "packages": [
      "lib32-libsndfile"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "unknown",
    "affected": "1.0.31-1",
    "fixed": "1.1.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-4156"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2704",
    "packages": [
      "libsndfile"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "unknown",
    "affected": "1.0.31-1",
    "fixed": "1.1.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-4156"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2690",
    "packages": [
      "kubectl-ingress-nginx"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "1.1.3-1",
    "fixed": "1.2.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-25746",
      "CVE-2021-25745"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2674",
    "packages": [
      "linux-hardened"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.17.0-1",
    "fixed": "5.17.1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-28356"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2675",
    "packages": [
      "linux-lts"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.17.0-1",
    "fixed": "5.17.1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-28356"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2671",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.15.14-1",
    "fixed": "5.15.15-1",
    "ticket": null,
    "issues": [
      "CVE-2022-23222"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2668",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.15.14-1",
    "fixed": "5.15.15-1",
    "ticket": null,
    "issues": [
      "CVE-2022-23222"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2670",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.15.14-1",
    "fixed": "5.15.15-1",
    "ticket": null,
    "issues": [
      "CVE-2022-23222"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1332",
    "packages": [
      "keycloak"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "15.0.2-1",
    "fixed": "16.0.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3827",
      "CVE-2021-3632",
      "CVE-2021-3424",
      "CVE-2021-20262",
      "CVE-2020-1725",
      "CVE-2020-1723",
      "CVE-2020-1717",
      "CVE-2020-14359",
      "CVE-2020-10734"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2542",
    "packages": [
      "code"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.62.0-1",
    "fixed": "1.63.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43908",
      "CVE-2021-43891",
      "CVE-2021-42322"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2678",
    "packages": [
      "jenkins"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "multiple issues",
    "affected": "0.0.0-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2022-28160",
      "CVE-2022-28159",
      "CVE-2022-28158",
      "CVE-2022-28157",
      "CVE-2022-28156",
      "CVE-2022-28155",
      "CVE-2022-28154",
      "CVE-2022-28153",
      "CVE-2022-28152",
      "CVE-2022-28151",
      "CVE-2022-28150",
      "CVE-2022-28149",
      "CVE-2022-28148",
      "CVE-2022-28147",
      "CVE-2022-28146",
      "CVE-2022-28145",
      "CVE-2022-28144",
      "CVE-2022-28143",
      "CVE-2022-28142",
      "CVE-2022-28141",
      "CVE-2022-28140",
      "CVE-2022-28139",
      "CVE-2022-28138",
      "CVE-2022-28137",
      "CVE-2022-28136",
      "CVE-2022-28135",
      "CVE-2022-28134",
      "CVE-2022-28133"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2667",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "sql injection",
    "affected": "4.0.3-1",
    "fixed": "4.0.4-1",
    "ticket": null,
    "issues": [
      "CVE-2022-28347",
      "CVE-2022-28346"
    ],
    "advisories": [
      "ASA-202204-9"
    ]
  },
  {
    "name": "AVG-2666",
    "packages": [
      "gzip"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary command execution",
    "affected": "1.11-1",
    "fixed": "1.12-1",
    "ticket": null,
    "issues": [
      "CVE-2022-1271"
    ],
    "advisories": [
      "ASA-202204-7"
    ]
  },
  {
    "name": "AVG-2665",
    "packages": [
      "xz"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary command execution",
    "affected": "5.2.5-2",
    "fixed": "5.2.5-3",
    "ticket": null,
    "issues": [
      "CVE-2022-1271"
    ],
    "advisories": [
      "ASA-202204-8"
    ]
  },
  {
    "name": "AVG-2661",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "9.18.0-1",
    "fixed": "9.18.1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-0667",
      "CVE-2022-0635",
      "CVE-2022-0396",
      "CVE-2021-25220"
    ],
    "advisories": [
      "ASA-202204-5"
    ]
  },
  {
    "name": "AVG-2658",
    "packages": [
      "libtiff"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.3.0-1",
    "fixed": "4.3.0-2",
    "ticket": "74229",
    "issues": [
      "CVE-2022-22844",
      "CVE-2022-0924",
      "CVE-2022-0909",
      "CVE-2022-0908",
      "CVE-2022-0907",
      "CVE-2022-0891",
      "CVE-2022-0865",
      "CVE-2022-0562",
      "CVE-2022-0561"
    ],
    "advisories": [
      "ASA-202204-6"
    ]
  },
  {
    "name": "AVG-2660",
    "packages": [
      "faad2"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.8.8-1",
    "fixed": "2.9.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-6956",
      "CVE-2018-20360",
      "CVE-2018-20199",
      "CVE-2018-20196"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1626",
    "packages": [
      "wpa_supplicant"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2:2.9-8",
    "fixed": "2:2.10-1",
    "ticket": "69784",
    "issues": [
      "CVE-2021-30004",
      "CVE-2021-27803",
      "CVE-2021-0535"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2657",
    "packages": [
      "zlib"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1:1.2.11-1",
    "fixed": "1:1.2.12-1",
    "ticket": null,
    "issues": [
      "CVE-2018-25032"
    ],
    "advisories": [
      "ASA-202204-3"
    ]
  },
  {
    "name": "AVG-2654",
    "packages": [
      "polkit"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "0.120-3",
    "fixed": "0.120-5",
    "ticket": null,
    "issues": [
      "CVE-2021-4115",
      "CVE-2021-4034"
    ],
    "advisories": [
      "ASA-202204-2"
    ]
  },
  {
    "name": "AVG-2546",
    "packages": [
      "postgresql"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "man-in-the-middle",
    "affected": "13.4-6",
    "fixed": "13.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-23214"
    ],
    "advisories": [
      "ASA-202204-1"
    ]
  },
  {
    "name": "AVG-1621",
    "packages": [
      "glibc"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.33-5",
    "fixed": "2.34-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43396",
      "CVE-2021-3999",
      "CVE-2021-3998",
      "CVE-2021-35942",
      "CVE-2021-33574",
      "CVE-2021-27645"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2640",
    "packages": [
      "xorg-xwayland"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "21.1.3-1",
    "fixed": "21.1.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-4011",
      "CVE-2021-4010",
      "CVE-2021-4009",
      "CVE-2021-4008"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2636",
    "packages": [
      "xorg-server"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "21.1.1-3",
    "fixed": "21.1.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-4011",
      "CVE-2021-4010",
      "CVE-2021-4009",
      "CVE-2021-4008"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2635",
    "packages": [
      "tang"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "private key recovery",
    "affected": "10-1",
    "fixed": "11-1",
    "ticket": null,
    "issues": [
      "CVE-2021-4076"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2652",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.8.1-1",
    "fixed": "5.16.11-1",
    "ticket": null,
    "issues": [
      "CVE-2022-0847"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2653",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.4.0-1",
    "fixed": "5.16.12.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-25636"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2609",
    "packages": [
      "grafana"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "directory traversal",
    "affected": "8.3.0-1",
    "fixed": "8.3.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43815",
      "CVE-2021-43813",
      "CVE-2021-43798"
    ],
    "advisories": [
      "ASA-202112-11"
    ]
  },
  {
    "name": "AVG-2601",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.0.2497.24-1",
    "fixed": "5.0.2497.28-1",
    "ticket": null,
    "issues": [
      "CVE-2021-4068",
      "CVE-2021-4067",
      "CVE-2021-4066",
      "CVE-2021-4065",
      "CVE-2021-4064",
      "CVE-2021-4063",
      "CVE-2021-4062",
      "CVE-2021-4061",
      "CVE-2021-4059",
      "CVE-2021-4058",
      "CVE-2021-4057",
      "CVE-2021-4056",
      "CVE-2021-4055",
      "CVE-2021-4054",
      "CVE-2021-4053",
      "CVE-2021-4052"
    ],
    "advisories": [
      "ASA-202112-7"
    ]
  },
  {
    "name": "AVG-2614",
    "packages": [
      "grafana-agent"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "0.21.0-1",
    "fixed": "0.21.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41090"
    ],
    "advisories": [
      "ASA-202112-12"
    ]
  },
  {
    "name": "AVG-2608",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "91.3.2-2",
    "fixed": "91.4.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43546",
      "CVE-2021-43545",
      "CVE-2021-43543",
      "CVE-2021-43542",
      "CVE-2021-43541",
      "CVE-2021-43539",
      "CVE-2021-43538",
      "CVE-2021-43537",
      "CVE-2021-43536",
      "CVE-2021-43528"
    ],
    "advisories": [
      "ASA-202112-9"
    ]
  },
  {
    "name": "AVG-2603",
    "packages": [
      "gitlab"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "14.5.0-1",
    "fixed": "14.5.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39945",
      "CVE-2021-39944",
      "CVE-2021-39941",
      "CVE-2021-39940",
      "CVE-2021-39938",
      "CVE-2021-39937",
      "CVE-2021-39936",
      "CVE-2021-39935",
      "CVE-2021-39934",
      "CVE-2021-39933",
      "CVE-2021-39932",
      "CVE-2021-39931",
      "CVE-2021-39919",
      "CVE-2021-39917",
      "CVE-2021-39915",
      "CVE-2021-39910"
    ],
    "advisories": [
      "ASA-202112-10"
    ]
  },
  {
    "name": "AVG-2606",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "94.0.2-2",
    "fixed": "95.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43546",
      "CVE-2021-43545",
      "CVE-2021-43543",
      "CVE-2021-43542",
      "CVE-2021-43541",
      "CVE-2021-43540",
      "CVE-2021-43539",
      "CVE-2021-43538",
      "CVE-2021-43537",
      "CVE-2021-43536"
    ],
    "advisories": [
      "ASA-202112-8"
    ]
  },
  {
    "name": "AVG-2600",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "96.0.4664.45-2",
    "fixed": "96.0.4664.93-1",
    "ticket": null,
    "issues": [
      "CVE-2021-4068",
      "CVE-2021-4067",
      "CVE-2021-4066",
      "CVE-2021-4065",
      "CVE-2021-4064",
      "CVE-2021-4063",
      "CVE-2021-4062",
      "CVE-2021-4061",
      "CVE-2021-4059",
      "CVE-2021-4058",
      "CVE-2021-4057",
      "CVE-2021-4056",
      "CVE-2021-4055",
      "CVE-2021-4054",
      "CVE-2021-4053",
      "CVE-2021-4052"
    ],
    "advisories": [
      "ASA-202112-6",
      "ASA-202112-6"
    ]
  },
  {
    "name": "AVG-2503",
    "packages": [
      "gitlab"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "14.3.3-2",
    "fixed": "14.5.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39914",
      "CVE-2021-39913",
      "CVE-2021-39912",
      "CVE-2021-39911",
      "CVE-2021-39909",
      "CVE-2021-39907",
      "CVE-2021-39906",
      "CVE-2021-39905",
      "CVE-2021-39904",
      "CVE-2021-39903",
      "CVE-2021-39902",
      "CVE-2021-39901",
      "CVE-2021-39898",
      "CVE-2021-39897",
      "CVE-2021-39895"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2475",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.3.2439.65-1",
    "fixed": "5.0.2497.24-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38022",
      "CVE-2021-38021",
      "CVE-2021-38020",
      "CVE-2021-38019",
      "CVE-2021-38018",
      "CVE-2021-38017",
      "CVE-2021-38016",
      "CVE-2021-38015",
      "CVE-2021-38014",
      "CVE-2021-38013",
      "CVE-2021-38012",
      "CVE-2021-38011",
      "CVE-2021-38010",
      "CVE-2021-38009",
      "CVE-2021-38008",
      "CVE-2021-38007",
      "CVE-2021-38006",
      "CVE-2021-38005",
      "CVE-2021-38004",
      "CVE-2021-38003",
      "CVE-2021-38001",
      "CVE-2021-38000",
      "CVE-2021-37998",
      "CVE-2021-37996",
      "CVE-2021-37995",
      "CVE-2021-37994",
      "CVE-2021-37993",
      "CVE-2021-37992",
      "CVE-2021-37991",
      "CVE-2021-37990",
      "CVE-2021-37989",
      "CVE-2021-37988",
      "CVE-2021-37987",
      "CVE-2021-37986",
      "CVE-2021-37985",
      "CVE-2021-37984",
      "CVE-2021-37982",
      "CVE-2021-37981"
    ],
    "advisories": [
      "ASA-202112-1"
    ]
  },
  {
    "name": "AVG-2597",
    "packages": [
      "lib32-nss"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "3.72-2",
    "fixed": "3.73-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43527"
    ],
    "advisories": [
      "ASA-202112-4"
    ]
  },
  {
    "name": "AVG-2596",
    "packages": [
      "nss"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "3.72-2",
    "fixed": "3.73-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43527"
    ],
    "advisories": [
      "ASA-202112-3"
    ]
  },
  {
    "name": "AVG-2529",
    "packages": [
      "tensorflow"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.6.0-6",
    "fixed": "2.6.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41228",
      "CVE-2021-41227",
      "CVE-2021-41226",
      "CVE-2021-41225",
      "CVE-2021-41224",
      "CVE-2021-41223",
      "CVE-2021-41222",
      "CVE-2021-41221",
      "CVE-2021-41220",
      "CVE-2021-41219",
      "CVE-2021-41218",
      "CVE-2021-41217",
      "CVE-2021-41216",
      "CVE-2021-41215",
      "CVE-2021-41214",
      "CVE-2021-41213",
      "CVE-2021-41212",
      "CVE-2021-41211",
      "CVE-2021-41210",
      "CVE-2021-41209",
      "CVE-2021-41208",
      "CVE-2021-41207",
      "CVE-2021-41206",
      "CVE-2021-41205",
      "CVE-2021-41204",
      "CVE-2021-41203",
      "CVE-2021-41202",
      "CVE-2021-41201",
      "CVE-2021-41200",
      "CVE-2021-41199",
      "CVE-2021-41198",
      "CVE-2021-41197",
      "CVE-2021-41196",
      "CVE-2021-41195"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2560",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "95.0.4638.69-2",
    "fixed": "96.0.4664.45-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38022",
      "CVE-2021-38021",
      "CVE-2021-38020",
      "CVE-2021-38019",
      "CVE-2021-38018",
      "CVE-2021-38017",
      "CVE-2021-38016",
      "CVE-2021-38015",
      "CVE-2021-38014",
      "CVE-2021-38013",
      "CVE-2021-38012",
      "CVE-2021-38011",
      "CVE-2021-38010",
      "CVE-2021-38009",
      "CVE-2021-38008",
      "CVE-2021-38007",
      "CVE-2021-38006",
      "CVE-2021-38005"
    ],
    "advisories": [
      "ASA-202111-9",
      "ASA-202111-9"
    ]
  },
  {
    "name": "AVG-1800",
    "packages": [
      "steam"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.0.0.73-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-30481"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2499",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.14.14.hardened1-1",
    "fixed": "5.14.16.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43389",
      "CVE-2021-43267",
      "CVE-2021-42327",
      "CVE-2021-3896",
      "CVE-2021-3760"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2515",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.10.76-1",
    "fixed": "5.10.77-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43267",
      "CVE-2021-42327"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2514",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.14.15.zen1-1",
    "fixed": "5.14.16.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43267",
      "CVE-2021-42327"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2513",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.14.15.arch1-1",
    "fixed": "5.14.16.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43267",
      "CVE-2021-42327"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2505",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.3.2439.56-1",
    "fixed": "4.3.2439.63-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38002",
      "CVE-2021-37999",
      "CVE-2021-37997"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2504",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "95.0.4638.54-2",
    "fixed": "95.0.4638.69-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38004",
      "CVE-2021-38003",
      "CVE-2021-38002",
      "CVE-2021-38001",
      "CVE-2021-38000",
      "CVE-2021-37999",
      "CVE-2021-37998",
      "CVE-2021-37997"
    ],
    "advisories": [
      "ASA-202110-7",
      "ASA-202110-7"
    ]
  },
  {
    "name": "AVG-2490",
    "packages": [
      "kubectl-ingress-nginx"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "0.33.0-2",
    "fixed": "1.0.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-25742"
    ],
    "advisories": [
      "ASA-202111-7"
    ]
  },
  {
    "name": "AVG-2311",
    "packages": [
      "grilo"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "man-in-the-middle",
    "affected": "0.3.13-1",
    "fixed": "0.3.14-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39365"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2519",
    "packages": [
      "thunderbird"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "multiple issues",
    "affected": "91.2.1-1",
    "fixed": "91.3.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38510",
      "CVE-2021-38505"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2518",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "91.2.1-1",
    "fixed": "91.3.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38509",
      "CVE-2021-38508",
      "CVE-2021-38507",
      "CVE-2021-38506",
      "CVE-2021-38504",
      "CVE-2021-38503"
    ],
    "advisories": [
      "ASA-202111-3"
    ]
  },
  {
    "name": "AVG-2489",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.3.2439.44-1",
    "fixed": "4.3.2439.56-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37983"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2512",
    "packages": [
      "firefox"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "multiple issues",
    "affected": "93.0-1",
    "fixed": "94.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38510",
      "CVE-2021-38505"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2511",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "93.0-1",
    "fixed": "94.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38509",
      "CVE-2021-38508",
      "CVE-2021-38507",
      "CVE-2021-38506",
      "CVE-2021-38504",
      "CVE-2021-38503"
    ],
    "advisories": [
      "ASA-202111-2"
    ]
  },
  {
    "name": "AVG-2400",
    "packages": [
      "wpewebkit"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.32.3-1",
    "fixed": "2.32.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30858",
      "CVE-2021-30849",
      "CVE-2021-30848"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2491",
    "packages": [
      "qutebrowser"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.3.1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-41146"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2455",
    "packages": [
      "flatpak"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "sandbox escape",
    "affected": "1.11.3-1",
    "fixed": "1.12.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41133"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2453",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.3.2439.39-1",
    "fixed": "4.3.2439.44-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37980",
      "CVE-2021-37979",
      "CVE-2021-37978",
      "CVE-2021-37977"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2452",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "94.0.4606.71-2",
    "fixed": "94.0.4606.81-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37980",
      "CVE-2021-37979",
      "CVE-2021-37978",
      "CVE-2021-37977"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2459",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "91.1.2-1",
    "fixed": "91.2.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38502",
      "CVE-2021-38501",
      "CVE-2021-38500",
      "CVE-2021-38498",
      "CVE-2021-38497",
      "CVE-2021-38496",
      "CVE-2021-32810"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2442",
    "packages": [
      "apache"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.4.49-1",
    "fixed": "2.4.50-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41773",
      "CVE-2021-41524"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2409",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.2.2406.54-1",
    "fixed": "4.3.2439.39-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37972",
      "CVE-2021-37971",
      "CVE-2021-37970",
      "CVE-2021-37968",
      "CVE-2021-37967",
      "CVE-2021-37966",
      "CVE-2021-37965",
      "CVE-2021-37963",
      "CVE-2021-37962",
      "CVE-2021-37961",
      "CVE-2021-37960",
      "CVE-2021-37959",
      "CVE-2021-37958",
      "CVE-2021-37957",
      "CVE-2021-37956"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2476",
    "packages": [
      "virtualbox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "6.1.26-2",
    "fixed": "6.1.28-1",
    "ticket": null,
    "issues": [
      "CVE-2021-35545",
      "CVE-2021-35542",
      "CVE-2021-35540",
      "CVE-2021-35538",
      "CVE-2021-2475"
    ],
    "advisories": [
      "ASA-202110-3"
    ]
  },
  {
    "name": "AVG-2482",
    "packages": [
      "jre8-openjdk-headless",
      "jdk8-openjdk"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "8.u292-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-35560"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2474",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "94.0.4606.81-1",
    "fixed": "95.0.4638.54-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37996",
      "CVE-2021-37995",
      "CVE-2021-37994",
      "CVE-2021-37993",
      "CVE-2021-37992",
      "CVE-2021-37991",
      "CVE-2021-37990",
      "CVE-2021-37989",
      "CVE-2021-37988",
      "CVE-2021-37987",
      "CVE-2021-37986",
      "CVE-2021-37985",
      "CVE-2021-37984",
      "CVE-2021-37983",
      "CVE-2021-37982",
      "CVE-2021-37981"
    ],
    "advisories": [
      "ASA-202110-2",
      "ASA-202110-2"
    ]
  },
  {
    "name": "AVG-2443",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "92.0.1-1",
    "fixed": "93.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38501",
      "CVE-2021-38500",
      "CVE-2021-38499",
      "CVE-2021-38498",
      "CVE-2021-38497",
      "CVE-2021-38496",
      "CVE-2021-32810"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2441",
    "packages": [
      "hiredis"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.0.0-1",
    "fixed": "1.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32765"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1667",
    "packages": [
      "squid"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.1-1",
    "fixed": "5.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41611",
      "CVE-2021-28116"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2435",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.2.2406.52-1",
    "fixed": "4.2.2406.54-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37976",
      "CVE-2021-37975",
      "CVE-2021-37974"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2433",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "94.0.4606.61-1",
    "fixed": "94.0.4606.71-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37976",
      "CVE-2021-37975",
      "CVE-2021-37974"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2470",
    "packages": [
      "tomcat9"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "9.0.53-1",
    "fixed": "9.0.54-1",
    "ticket": null,
    "issues": [
      "CVE-2021-42340"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2469",
    "packages": [
      "tomcat10"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "10.0.11-1",
    "fixed": "10.0.12-1",
    "ticket": null,
    "issues": [
      "CVE-2021-42340"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2431",
    "packages": [
      "gitlab"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "14.3.0-1",
    "fixed": "14.3.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39900",
      "CVE-2021-39899",
      "CVE-2021-39896",
      "CVE-2021-39894",
      "CVE-2021-39893",
      "CVE-2021-39892",
      "CVE-2021-39891",
      "CVE-2021-39890",
      "CVE-2021-39887",
      "CVE-2021-39886",
      "CVE-2021-39882",
      "CVE-2021-39881",
      "CVE-2021-39879",
      "CVE-2021-39878",
      "CVE-2021-39877",
      "CVE-2021-39875",
      "CVE-2021-39874",
      "CVE-2021-39873",
      "CVE-2021-39872",
      "CVE-2021-39871",
      "CVE-2021-39870",
      "CVE-2021-39869",
      "CVE-2021-39868",
      "CVE-2021-39867",
      "CVE-2021-39866"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2426",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.2.2406.48-1",
    "fixed": "4.2.2406.52-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37973"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2419",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "94.0.4606.54-1",
    "fixed": "94.0.4606.61-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37973"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2289",
    "packages": [
      "apache"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.4.48-1",
    "fixed": "2.4.49-1",
    "ticket": null,
    "issues": [
      "CVE-2021-40438",
      "CVE-2021-39275",
      "CVE-2021-36160",
      "CVE-2021-34798",
      "CVE-2021-33193"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2408",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "93.0.4577.82-2",
    "fixed": "94.0.4606.54-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37972",
      "CVE-2021-37971",
      "CVE-2021-37970",
      "CVE-2021-37968",
      "CVE-2021-37967",
      "CVE-2021-37966",
      "CVE-2021-37965",
      "CVE-2021-37963",
      "CVE-2021-37962",
      "CVE-2021-37961",
      "CVE-2021-37960",
      "CVE-2021-37959",
      "CVE-2021-37958",
      "CVE-2021-37957",
      "CVE-2021-37956"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2407",
    "packages": [
      "drupal"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "9.2.0-1",
    "fixed": "9.2.6-1",
    "ticket": null,
    "issues": [
      "CVE-2020-13677",
      "CVE-2020-13676",
      "CVE-2020-13675",
      "CVE-2020-13674",
      "CVE-2020-13673"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1906",
    "packages": [
      "jruby"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "9.2.19.0-1",
    "fixed": "9.3.0.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32066",
      "CVE-2021-31810",
      "CVE-2021-31799"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2432",
    "packages": [
      "gitlab"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "multiple issues",
    "affected": "14.3.0-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-39889",
      "CVE-2021-39888",
      "CVE-2021-39885",
      "CVE-2021-39884",
      "CVE-2021-39883",
      "CVE-2021-22259"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2401",
    "packages": [
      "python-sqlparse"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "0.4.1-3",
    "fixed": "0.4.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32839"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2389",
    "packages": [
      "lib32-libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.78.0-1",
    "fixed": "7.79.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22947",
      "CVE-2021-22946",
      "CVE-2021-22945"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2388",
    "packages": [
      "libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.78.0-1",
    "fixed": "7.79.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22947",
      "CVE-2021-22946",
      "CVE-2021-22945"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2387",
    "packages": [
      "lib32-libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.78.0-1",
    "fixed": "7.79.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22947",
      "CVE-2021-22946",
      "CVE-2021-22945"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2386",
    "packages": [
      "libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.78.0-1",
    "fixed": "7.79.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22947",
      "CVE-2021-22946",
      "CVE-2021-22945"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2385",
    "packages": [
      "lib32-curl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.78.0-1",
    "fixed": "7.79.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22947",
      "CVE-2021-22946",
      "CVE-2021-22945"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2384",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.78.0-1",
    "fixed": "7.79.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22947",
      "CVE-2021-22946",
      "CVE-2021-22945"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2393",
    "packages": [
      "kubelet"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary filesystem access",
    "affected": "1.22.1-1",
    "fixed": "1.22.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-25741"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2428",
    "packages": [
      "code"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.60.2-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-36952",
      "CVE-2021-26434"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2337",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.1.2369.21-1",
    "fixed": "4.2.2406.44-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30633",
      "CVE-2021-30632",
      "CVE-2021-30631",
      "CVE-2021-30630",
      "CVE-2021-30629",
      "CVE-2021-30628",
      "CVE-2021-30627",
      "CVE-2021-30626",
      "CVE-2021-30625",
      "CVE-2021-30624",
      "CVE-2021-30623",
      "CVE-2021-30622",
      "CVE-2021-30621",
      "CVE-2021-30620",
      "CVE-2021-30619",
      "CVE-2021-30618",
      "CVE-2021-30617",
      "CVE-2021-30616",
      "CVE-2021-30615",
      "CVE-2021-30614",
      "CVE-2021-30613",
      "CVE-2021-30612",
      "CVE-2021-30611",
      "CVE-2021-30610",
      "CVE-2021-30609",
      "CVE-2021-30608",
      "CVE-2021-30607",
      "CVE-2021-30606"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2424",
    "packages": [
      "ruby-nokogiri"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "xml external entity injection",
    "affected": "1.12.2-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-41098"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2291",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "78.14.0-1",
    "fixed": "91.1.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38495",
      "CVE-2021-29991",
      "CVE-2021-29987",
      "CVE-2021-29982",
      "CVE-2021-29981"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1883",
    "packages": [
      "libxml2"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.9.10-9",
    "fixed": "2.9.11-1",
    "ticket": "70822",
    "issues": [
      "CVE-2021-3541",
      "CVE-2021-3537",
      "CVE-2021-3518",
      "CVE-2021-3517",
      "CVE-2021-3516"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2398",
    "packages": [
      "linux"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.14.5.arch1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-38300"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2397",
    "packages": [
      "seatd"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "0.6.1-2",
    "fixed": "0.6.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41387"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2359",
    "packages": [
      "nomad"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "1.1.3-1",
    "fixed": "1.1.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37218"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2316",
    "packages": [
      "lib32-openssl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1:1.1.1.k-1",
    "fixed": "1:1.1.1.l-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3712",
      "CVE-2021-3711"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2267",
    "packages": [
      "jupyter-notebook"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "cross-site scripting",
    "affected": "6.3.0-1",
    "fixed": "6.4.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32798"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2360",
    "packages": [
      "consul"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.10.1-1",
    "fixed": "1.10.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38698",
      "CVE-2021-37219"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2336",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "92.0.4515.159-1",
    "fixed": "93.0.4577.63-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30624",
      "CVE-2021-30623",
      "CVE-2021-30622",
      "CVE-2021-30621",
      "CVE-2021-30620",
      "CVE-2021-30619",
      "CVE-2021-30618",
      "CVE-2021-30617",
      "CVE-2021-30616",
      "CVE-2021-30615",
      "CVE-2021-30614",
      "CVE-2021-30613",
      "CVE-2021-30612",
      "CVE-2021-30611",
      "CVE-2021-30610",
      "CVE-2021-30609",
      "CVE-2021-30608",
      "CVE-2021-30607",
      "CVE-2021-30606"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2331",
    "packages": [
      "hedgedoc"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "cross-site scripting",
    "affected": "1.8.2-1",
    "fixed": "1.9.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39175"
    ],
    "advisories": [
      "ASA-202109-1"
    ]
  },
  {
    "name": "AVG-2379",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "93.0.4577.63-1",
    "fixed": "93.0.4577.82-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30633",
      "CVE-2021-30632",
      "CVE-2021-30631",
      "CVE-2021-30630",
      "CVE-2021-30629",
      "CVE-2021-30628",
      "CVE-2021-30627",
      "CVE-2021-30626",
      "CVE-2021-30625"
    ],
    "advisories": [
      "ASA-202109-6",
      "ASA-202109-6"
    ]
  },
  {
    "name": "AVG-2377",
    "packages": [
      "element-web",
      "element-desktop"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "1.7.34-2",
    "fixed": "1.8.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-40823"
    ],
    "advisories": [
      "ASA-202109-4",
      "ASA-202109-5"
    ]
  },
  {
    "name": "AVG-2321",
    "packages": [
      "istio"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.11.0-1",
    "fixed": "1.11.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39156",
      "CVE-2021-39155",
      "CVE-2021-32781",
      "CVE-2021-32780",
      "CVE-2021-32778",
      "CVE-2021-32777"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2374",
    "packages": [
      "ghostscript"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary command execution",
    "affected": "9.54.0-2",
    "fixed": "9.54.0-3",
    "ticket": null,
    "issues": [
      "CVE-2021-3781"
    ],
    "advisories": [
      "ASA-202109-3"
    ]
  },
  {
    "name": "AVG-2350",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "91.0.2-1",
    "fixed": "92.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38494",
      "CVE-2021-38491"
    ],
    "advisories": [
      "ASA-202109-2"
    ]
  },
  {
    "name": "AVG-2169",
    "packages": [
      "fail2ban"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary command execution",
    "affected": "0.11.2-1",
    "fixed": "0.11.2-2",
    "ticket": "71524",
    "issues": [
      "CVE-2021-32749"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2320",
    "packages": [
      "go-ethereum"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "incorrect calculation",
    "affected": "1.10.7-1",
    "fixed": "1.10.8-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39137"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2315",
    "packages": [
      "openssl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.1.1.k-1",
    "fixed": "1.1.1.l-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3712",
      "CVE-2021-3711"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2299",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.1.2369.16-1",
    "fixed": "4.1.2369.21-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30604",
      "CVE-2021-30603",
      "CVE-2021-30602",
      "CVE-2021-30601",
      "CVE-2021-30600",
      "CVE-2021-30599",
      "CVE-2021-30598"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2302",
    "packages": [
      "tor"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "0.4.6.6-1",
    "fixed": "0.4.6.7-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38385"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2301",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "url request injection",
    "affected": "91.0-1",
    "fixed": "91.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29991"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2192",
    "packages": [
      "gradle",
      "gradle-src"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary command execution",
    "affected": "7.1.1-1",
    "fixed": "7.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32751"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2298",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "92.0.4515.131-1",
    "fixed": "92.0.4515.159-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30604",
      "CVE-2021-30603",
      "CVE-2021-30602",
      "CVE-2021-30601",
      "CVE-2021-30600",
      "CVE-2021-30599",
      "CVE-2021-30598"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2270",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "78.12.0-1",
    "fixed": "78.13.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29989",
      "CVE-2021-29988",
      "CVE-2021-29986",
      "CVE-2021-29985",
      "CVE-2021-29984",
      "CVE-2021-29980"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2283",
    "packages": [
      "nodejs"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "16.6.1-1",
    "fixed": "16.6.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22940",
      "CVE-2021-22939"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2286",
    "packages": [
      "nodejs"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "insufficient validation",
    "affected": "16.6.1-1",
    "fixed": "16.6.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22931"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2269",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "90.0.2-1",
    "fixed": "91.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29990",
      "CVE-2021-29989",
      "CVE-2021-29988",
      "CVE-2021-29987",
      "CVE-2021-29986",
      "CVE-2021-29985",
      "CVE-2021-29984",
      "CVE-2021-29982",
      "CVE-2021-29981",
      "CVE-2021-29980"
    ],
    "advisories": [
      "ASA-202108-14"
    ]
  },
  {
    "name": "AVG-2271",
    "packages": [
      "firefox"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "denial of service",
    "affected": "90.0.2-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-29983"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2266",
    "packages": [
      "jupyterlab"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "cross-site scripting",
    "affected": "3.1.2-1",
    "fixed": "3.1.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32797"
    ],
    "advisories": [
      "ASA-202108-10"
    ]
  },
  {
    "name": "AVG-2261",
    "packages": [
      "lynx"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "2.8.9-3",
    "fixed": "2.8.9-4",
    "ticket": "71764",
    "issues": [
      "CVE-2021-38165"
    ],
    "advisories": [
      "ASA-202108-9"
    ]
  },
  {
    "name": "AVG-2251",
    "packages": [
      "gitlab"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "14.1.1-1",
    "fixed": "14.1.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22241",
      "CVE-2021-22239",
      "CVE-2021-22237",
      "CVE-2021-22236"
    ],
    "advisories": [
      "ASA-202108-7"
    ]
  },
  {
    "name": "AVG-2247",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.1.2369.11-1",
    "fixed": "4.1.2369.15-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30597",
      "CVE-2021-30596",
      "CVE-2021-30594",
      "CVE-2021-30593",
      "CVE-2021-30592",
      "CVE-2021-30591",
      "CVE-2021-30590"
    ],
    "advisories": [
      "ASA-202108-6"
    ]
  },
  {
    "name": "AVG-2146",
    "packages": [
      "fossil"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "certificate verification bypass",
    "affected": "2.15.1-1",
    "fixed": "2.16-1",
    "ticket": null,
    "issues": [
      "CVE-2021-36377"
    ],
    "advisories": [
      "ASA-202108-8"
    ]
  },
  {
    "name": "AVG-2246",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "92.0.4515.107-3",
    "fixed": "92.0.4515.131-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30597",
      "CVE-2021-30596",
      "CVE-2021-30594",
      "CVE-2021-30593",
      "CVE-2021-30592",
      "CVE-2021-30591",
      "CVE-2021-30590"
    ],
    "advisories": [
      "ASA-202108-4",
      "ASA-202108-4"
    ]
  },
  {
    "name": "AVG-2239",
    "packages": [
      "nodejs"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "16.5.0-1",
    "fixed": "16.6.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22930"
    ],
    "advisories": [
      "ASA-202108-1"
    ]
  },
  {
    "name": "AVG-2202",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.0.2312.41-1",
    "fixed": "4.1.2369.11-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30589",
      "CVE-2021-30588",
      "CVE-2021-30585",
      "CVE-2021-30584",
      "CVE-2021-30582",
      "CVE-2021-30581",
      "CVE-2021-30579",
      "CVE-2021-30578",
      "CVE-2021-30576",
      "CVE-2021-30575",
      "CVE-2021-30574",
      "CVE-2021-30573",
      "CVE-2021-30572",
      "CVE-2021-30571",
      "CVE-2021-30569",
      "CVE-2021-30568",
      "CVE-2021-30567",
      "CVE-2021-30566",
      "CVE-2021-30565"
    ],
    "advisories": [
      "ASA-202107-74"
    ]
  },
  {
    "name": "AVG-2182",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.13.1.zen1-1",
    "fixed": "5.13.4.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3655",
      "CVE-2021-3612",
      "CVE-2021-3609",
      "CVE-2021-33909"
    ],
    "advisories": [
      "ASA-202107-49"
    ]
  },
  {
    "name": "AVG-2181",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.13.1.arch1-1",
    "fixed": "5.13.4.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3655",
      "CVE-2021-3612",
      "CVE-2021-3609",
      "CVE-2021-33909"
    ],
    "advisories": [
      "ASA-202107-48"
    ]
  },
  {
    "name": "AVG-2221",
    "packages": [
      "wpewebkit"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.32.2-1",
    "fixed": "2.32.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30799",
      "CVE-2021-30797",
      "CVE-2021-30795",
      "CVE-2021-30749",
      "CVE-2021-30744",
      "CVE-2021-30734",
      "CVE-2021-30720",
      "CVE-2021-30689",
      "CVE-2021-30665",
      "CVE-2021-30663",
      "CVE-2021-21779",
      "CVE-2021-21775"
    ],
    "advisories": [
      "ASA-202107-68"
    ]
  },
  {
    "name": "AVG-2213",
    "packages": [
      "wpewebkit"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.30.4-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-30762"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2211",
    "packages": [
      "wpewebkit"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.30.4-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-30761",
      "CVE-2021-30666"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2209",
    "packages": [
      "wpewebkit"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.30.4-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-30661",
      "CVE-2021-1826",
      "CVE-2021-1825",
      "CVE-2021-1820",
      "CVE-2021-1817"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2188",
    "packages": [
      "jre-openjdk-headless",
      "jre-openjdk"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "16.0.1.u9-1",
    "fixed": "16.0.2.u7-1",
    "ticket": null,
    "issues": [
      "CVE-2021-2388",
      "CVE-2021-2369",
      "CVE-2021-2341"
    ],
    "advisories": [
      "ASA-202107-66",
      "ASA-202107-65"
    ]
  },
  {
    "name": "AVG-2183",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.12.18.hardened1-1",
    "fixed": "5.12.19.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3612",
      "CVE-2021-3609",
      "CVE-2021-33909"
    ],
    "advisories": [
      "ASA-202107-50"
    ]
  },
  {
    "name": "AVG-2184",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.10.51-1",
    "fixed": "5.10.52-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3612",
      "CVE-2021-3609",
      "CVE-2021-33909"
    ],
    "advisories": [
      "ASA-202107-51"
    ]
  },
  {
    "name": "AVG-2200",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "91.0.4472.164-1",
    "fixed": "92.0.4515.107-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30589",
      "CVE-2021-30588",
      "CVE-2021-30585",
      "CVE-2021-30584",
      "CVE-2021-30582",
      "CVE-2021-30581",
      "CVE-2021-30579",
      "CVE-2021-30578",
      "CVE-2021-30576",
      "CVE-2021-30575",
      "CVE-2021-30574",
      "CVE-2021-30573",
      "CVE-2021-30572",
      "CVE-2021-30571",
      "CVE-2021-30569",
      "CVE-2021-30568",
      "CVE-2021-30567",
      "CVE-2021-30566",
      "CVE-2021-30565"
    ],
    "advisories": [
      "ASA-202107-47",
      "ASA-202107-47"
    ]
  },
  {
    "name": "AVG-2189",
    "packages": [
      "jdk11-openjdk",
      "jre11-openjdk-headless"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "11.0.11.u9-1",
    "fixed": "11.0.12.u7-1",
    "ticket": null,
    "issues": [
      "CVE-2021-2388",
      "CVE-2021-2369",
      "CVE-2021-2341"
    ],
    "advisories": [
      "ASA-202107-53",
      "ASA-202107-54"
    ]
  },
  {
    "name": "AVG-2187",
    "packages": [
      "virtualbox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "6.1.22-3",
    "fixed": "6.1.24-1",
    "ticket": null,
    "issues": [
      "CVE-2021-2454",
      "CVE-2021-2443",
      "CVE-2021-2442",
      "CVE-2021-2409"
    ],
    "advisories": [
      "ASA-202107-52"
    ]
  },
  {
    "name": "AVG-2167",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.0.2312.38-1",
    "fixed": "4.0.2312.41-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30564",
      "CVE-2021-30563",
      "CVE-2021-30562",
      "CVE-2021-30561",
      "CVE-2021-30560",
      "CVE-2021-30559",
      "CVE-2021-30541"
    ],
    "advisories": [
      "ASA-202107-31"
    ]
  },
  {
    "name": "AVG-2166",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "91.0.4472.114-1",
    "fixed": "91.0.4472.164-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30564",
      "CVE-2021-30563",
      "CVE-2021-30562",
      "CVE-2021-30561",
      "CVE-2021-30560",
      "CVE-2021-30559",
      "CVE-2021-30541"
    ],
    "advisories": [
      "ASA-202107-30",
      "ASA-202107-30"
    ]
  },
  {
    "name": "AVG-2164",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.10.30-1",
    "fixed": "5.10.31-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22555"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2163",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.11.14.hardened1-1",
    "fixed": "5.11.15.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22555"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2162",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.11.14.zen1-1",
    "fixed": "5.11.15.zen1-2",
    "ticket": null,
    "issues": [
      "CVE-2021-22555"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2161",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.11.14.arch1-1",
    "fixed": "5.11.15.arch1-2",
    "ticket": null,
    "issues": [
      "CVE-2021-22555"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2152",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "78.11.0-1",
    "fixed": "78.12.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30547",
      "CVE-2021-29976",
      "CVE-2021-29970",
      "CVE-2021-29969"
    ],
    "advisories": [
      "ASA-202107-21"
    ]
  },
  {
    "name": "AVG-2149",
    "packages": [
      "firefox"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "multiple issues",
    "affected": "89.0.2-1",
    "fixed": "90.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29973",
      "CVE-2021-29971"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2148",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "89.0.2-1",
    "fixed": "90.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30547",
      "CVE-2021-29977",
      "CVE-2021-29976",
      "CVE-2021-29975",
      "CVE-2021-29974",
      "CVE-2021-29972",
      "CVE-2021-29970"
    ],
    "advisories": [
      "ASA-202107-20"
    ]
  },
  {
    "name": "AVG-2144",
    "packages": [
      "nextcloud"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "21.0.2-1",
    "fixed": "21.0.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32741",
      "CVE-2021-32734",
      "CVE-2021-32733",
      "CVE-2021-32726",
      "CVE-2021-32725",
      "CVE-2021-32705",
      "CVE-2021-32703",
      "CVE-2021-32688",
      "CVE-2021-32680",
      "CVE-2021-32679",
      "CVE-2021-32678"
    ],
    "advisories": [
      "ASA-202107-22"
    ]
  },
  {
    "name": "AVG-2138",
    "packages": [
      "ruby"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "3.0.1-1",
    "fixed": "3.0.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32066",
      "CVE-2021-31810"
    ],
    "advisories": [
      "ASA-202107-23"
    ]
  },
  {
    "name": "AVG-2125",
    "packages": [
      "gitlab"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "14.0.1-1",
    "fixed": "14.0.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-31799",
      "CVE-2021-22232",
      "CVE-2021-22231",
      "CVE-2021-22230",
      "CVE-2021-22229",
      "CVE-2021-22228",
      "CVE-2021-22227",
      "CVE-2021-22226",
      "CVE-2021-22225",
      "CVE-2021-22224",
      "CVE-2021-22223"
    ],
    "advisories": [
      "ASA-202107-18"
    ]
  },
  {
    "name": "AVG-2126",
    "packages": [
      "nodejs"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "16.4.0-1",
    "fixed": "16.4.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-27290",
      "CVE-2021-23362",
      "CVE-2021-22918"
    ],
    "advisories": [
      "ASA-202107-13"
    ]
  },
  {
    "name": "AVG-2123",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "insufficient validation",
    "affected": "3.2.4-1",
    "fixed": "3.2.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-35042"
    ],
    "advisories": [
      "ASA-202107-11"
    ]
  },
  {
    "name": "AVG-2118",
    "packages": [
      "jenkins"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.299-1",
    "fixed": "2.300-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21671",
      "CVE-2021-21670"
    ],
    "advisories": [
      "ASA-202107-5"
    ]
  },
  {
    "name": "AVG-2087",
    "packages": [
      "dovecot"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "2.3.14-2",
    "fixed": "2.3.15-1",
    "ticket": null,
    "issues": [
      "CVE-2021-33515",
      "CVE-2021-29157"
    ],
    "advisories": [
      "ASA-202106-56"
    ]
  },
  {
    "name": "AVG-2051",
    "packages": [
      "intel-ucode"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "20210216-1",
    "fixed": "20210608-1",
    "ticket": null,
    "issues": [
      "CVE-2020-24513",
      "CVE-2020-24512",
      "CVE-2020-24511",
      "CVE-2020-24489"
    ],
    "advisories": [
      "ASA-202106-34"
    ]
  },
  {
    "name": "AVG-2086",
    "packages": [
      "libesmtp"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.0.6-7",
    "fixed": "1.1.0-1",
    "ticket": "71292",
    "issues": [
      "CVE-2019-19977"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2082",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.0.2312.27-2",
    "fixed": "4.0.2312.33-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30557",
      "CVE-2021-30556",
      "CVE-2021-30555",
      "CVE-2021-30554"
    ],
    "advisories": [
      "ASA-202106-47"
    ]
  },
  {
    "name": "AVG-2081",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "91.0.4472.106-1",
    "fixed": "91.0.4472.114-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30557",
      "CVE-2021-30556",
      "CVE-2021-30555",
      "CVE-2021-30554"
    ],
    "advisories": [
      "ASA-202106-46",
      "ASA-202106-46"
    ]
  },
  {
    "name": "AVG-2055",
    "packages": [
      "connman"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.39-1",
    "fixed": "1.40-1",
    "ticket": null,
    "issues": [
      "CVE-2021-33833"
    ],
    "advisories": [
      "ASA-202106-44"
    ]
  },
  {
    "name": "AVG-1991",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "3.8.2259.42-1",
    "fixed": "4.0.2312.24-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30543",
      "CVE-2021-30542",
      "CVE-2021-30539",
      "CVE-2021-30538",
      "CVE-2021-30537",
      "CVE-2021-30536",
      "CVE-2021-30535",
      "CVE-2021-30534",
      "CVE-2021-30533",
      "CVE-2021-30532",
      "CVE-2021-30531",
      "CVE-2021-30530",
      "CVE-2021-30529",
      "CVE-2021-30527",
      "CVE-2021-30526",
      "CVE-2021-30525",
      "CVE-2021-30524",
      "CVE-2021-30523",
      "CVE-2021-30522"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2069",
    "packages": [
      "drupal"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "cross-site scripting",
    "affected": "9.1.7-1",
    "fixed": "9.1.10-1",
    "ticket": null,
    "issues": [
      "CVE-2021-33829"
    ],
    "advisories": [
      "ASA-202106-35"
    ]
  },
  {
    "name": "AVG-2041",
    "packages": [
      "apache"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "2.4.47-1",
    "fixed": "2.4.48-1",
    "ticket": null,
    "issues": [
      "CVE-2021-31618"
    ],
    "advisories": [
      "ASA-202106-23"
    ]
  },
  {
    "name": "AVG-2045",
    "packages": [
      "gitlab"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "information disclosure",
    "affected": "13.11.3-1",
    "fixed": "13.12.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22215"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2023",
    "packages": [
      "gitlab"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "13.11.3-1",
    "fixed": "13.12.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22221",
      "CVE-2021-22220",
      "CVE-2021-22219",
      "CVE-2021-22218",
      "CVE-2021-22217",
      "CVE-2021-22216",
      "CVE-2021-22214",
      "CVE-2021-22213",
      "CVE-2021-22181"
    ],
    "advisories": [
      "ASA-202106-21"
    ]
  },
  {
    "name": "AVG-2044",
    "packages": [
      "chromium"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "multiple issues",
    "affected": "90.0.4430.212-1",
    "fixed": "91.0.4472.77-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30540",
      "CVE-2021-30528",
      "CVE-2021-30521"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1990",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "90.0.4430.212-1",
    "fixed": "91.0.4472.77-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30543",
      "CVE-2021-30542",
      "CVE-2021-30539",
      "CVE-2021-30538",
      "CVE-2021-30537",
      "CVE-2021-30536",
      "CVE-2021-30535",
      "CVE-2021-30534",
      "CVE-2021-30533",
      "CVE-2021-30532",
      "CVE-2021-30531",
      "CVE-2021-30530",
      "CVE-2021-30529",
      "CVE-2021-30527",
      "CVE-2021-30526",
      "CVE-2021-30525",
      "CVE-2021-30524",
      "CVE-2021-30523",
      "CVE-2021-30522"
    ],
    "advisories": [
      "ASA-202106-2",
      "ASA-202106-2"
    ]
  },
  {
    "name": "AVG-2024",
    "packages": [
      "nextcloud"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "21.0.1-3",
    "fixed": "21.0.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32657",
      "CVE-2021-32656",
      "CVE-2021-32655",
      "CVE-2021-32654",
      "CVE-2021-32653",
      "CVE-2021-22915"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2035",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "78.10.2-1",
    "fixed": "78.11.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29967"
    ],
    "advisories": [
      "ASA-202106-22"
    ]
  },
  {
    "name": "AVG-2019",
    "packages": [
      "firefox"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "multiple issues",
    "affected": "88.0.1-1",
    "fixed": "89.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29965",
      "CVE-2021-29964",
      "CVE-2021-29963",
      "CVE-2021-29962"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2018",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "88.0.1-1",
    "fixed": "89.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29967",
      "CVE-2021-29966",
      "CVE-2021-29961",
      "CVE-2021-29960",
      "CVE-2021-29959"
    ],
    "advisories": [
      "ASA-202106-3"
    ]
  },
  {
    "name": "AVG-1819",
    "packages": [
      "code"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.55.2-1",
    "fixed": "1.56.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28477",
      "CVE-2021-28475",
      "CVE-2021-28473",
      "CVE-2021-28471",
      "CVE-2021-28469",
      "CVE-2021-28457"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1998",
    "packages": [
      "lib32-libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.76.1-1",
    "fixed": "7.77.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22901",
      "CVE-2021-22898"
    ],
    "advisories": [
      "ASA-202106-7"
    ]
  },
  {
    "name": "AVG-1997",
    "packages": [
      "libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.76.1-1",
    "fixed": "7.77.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22901",
      "CVE-2021-22898"
    ],
    "advisories": [
      "ASA-202106-6"
    ]
  },
  {
    "name": "AVG-1996",
    "packages": [
      "lib32-curl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.76.1-1",
    "fixed": "7.77.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22901",
      "CVE-2021-22898"
    ],
    "advisories": [
      "ASA-202106-5"
    ]
  },
  {
    "name": "AVG-1995",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.76.1-1",
    "fixed": "7.77.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22901",
      "CVE-2021-22898"
    ],
    "advisories": [
      "ASA-202106-4"
    ]
  },
  {
    "name": "AVG-2004",
    "packages": [
      "dhcp",
      "dhclient"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.4.2-2",
    "fixed": "4.4.2.P1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-25217"
    ],
    "advisories": [
      "ASA-202106-10",
      "ASA-202106-11"
    ]
  },
  {
    "name": "AVG-1983",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "4.14.3-1",
    "fixed": "4.14.4-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000410"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1981",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "86.0.4240.193-1",
    "fixed": "86.0.4240.198-1",
    "ticket": null,
    "issues": [
      "CVE-2020-16017",
      "CVE-2020-16013"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1969",
    "packages": [
      "websvn"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary command execution",
    "affected": "2.5-1",
    "fixed": "2.6.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32305"
    ],
    "advisories": [
      "ASA-202105-16"
    ]
  },
  {
    "name": "AVG-1975",
    "packages": [
      "squid"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "4.14-1",
    "fixed": "4.15-1",
    "ticket": null,
    "issues": [
      "CVE-2021-31808",
      "CVE-2021-31807",
      "CVE-2021-31806"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1973",
    "packages": [
      "argocd"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "information disclosure",
    "affected": "2.0.1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3557"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1972",
    "packages": [
      "runc"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "sandbox escape",
    "affected": "1.0.0rc94-1",
    "fixed": "1.0.0rc95-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30465"
    ],
    "advisories": [
      "ASA-202105-17"
    ]
  },
  {
    "name": "AVG-1968",
    "packages": [
      "libx11"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "insufficient validation",
    "affected": "1.7.0-4",
    "fixed": "1.7.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-31535"
    ],
    "advisories": [
      "ASA-202105-12"
    ]
  },
  {
    "name": "AVG-1911",
    "packages": [
      "exim"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.94-3",
    "fixed": "4.94.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28026",
      "CVE-2020-28025",
      "CVE-2020-28024",
      "CVE-2020-28023",
      "CVE-2020-28022",
      "CVE-2020-28021",
      "CVE-2020-28019",
      "CVE-2020-28018",
      "CVE-2020-28017",
      "CVE-2020-28016",
      "CVE-2020-28015",
      "CVE-2020-28014",
      "CVE-2020-28013",
      "CVE-2020-28012",
      "CVE-2020-28011",
      "CVE-2020-28010",
      "CVE-2020-28009",
      "CVE-2020-28008",
      "CVE-2020-28007"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1434",
    "packages": [
      "python-flask-security-too"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "cross-site request forgery",
    "affected": "3.3.3-3",
    "fixed": "4.0.1-1",
    "ticket": "70041",
    "issues": [
      "CVE-2021-21241"
    ],
    "advisories": [
      "ASA-202105-2"
    ]
  },
  {
    "name": "AVG-1003",
    "packages": [
      "inetutils"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.9.4-9",
    "fixed": "2.0-1",
    "ticket": "70040",
    "issues": [
      "CVE-2020-10188",
      "CVE-2019-0053"
    ],
    "advisories": [
      "ASA-202106-20"
    ]
  },
  {
    "name": "AVG-1949",
    "packages": [
      "squid"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "4.14-1",
    "fixed": "4.15-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28662",
      "CVE-2021-28652",
      "CVE-2021-28651"
    ],
    "advisories": [
      "ASA-202105-10"
    ]
  },
  {
    "name": "AVG-1955",
    "packages": [
      "prosody"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1:0.11.8-1",
    "fixed": "1:0.11.9-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32921",
      "CVE-2021-32920",
      "CVE-2021-32919",
      "CVE-2021-32918",
      "CVE-2021-32917"
    ],
    "advisories": [
      "ASA-202105-11"
    ]
  },
  {
    "name": "AVG-1937",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "3.8.2259.40-1",
    "fixed": "3.8.2259.42-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30520",
      "CVE-2021-30519",
      "CVE-2021-30518",
      "CVE-2021-30517",
      "CVE-2021-30516",
      "CVE-2021-30515",
      "CVE-2021-30514",
      "CVE-2021-30513",
      "CVE-2021-30512",
      "CVE-2021-30511",
      "CVE-2021-30510",
      "CVE-2021-30509",
      "CVE-2021-30508",
      "CVE-2021-30507",
      "CVE-2021-30506"
    ],
    "advisories": [
      "ASA-202105-8"
    ]
  },
  {
    "name": "AVG-1946",
    "packages": [
      "hedgedoc"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "cross-site scripting",
    "affected": "1.8.1-1",
    "fixed": "1.8.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29503"
    ],
    "advisories": [
      "ASA-202105-9"
    ]
  },
  {
    "name": "AVG-1871",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "90.0.4430.85-1",
    "fixed": "90.0.4430.93-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21233",
      "CVE-2021-21232",
      "CVE-2021-21231",
      "CVE-2021-21230",
      "CVE-2021-21229",
      "CVE-2021-21228",
      "CVE-2021-21227"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1936",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "90.0.4430.93-1",
    "fixed": "90.0.4430.212-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30520",
      "CVE-2021-30519",
      "CVE-2021-30518",
      "CVE-2021-30517",
      "CVE-2021-30516",
      "CVE-2021-30515",
      "CVE-2021-30514",
      "CVE-2021-30513",
      "CVE-2021-30512",
      "CVE-2021-30511",
      "CVE-2021-30510",
      "CVE-2021-30509",
      "CVE-2021-30508",
      "CVE-2021-30507",
      "CVE-2021-30506"
    ],
    "advisories": [
      "ASA-202105-7",
      "ASA-202105-7"
    ]
  },
  {
    "name": "AVG-1809",
    "packages": [
      "gradle",
      "gradle-src"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "6.8.3-1",
    "fixed": "7.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29429",
      "CVE-2021-29428",
      "CVE-2021-29427"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1917",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "88.0-1",
    "fixed": "88.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29952"
    ],
    "advisories": [
      "ASA-202105-5"
    ]
  },
  {
    "name": "AVG-1926",
    "packages": [
      "keycloak"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "12.0.4-1",
    "fixed": "13.0.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3513",
      "CVE-2021-20222",
      "CVE-2021-20202",
      "CVE-2020-27838",
      "CVE-2020-14302"
    ],
    "advisories": [
      "ASA-202105-6"
    ]
  },
  {
    "name": "AVG-1912",
    "packages": [
      "exim"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.91-2",
    "fixed": "4.92-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28020"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1888",
    "packages": [
      "gitlab"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "13.10.3-2",
    "fixed": "13.10.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22211",
      "CVE-2021-22210",
      "CVE-2021-22209",
      "CVE-2021-22208",
      "CVE-2021-22206"
    ],
    "advisories": [
      "ASA-202105-4"
    ]
  },
  {
    "name": "AVG-1858",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "3.7.2218.55-1",
    "fixed": "3.7.2218.58-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21224"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1827",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "89.0.4389.128-1",
    "fixed": "90.0.4430.72-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21221",
      "CVE-2021-21219",
      "CVE-2021-21218",
      "CVE-2021-21217",
      "CVE-2021-21216",
      "CVE-2021-21215",
      "CVE-2021-21214",
      "CVE-2021-21213",
      "CVE-2021-21210",
      "CVE-2021-21209",
      "CVE-2021-21207",
      "CVE-2021-21203",
      "CVE-2021-21202",
      "CVE-2021-21201"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1817",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "3.7.2218.52-1",
    "fixed": "3.7.2218.55-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21220",
      "CVE-2021-21206"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1828",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "3.7.2218.58-1",
    "fixed": "3.8.2259.37-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21233",
      "CVE-2021-21232",
      "CVE-2021-21231",
      "CVE-2021-21230",
      "CVE-2021-21229",
      "CVE-2021-21228",
      "CVE-2021-21227",
      "CVE-2021-21226",
      "CVE-2021-21225",
      "CVE-2021-21223",
      "CVE-2021-21222",
      "CVE-2021-21221",
      "CVE-2021-21219",
      "CVE-2021-21218",
      "CVE-2021-21217",
      "CVE-2021-21216",
      "CVE-2021-21215",
      "CVE-2021-21214",
      "CVE-2021-21213",
      "CVE-2021-21210",
      "CVE-2021-21209",
      "CVE-2021-21207",
      "CVE-2021-21203",
      "CVE-2021-21202",
      "CVE-2021-21201"
    ],
    "advisories": [
      "ASA-202104-2"
    ]
  },
  {
    "name": "AVG-1846",
    "packages": [
      "virtualbox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "6.1.18-2",
    "fixed": "6.1.20-1",
    "ticket": null,
    "issues": [
      "CVE-2021-2321",
      "CVE-2021-2310",
      "CVE-2021-2309",
      "CVE-2021-2306",
      "CVE-2021-2297",
      "CVE-2021-2296",
      "CVE-2021-2291",
      "CVE-2021-2287",
      "CVE-2021-2286",
      "CVE-2021-2285",
      "CVE-2021-2284",
      "CVE-2021-2283",
      "CVE-2021-2282",
      "CVE-2021-2281",
      "CVE-2021-2280",
      "CVE-2021-2279",
      "CVE-2021-2266",
      "CVE-2021-2250",
      "CVE-2021-2145"
    ],
    "advisories": [
      "ASA-202104-9"
    ]
  },
  {
    "name": "AVG-1890",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "9.16.13-1",
    "fixed": "9.16.15-1",
    "ticket": null,
    "issues": [
      "CVE-2021-25216",
      "CVE-2021-25215",
      "CVE-2021-25214"
    ],
    "advisories": [
      "ASA-202104-10"
    ]
  },
  {
    "name": "AVG-1816",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "89.0.4389.114-1",
    "fixed": "89.0.4389.128-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21220",
      "CVE-2021-21206"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1877",
    "packages": [
      "chromium"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "multiple issues",
    "affected": "89.0.4389.128-1",
    "fixed": "90.0.4430.72-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21212",
      "CVE-2021-21211",
      "CVE-2021-21208",
      "CVE-2021-21205",
      "CVE-2021-21204"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1870",
    "packages": [
      "virtualbox"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "6.1.18-2",
    "fixed": "6.1.20-1",
    "ticket": null,
    "issues": [
      "CVE-2021-2264"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1836",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "78.9.1-3",
    "fixed": "78.10.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29948",
      "CVE-2021-29946",
      "CVE-2021-24002",
      "CVE-2021-23999",
      "CVE-2021-23998",
      "CVE-2021-23995",
      "CVE-2021-23994",
      "CVE-2021-23961"
    ],
    "advisories": [
      "ASA-202104-4"
    ]
  },
  {
    "name": "AVG-1844",
    "packages": [
      "libupnp"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "content spoofing",
    "affected": "1.14.5-1",
    "fixed": "1.14.6-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29462"
    ],
    "advisories": [
      "ASA-202104-8"
    ]
  },
  {
    "name": "AVG-1843",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "90.0.4430.72-2",
    "fixed": "90.0.4430.85-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21226",
      "CVE-2021-21225",
      "CVE-2021-21224",
      "CVE-2021-21223",
      "CVE-2021-21222"
    ],
    "advisories": [
      "ASA-202104-7",
      "ASA-202104-7"
    ]
  },
  {
    "name": "AVG-1841",
    "packages": [
      "jenkins"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "denial of service",
    "affected": "2.285-1",
    "fixed": "2.286-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28165"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1834",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "87.0-2",
    "fixed": "88.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29947",
      "CVE-2021-29946",
      "CVE-2021-24002",
      "CVE-2021-24001",
      "CVE-2021-24000",
      "CVE-2021-23999",
      "CVE-2021-23998",
      "CVE-2021-23997",
      "CVE-2021-23996",
      "CVE-2021-23995",
      "CVE-2021-23994"
    ],
    "advisories": [
      "ASA-202104-3"
    ]
  },
  {
    "name": "AVG-1756",
    "packages": [
      "lib32-libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.75.0-1",
    "fixed": "7.76.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22890",
      "CVE-2021-22876"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1755",
    "packages": [
      "libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.75.0-1",
    "fixed": "7.76.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22890",
      "CVE-2021-22876"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1754",
    "packages": [
      "lib32-curl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.75.0-1",
    "fixed": "7.76.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22890",
      "CVE-2021-22876"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1753",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.75.0-1",
    "fixed": "7.76.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22890",
      "CVE-2021-22876"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1752",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "3.7.2218.49-1",
    "fixed": "3.7.2218.52-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21199",
      "CVE-2021-21198",
      "CVE-2021-21197",
      "CVE-2021-21195",
      "CVE-2021-21194"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1751",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "89.0.4389.90-1",
    "fixed": "89.0.4389.114-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21199",
      "CVE-2021-21198",
      "CVE-2021-21197",
      "CVE-2021-21195",
      "CVE-2021-21194"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1820",
    "packages": [
      "code"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "1.54.3-3",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-27064"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1691",
    "packages": [
      "python-urllib3"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "certificate verification bypass",
    "affected": "1.26.3-1",
    "fixed": "1.26.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28363"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1731",
    "packages": [
      "spamassassin"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary command execution",
    "affected": "3.4.4-3",
    "fixed": "3.4.5-1",
    "ticket": null,
    "issues": [
      "CVE-2020-1946"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1795",
    "packages": [
      "chromium"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "89.0.4389.90-1",
    "fixed": "89.0.4389.114-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21196"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1745",
    "packages": [
      "wpewebkit"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.30.6-1",
    "fixed": "2.32.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-1871",
      "CVE-2021-1844",
      "CVE-2021-1788"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1729",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "78.8.1-1",
    "fixed": "78.9.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-23987",
      "CVE-2021-23984",
      "CVE-2021-23982",
      "CVE-2021-23981"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1728",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "86.0.1-1",
    "fixed": "87.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-23988",
      "CVE-2021-23987",
      "CVE-2021-23986",
      "CVE-2021-23985",
      "CVE-2021-23984",
      "CVE-2021-23983",
      "CVE-2021-23982",
      "CVE-2021-23981"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1763",
    "packages": [
      "nettle"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "signature forgery",
    "affected": "3.7.1-1",
    "fixed": "3.7.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20305"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1688",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.10.23-1",
    "fixed": "5.10.24-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29265",
      "CVE-2021-28660",
      "CVE-2021-28375"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1687",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.11.6.hardened1-1",
    "fixed": "5.11.7.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29265",
      "CVE-2021-28660",
      "CVE-2021-28375"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1686",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.11.6.zen1-1",
    "fixed": "5.11.7.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29265",
      "CVE-2021-28660",
      "CVE-2021-28375"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1685",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.11.6.arch1-1",
    "fixed": "5.11.7.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29265",
      "CVE-2021-28660",
      "CVE-2021-28375"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1736",
    "packages": [
      "openssl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.1.1.j-1",
    "fixed": "1.1.1.k-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3450",
      "CVE-2021-3449"
    ],
    "advisories": [
      "ASA-202103-10"
    ]
  },
  {
    "name": "AVG-1722",
    "packages": [
      "wpewebkit"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.30.5-1",
    "fixed": "2.30.6-1",
    "ticket": null,
    "issues": [
      "CVE-2021-1870",
      "CVE-2021-1801",
      "CVE-2021-1799",
      "CVE-2021-1789",
      "CVE-2021-1765",
      "CVE-2020-29623",
      "CVE-2020-27918"
    ],
    "advisories": [
      "ASA-202103-25"
    ]
  },
  {
    "name": "AVG-1689",
    "packages": [
      "gitea"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "cross-site scripting",
    "affected": "1.13.2-1",
    "fixed": "1.13.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28378"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1325",
    "packages": [
      "groovy"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "2.5.13-1",
    "fixed": "2.5.14-1",
    "ticket": "68865",
    "issues": [
      "CVE-2020-17521"
    ],
    "advisories": [
      "ASA-202103-14"
    ]
  },
  {
    "name": "AVG-1356",
    "packages": [
      "awstats"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "directory traversal",
    "affected": "7.8-2",
    "fixed": "7.8-3",
    "ticket": "69301",
    "issues": [
      "CVE-2020-35176"
    ],
    "advisories": [
      "ASA-202103-15"
    ]
  },
  {
    "name": "AVG-1554",
    "packages": [
      "libebml"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.4.1-1",
    "fixed": "1.4.2-1",
    "ticket": "70039",
    "issues": [
      "CVE-2021-3405"
    ],
    "advisories": [
      "ASA-202103-18"
    ]
  },
  {
    "name": "AVG-1633",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "3.6.2165.40-1",
    "fixed": "3.7.2218.45-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21193",
      "CVE-2021-21192",
      "CVE-2021-21191",
      "CVE-2021-21190",
      "CVE-2021-21189",
      "CVE-2021-21188",
      "CVE-2021-21187",
      "CVE-2021-21186",
      "CVE-2021-21185",
      "CVE-2021-21184",
      "CVE-2021-21183",
      "CVE-2021-21182",
      "CVE-2021-21181",
      "CVE-2021-21180",
      "CVE-2021-21179",
      "CVE-2021-21178",
      "CVE-2021-21177",
      "CVE-2021-21176",
      "CVE-2021-21175",
      "CVE-2021-21174",
      "CVE-2021-21173",
      "CVE-2021-21172",
      "CVE-2021-21171",
      "CVE-2021-21170",
      "CVE-2021-21169",
      "CVE-2021-21168",
      "CVE-2021-21167",
      "CVE-2021-21166",
      "CVE-2021-21165",
      "CVE-2021-21163",
      "CVE-2021-21162",
      "CVE-2021-21161",
      "CVE-2021-21160",
      "CVE-2021-21159",
      "CVE-2020-27844"
    ],
    "advisories": [
      "ASA-202103-19"
    ]
  },
  {
    "name": "AVG-1698",
    "packages": [
      "dotnet-sdk",
      "dotnet-runtime"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.0.3.sdk103-2",
    "fixed": "5.0.4.sdk104-1",
    "ticket": "69317",
    "issues": [
      "CVE-2021-26701"
    ],
    "advisories": [
      "ASA-202103-20",
      "ASA-202103-21"
    ]
  },
  {
    "name": "AVG-1700",
    "packages": [
      "libtpms"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "incorrect calculation",
    "affected": "0.8.1-1",
    "fixed": "0.8.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3446"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1449",
    "packages": [
      "dotnet-sdk",
      "dotnet-runtime"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "3.1.8.sdk108-1",
    "fixed": "5.0.3.sdk103-2",
    "ticket": "69317",
    "issues": [
      "CVE-2021-24112",
      "CVE-2021-1723",
      "CVE-2021-1721"
    ],
    "advisories": [
      "ASA-202103-16",
      "ASA-202103-17"
    ]
  },
  {
    "name": "AVG-1684",
    "packages": [
      "tt-rss"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "authentication bypass",
    "affected": "2:r10198.6d8f2221b-2",
    "fixed": "2:r10820.4e81233ac-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28373"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1631",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "88.0.4324.182-1",
    "fixed": "89.0.4389.72-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21190",
      "CVE-2021-21189",
      "CVE-2021-21188",
      "CVE-2021-21187",
      "CVE-2021-21186",
      "CVE-2021-21185",
      "CVE-2021-21184",
      "CVE-2021-21183",
      "CVE-2021-21182",
      "CVE-2021-21181",
      "CVE-2021-21180",
      "CVE-2021-21179",
      "CVE-2021-21178",
      "CVE-2021-21177",
      "CVE-2021-21176",
      "CVE-2021-21175",
      "CVE-2021-21174",
      "CVE-2021-21173",
      "CVE-2021-21172",
      "CVE-2021-21171",
      "CVE-2021-21170",
      "CVE-2021-21169",
      "CVE-2021-21168",
      "CVE-2021-21167",
      "CVE-2021-21166",
      "CVE-2021-21165",
      "CVE-2021-21163",
      "CVE-2021-21162",
      "CVE-2021-21161",
      "CVE-2021-21160",
      "CVE-2021-21159",
      "CVE-2020-27844"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1601",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "78.7.1-1",
    "fixed": "78.8.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-23978",
      "CVE-2021-23973",
      "CVE-2021-23969",
      "CVE-2021-23968"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1683",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "89.0.4389.82-2",
    "fixed": "89.0.4389.90-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21193",
      "CVE-2021-21192",
      "CVE-2021-21191"
    ],
    "advisories": [
      "ASA-202103-9",
      "ASA-202103-9"
    ]
  },
  {
    "name": "AVG-1599",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "85.0.2-1",
    "fixed": "86.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-23979",
      "CVE-2021-23978",
      "CVE-2021-23975",
      "CVE-2021-23974",
      "CVE-2021-23973",
      "CVE-2021-23972",
      "CVE-2021-23971",
      "CVE-2021-23970",
      "CVE-2021-23969",
      "CVE-2021-23968"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1585",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "3.6.2165.36-1",
    "fixed": "3.6.2165.40-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21157",
      "CVE-2021-21156",
      "CVE-2021-21155",
      "CVE-2021-21154",
      "CVE-2021-21153",
      "CVE-2021-21152",
      "CVE-2021-21151",
      "CVE-2021-21150",
      "CVE-2021-21149"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1595",
    "packages": [
      "jenkins"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "2.279-1",
    "fixed": "2.280-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22112"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1584",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "88.0.4324.150-1",
    "fixed": "88.0.4324.182-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21157",
      "CVE-2021-21156",
      "CVE-2021-21155",
      "CVE-2021-21154",
      "CVE-2021-21153",
      "CVE-2021-21152",
      "CVE-2021-21151",
      "CVE-2021-21150",
      "CVE-2021-21149"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1632",
    "packages": [
      "chromium"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "insufficient validation",
    "affected": "88.0.4324.182-1",
    "fixed": "89.0.4389.72-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21164",
      "CVE-2021-21158"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1598",
    "packages": [
      "isync"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "directory traversal",
    "affected": "1.3.3-1",
    "fixed": "1.3.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20247"
    ],
    "advisories": [
      "ASA-202102-38"
    ]
  },
  {
    "name": "AVG-1596",
    "packages": [
      "ipmitool"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.8.18-6",
    "fixed": "1.8.18-7",
    "ticket": "69708",
    "issues": [
      "CVE-2020-5208"
    ],
    "advisories": [
      "ASA-202102-39"
    ]
  },
  {
    "name": "AVG-1589",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "9.16.11-1",
    "fixed": "9.16.12-1",
    "ticket": null,
    "issues": [
      "CVE-2020-8625"
    ],
    "advisories": [
      "ASA-202102-40"
    ]
  },
  {
    "name": "AVG-1578",
    "packages": [
      "keycloak"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "cross-site scripting",
    "affected": "12.0.2-1",
    "fixed": "12.0.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20195"
    ],
    "advisories": [
      "ASA-202102-29"
    ]
  },
  {
    "name": "AVG-1247",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.4.93-1",
    "fixed": "5.4.93-2",
    "ticket": "68257",
    "issues": [
      "CVE-2020-16119"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1545",
    "packages": [
      "firejail"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "0.9.64.2-1",
    "fixed": "0.9.64.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-26910"
    ],
    "advisories": [
      "ASA-202102-26"
    ]
  },
  {
    "name": "AVG-1551",
    "packages": [
      "roundcubemail"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "cross-site scripting",
    "affected": "1.4.10-2",
    "fixed": "1.4.11-1",
    "ticket": null,
    "issues": [
      "CVE-2021-26925"
    ],
    "advisories": [
      "ASA-202102-27"
    ]
  },
  {
    "name": "AVG-1530",
    "packages": [
      "wpa_supplicant"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2:2.9-7",
    "fixed": "2:2.9-8",
    "ticket": "69525",
    "issues": [
      "CVE-2021-0326"
    ],
    "advisories": [
      "ASA-202102-25"
    ]
  },
  {
    "name": "AVG-1032",
    "packages": [
      "kea"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "1.5.0-14",
    "fixed": "1.8.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-6474",
      "CVE-2019-6473",
      "CVE-2019-6472"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1504",
    "packages": [
      "opendoas"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "6.6.1-2",
    "fixed": "6.8.1-2",
    "ticket": null,
    "issues": [
      "CVE-2019-25016"
    ],
    "advisories": [
      "ASA-202102-8"
    ]
  },
  {
    "name": "AVG-1433",
    "packages": [
      "cacti"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.2.16-1",
    "fixed": "1.2.16-2",
    "ticket": "69300",
    "issues": [
      "CVE-2020-35701"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1428",
    "packages": [
      "libetpan"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "man-in-the-middle",
    "affected": "1.9.4-2",
    "fixed": "1.9.4-3",
    "ticket": "69284",
    "issues": [
      "CVE-2020-15953"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1411",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.4.87-1",
    "fixed": "5.4.88-1",
    "ticket": null,
    "issues": [
      "CVE-2020-36158"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1409",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.10.5.zen1-1",
    "fixed": "5.10.6.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-36158"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1410",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.10.5.a-2",
    "fixed": "5.10.6.a-1",
    "ticket": null,
    "issues": [
      "CVE-2020-36158"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1408",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.10.5.arch1-1",
    "fixed": "5.10.6.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-36158"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1496",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "78.6.1-1",
    "fixed": "78.7.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-23964",
      "CVE-2021-23960",
      "CVE-2021-23954",
      "CVE-2021-23953",
      "CVE-2020-26976",
      "CVE-2020-15685"
    ],
    "advisories": [
      "ASA-202102-2"
    ]
  },
  {
    "name": "AVG-1246",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.9.7.zen1-1",
    "fixed": "5.10.2.zen1-1",
    "ticket": "68257",
    "issues": [
      "CVE-2020-16119"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1244",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.9.7.arch1-1",
    "fixed": "5.10.2.arch1-1",
    "ticket": "68257",
    "issues": [
      "CVE-2020-16119"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1245",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.9.8.a-1",
    "fixed": "5.9.9.a-1",
    "ticket": "68257",
    "issues": [
      "CVE-2020-16119"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1432",
    "packages": [
      "sudo"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "arbitrary filesystem access",
    "affected": "1.9.4.p2-2",
    "fixed": "1.9.5.p1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-23240"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1492",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "84.0.2-1",
    "fixed": "85.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-23965",
      "CVE-2021-23964",
      "CVE-2021-23963",
      "CVE-2021-23962",
      "CVE-2021-23961",
      "CVE-2021-23960",
      "CVE-2021-23958",
      "CVE-2021-23956",
      "CVE-2021-23955",
      "CVE-2021-23954",
      "CVE-2021-23953"
    ],
    "advisories": [
      "ASA-202102-1"
    ]
  },
  {
    "name": "AVG-1483",
    "packages": [
      "virtualbox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "6.1.16-4",
    "fixed": "6.1.18-1",
    "ticket": null,
    "issues": [
      "CVE-2021-2131",
      "CVE-2021-2130",
      "CVE-2021-2129",
      "CVE-2021-2128",
      "CVE-2021-2127",
      "CVE-2021-2126",
      "CVE-2021-2125",
      "CVE-2021-2124",
      "CVE-2021-2123",
      "CVE-2021-2121",
      "CVE-2021-2120",
      "CVE-2021-2119",
      "CVE-2021-2112",
      "CVE-2021-2111",
      "CVE-2021-2086",
      "CVE-2021-2074",
      "CVE-2021-2073"
    ],
    "advisories": [
      "ASA-202101-37"
    ]
  },
  {
    "name": "AVG-1470",
    "packages": [
      "dnsmasq"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.82-2",
    "fixed": "2.83-1",
    "ticket": null,
    "issues": [
      "CVE-2020-25687",
      "CVE-2020-25686",
      "CVE-2020-25685",
      "CVE-2020-25684",
      "CVE-2020-25683",
      "CVE-2020-25682",
      "CVE-2020-25681"
    ],
    "advisories": [
      "ASA-202101-38"
    ]
  },
  {
    "name": "AVG-1457",
    "packages": [
      "erlang"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "certificate verification bypass",
    "affected": "23.2-3",
    "fixed": "23.2.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-35733"
    ],
    "advisories": [
      "ASA-202101-39"
    ]
  },
  {
    "name": "AVG-1458",
    "packages": [
      "git-lfs"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "arbitrary command execution",
    "affected": "2.13.1-1",
    "fixed": "2.13.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21237"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1416",
    "packages": [
      "gitlab"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "13.7.1-1",
    "fixed": "13.7.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22171",
      "CVE-2021-22168",
      "CVE-2021-22167",
      "CVE-2021-22166",
      "CVE-2020-26414"
    ],
    "advisories": [
      "ASA-202101-10"
    ]
  },
  {
    "name": "AVG-1454",
    "packages": [
      "flatpak"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "sandbox escape",
    "affected": "1.9.2-1",
    "fixed": "1.10.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21261"
    ],
    "advisories": [
      "ASA-202101-40"
    ]
  },
  {
    "name": "AVG-1452",
    "packages": [
      "tomcat9"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "9.0.39-2",
    "fixed": "9.0.40-1",
    "ticket": null,
    "issues": [
      "CVE-2021-24122"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1446",
    "packages": [
      "jenkins"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.274-1",
    "fixed": "2.275-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21611",
      "CVE-2021-21610",
      "CVE-2021-21609",
      "CVE-2021-21608",
      "CVE-2021-21607",
      "CVE-2021-21606",
      "CVE-2021-21605",
      "CVE-2021-21604",
      "CVE-2021-21603",
      "CVE-2021-21602"
    ],
    "advisories": [
      "ASA-202101-41"
    ]
  },
  {
    "name": "AVG-1430",
    "packages": [
      "coturn"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "insufficient validation",
    "affected": "4.5.1.3-2",
    "fixed": "4.5.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26262"
    ],
    "advisories": [
      "ASA-202101-21"
    ]
  },
  {
    "name": "AVG-1424",
    "packages": [
      "vivaldi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "3.5.2115.81-1",
    "fixed": "3.5.2115.87-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21116",
      "CVE-2021-21115",
      "CVE-2021-21114",
      "CVE-2021-21113",
      "CVE-2021-21112",
      "CVE-2021-21111",
      "CVE-2021-21110",
      "CVE-2021-21109",
      "CVE-2021-21108",
      "CVE-2021-21107",
      "CVE-2021-21106",
      "CVE-2020-16043",
      "CVE-2020-15995"
    ],
    "advisories": [
      "ASA-202101-20"
    ]
  },
  {
    "name": "AVG-1419",
    "packages": [
      "python-pwntools"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.3.0-2",
    "fixed": "4.3.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28468"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1418",
    "packages": [
      "nvidia-utils"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "multiple issues",
    "affected": "455.45.01-1",
    "fixed": "460.32.03-1",
    "ticket": null,
    "issues": [
      "CVE-2021-1055",
      "CVE-2021-1054",
      "CVE-2021-1051"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1417",
    "packages": [
      "nvidia-utils"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "455.45.01-1",
    "fixed": "460.32.03-1",
    "ticket": null,
    "issues": [
      "CVE-2021-1056",
      "CVE-2021-1053",
      "CVE-2021-1052"
    ],
    "advisories": [
      "ASA-202101-19"
    ]
  },
  {
    "name": "AVG-1414",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "87.0.4280.88-3",
    "fixed": "87.0.4280.141-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21116",
      "CVE-2021-21115",
      "CVE-2021-21114",
      "CVE-2021-21113",
      "CVE-2021-21112",
      "CVE-2021-21111",
      "CVE-2021-21110",
      "CVE-2021-21109",
      "CVE-2021-21108",
      "CVE-2021-21107",
      "CVE-2021-21106",
      "CVE-2020-16043",
      "CVE-2020-15995"
    ],
    "advisories": [
      "ASA-202101-6",
      "ASA-202101-6"
    ]
  },
  {
    "name": "AVG-1386",
    "packages": [
      "mbedtls"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "private key recovery",
    "affected": "2.16.7-1",
    "fixed": "2.25.0-1",
    "ticket": "69128",
    "issues": [
      "CVE-2020-16150"
    ],
    "advisories": [
      "ASA-202101-7"
    ]
  },
  {
    "name": "AVG-1400",
    "packages": [
      "nodejs"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "15.5.0-1",
    "fixed": "15.5.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-8287",
      "CVE-2020-8265"
    ],
    "advisories": [
      "ASA-202101-16"
    ]
  },
  {
    "name": "AVG-1404",
    "packages": [
      "nodejs"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "denial of service",
    "affected": "15.5.0-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-1971"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1372",
    "packages": [
      "bcprov"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "authentication bypass",
    "affected": "1.66-1",
    "fixed": "1.67-1",
    "ticket": "69025",
    "issues": [
      "CVE-2020-28052"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1398",
    "packages": [
      "dovecot"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.3.11.3-3",
    "fixed": "2.3.13-1",
    "ticket": null,
    "issues": [
      "CVE-2020-25275",
      "CVE-2020-24386"
    ],
    "advisories": [
      "ASA-202101-4"
    ]
  },
  {
    "name": "AVG-1382",
    "packages": [
      "poppler"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "20.12.1-1",
    "fixed": "21.01.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-35702"
    ],
    "advisories": [
      "ASA-202101-3"
    ]
  },
  {
    "name": "AVG-1388",
    "packages": [
      "roundcubemail"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "cross-site scripting",
    "affected": "1.4.9-1",
    "fixed": "1.4.10-1",
    "ticket": "69131",
    "issues": [
      "CVE-2020-35730"
    ],
    "advisories": [
      "ASA-202101-2"
    ]
  },
  {
    "name": "AVG-1381",
    "packages": [
      "opensmtpd"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "6.7.1p1-6",
    "fixed": "6.8.0p2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-35680",
      "CVE-2020-35679"
    ],
    "advisories": [
      "ASA-202101-18"
    ]
  },
  {
    "name": "AVG-1374",
    "packages": [
      "rsync"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "man-in-the-middle",
    "affected": "3.2.3-1",
    "fixed": "3.2.3-2",
    "ticket": "69051",
    "issues": [
      "CVE-2020-14387"
    ],
    "advisories": [
      "ASA-202101-1"
    ]
  },
  {
    "name": "AVG-1160",
    "packages": [
      "json-c"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "0.14-4",
    "fixed": "0.15-1",
    "ticket": "66678",
    "issues": [
      "CVE-2020-12762"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1315",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "78.5.0-1",
    "fixed": "78.6.0-1",
    "ticket": "68853",
    "issues": [
      "CVE-2020-35113",
      "CVE-2020-35111",
      "CVE-2020-26978",
      "CVE-2020-26974",
      "CVE-2020-26973",
      "CVE-2020-26971",
      "CVE-2020-26970",
      "CVE-2020-16042"
    ],
    "advisories": [
      "ASA-202012-23"
    ]
  },
  {
    "name": "AVG-1362",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "83.0-2",
    "fixed": "84.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-35114",
      "CVE-2020-35113",
      "CVE-2020-35111",
      "CVE-2020-26979",
      "CVE-2020-26978",
      "CVE-2020-26976",
      "CVE-2020-26974",
      "CVE-2020-26973",
      "CVE-2020-26972",
      "CVE-2020-26971",
      "CVE-2020-16042"
    ],
    "advisories": [
      "ASA-202012-25"
    ]
  },
  {
    "name": "AVG-1353",
    "packages": [
      "go-ethereum"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "incorrect calculation",
    "affected": "1.9.19-1",
    "fixed": "1.9.20-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26265"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1321",
    "packages": [
      "minidlna"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.2.1-5",
    "fixed": "1.3.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28926"
    ],
    "advisories": [
      "ASA-202012-15"
    ]
  },
  {
    "name": "AVG-1335",
    "packages": [
      "openssl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "1.1.1.h-2",
    "fixed": "1.1.1.i-1",
    "ticket": null,
    "issues": [
      "CVE-2020-1971"
    ],
    "advisories": [
      "ASA-202012-24"
    ]
  },
  {
    "name": "AVG-1323",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "87.0.4280.66-1",
    "fixed": "87.0.4280.88-1",
    "ticket": null,
    "issues": [
      "CVE-2020-16042",
      "CVE-2020-16041",
      "CVE-2020-16040",
      "CVE-2020-16039",
      "CVE-2020-16038",
      "CVE-2020-16037"
    ],
    "advisories": [
      "ASA-202012-14",
      "ASA-202012-14"
    ]
  },
  {
    "name": "AVG-1309",
    "packages": [
      "containerd"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "1.4.2-2",
    "fixed": "1.4.3-1",
    "ticket": null,
    "issues": [
      "CVE-2020-15257"
    ],
    "advisories": [
      "ASA-202012-8"
    ]
  },
  {
    "name": "AVG-1259",
    "packages": [
      "blueman"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "2.1.3-1",
    "fixed": "2.1.4-1",
    "ticket": "68563",
    "issues": [
      "CVE-2020-15238"
    ],
    "advisories": [
      "ASA-202012-12"
    ]
  },
  {
    "name": "AVG-1297",
    "packages": [
      "pam"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "authentication bypass",
    "affected": "1.5.0-1",
    "fixed": "1.5.0-2",
    "ticket": null,
    "issues": [
      "CVE-2020-27780"
    ],
    "advisories": [
      "ASA-202012-13"
    ]
  },
  {
    "name": "AVG-1296",
    "packages": [
      "matrix-synapse"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "1.19.1-1",
    "fixed": "1.20.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26890"
    ],
    "advisories": [
      "ASA-202011-23",
      "ASA-202011-23"
    ]
  },
  {
    "name": "AVG-1289",
    "packages": [
      "neomutt"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "silent downgrade",
    "affected": "20200925-1",
    "fixed": "20201120-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28896"
    ],
    "advisories": [
      "ASA-202011-24"
    ]
  },
  {
    "name": "AVG-1288",
    "packages": [
      "mutt"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "silent downgrade",
    "affected": "2.0.1-1",
    "fixed": "2.0.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28896"
    ],
    "advisories": [
      "ASA-202011-25"
    ]
  },
  {
    "name": "AVG-1277",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "86.0.4240.193-1",
    "fixed": "87.0.4280.66-1",
    "ticket": null,
    "issues": [
      "CVE-2020-16036",
      "CVE-2020-16035",
      "CVE-2020-16034",
      "CVE-2020-16033",
      "CVE-2020-16032",
      "CVE-2020-16031",
      "CVE-2020-16030",
      "CVE-2020-16029",
      "CVE-2020-16028",
      "CVE-2020-16027",
      "CVE-2020-16026",
      "CVE-2020-16025",
      "CVE-2020-16024",
      "CVE-2020-16023",
      "CVE-2020-16022",
      "CVE-2020-16021",
      "CVE-2020-16020",
      "CVE-2020-16019",
      "CVE-2020-16018",
      "CVE-2020-16015",
      "CVE-2020-16014",
      "CVE-2020-16012"
    ],
    "advisories": [
      "ASA-202011-11",
      "ASA-202011-11"
    ]
  },
  {
    "name": "AVG-1276",
    "packages": [
      "postgresql"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "12.4-2",
    "fixed": "12.5-1",
    "ticket": null,
    "issues": [
      "CVE-2020-25696",
      "CVE-2020-25695",
      "CVE-2020-25694"
    ],
    "advisories": [
      "ASA-202011-14"
    ]
  },
  {
    "name": "AVG-1278",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2:1.15.4-1",
    "fixed": "2:1.15.5-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28367",
      "CVE-2020-28366",
      "CVE-2020-28362"
    ],
    "advisories": [
      "ASA-202011-16"
    ]
  },
  {
    "name": "AVG-1267",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "86.0.4240.183-1",
    "fixed": "86.0.4240.193-1",
    "ticket": null,
    "issues": [
      "CVE-2020-16016"
    ],
    "advisories": [
      "ASA-202011-9",
      "ASA-202011-9"
    ]
  },
  {
    "name": "AVG-1264",
    "packages": [
      "gdm"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "3.38.1-3",
    "fixed": "3.38.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-16125"
    ],
    "advisories": [
      "ASA-202011-5"
    ]
  },
  {
    "name": "AVG-1255",
    "packages": [
      "lib32-freetype2"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.10.3-1",
    "fixed": "2.10.4-1",
    "ticket": null,
    "issues": [
      "CVE-2020-15999"
    ],
    "advisories": [
      "ASA-202010-11"
    ]
  },
  {
    "name": "AVG-1254",
    "packages": [
      "freetype2"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.10.3-1",
    "fixed": "2.10.4-1",
    "ticket": null,
    "issues": [
      "CVE-2020-15999"
    ],
    "advisories": [
      "ASA-202010-10"
    ]
  },
  {
    "name": "AVG-1251",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.8.14.a-1",
    "fixed": "5.8.16.a-1",
    "ticket": null,
    "issues": [
      "CVE-2020-24490",
      "CVE-2020-12352",
      "CVE-2020-12351"
    ],
    "advisories": [
      "ASA-202010-9"
    ]
  },
  {
    "name": "AVG-1253",
    "packages": [
      "kpmcore"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.1.0-1",
    "fixed": "4.2.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-27187"
    ],
    "advisories": [
      "ASA-202010-8"
    ]
  },
  {
    "name": "AVG-1250",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.4.71-1",
    "fixed": "5.4.72-1",
    "ticket": null,
    "issues": [
      "CVE-2020-24490",
      "CVE-2020-12352",
      "CVE-2020-12351"
    ],
    "advisories": [
      "ASA-202010-4"
    ]
  },
  {
    "name": "AVG-1249",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.9.zen1-1",
    "fixed": "5.9.1.zen2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-24490",
      "CVE-2020-12352",
      "CVE-2020-12351"
    ],
    "advisories": [
      "ASA-202010-3"
    ]
  },
  {
    "name": "AVG-1248",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.9.arch1-1",
    "fixed": "5.9.1.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-24490",
      "CVE-2020-12352",
      "CVE-2020-12351"
    ],
    "advisories": [
      "ASA-202010-2"
    ]
  },
  {
    "name": "AVG-1252",
    "packages": [
      "matrix-synapse"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "cross-site scripting",
    "affected": "1.20.1-1",
    "fixed": "1.21.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26891"
    ],
    "advisories": [
      "ASA-202011-4",
      "ASA-202011-4"
    ]
  },
  {
    "name": "AVG-1243",
    "packages": [
      "powerdns-recursor"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "4.3.4-1",
    "fixed": "4.3.5-1",
    "ticket": null,
    "issues": [
      "CVE-2020-25829"
    ],
    "advisories": [
      "ASA-202010-6"
    ]
  },
  {
    "name": "AVG-1241",
    "packages": [
      "kdeconnect"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "20.08.1-1",
    "fixed": "20.08.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26164"
    ],
    "advisories": [
      "ASA-202010-7"
    ]
  },
  {
    "name": "AVG-1207",
    "packages": [
      "lua"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.4.0-2",
    "fixed": "5.4.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-15889",
      "CVE-2020-15888"
    ],
    "advisories": [
      "ASA-202010-5"
    ]
  },
  {
    "name": "AVG-1222",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.8.7.arch1-1",
    "fixed": "5.8.8.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-14386"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1223",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.4.63-1",
    "fixed": "5.4.64-1",
    "ticket": null,
    "issues": [
      "CVE-2020-14386"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1224",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.8.7.zen1-1",
    "fixed": "5.8.8.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-14386"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1237",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.7.19.a-1",
    "fixed": "5.8.a-1",
    "ticket": null,
    "issues": [
      "CVE-2020-14386"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1220",
    "packages": [
      "lib32-zeromq"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "4.3.2-1",
    "fixed": "4.3.3-1",
    "ticket": null,
    "issues": [
      "CVE-2020-15166"
    ],
    "advisories": [
      "ASA-202009-15"
    ]
  },
  {
    "name": "AVG-1219",
    "packages": [
      "zeromq"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "4.3.2-3",
    "fixed": "4.3.3-1",
    "ticket": null,
    "issues": [
      "CVE-2020-15166"
    ],
    "advisories": [
      "ASA-202009-16"
    ]
  },
  {
    "name": "AVG-1233",
    "packages": [
      "podman"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "2.0.6-1",
    "fixed": "2.1.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-14370"
    ],
    "advisories": [
      "ASA-202009-11"
    ]
  },
  {
    "name": "AVG-1235",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "80.0.1-1",
    "fixed": "81.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-15678",
      "CVE-2020-15677",
      "CVE-2020-15676",
      "CVE-2020-15675",
      "CVE-2020-15674",
      "CVE-2020-15673"
    ],
    "advisories": [
      "ASA-202009-10"
    ]
  },
  {
    "name": "AVG-1234",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "85.0.4183.102-1",
    "fixed": "85.0.4183.121-1",
    "ticket": null,
    "issues": [
      "CVE-2020-15966",
      "CVE-2020-15965",
      "CVE-2020-15964",
      "CVE-2020-15963",
      "CVE-2020-15962",
      "CVE-2020-15961",
      "CVE-2020-15960"
    ],
    "advisories": [
      "ASA-202009-9",
      "ASA-202009-9"
    ]
  },
  {
    "name": "AVG-1232",
    "packages": [
      "libvirt"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "6.5.0-1",
    "fixed": "6.5.0-2",
    "ticket": "67807",
    "issues": [
      "CVE-2020-14339"
    ],
    "advisories": [
      "ASA-202009-8"
    ]
  },
  {
    "name": "AVG-1225",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "85.0.4183.83-1",
    "fixed": "85.0.4183.102-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6579",
      "CVE-2020-6576",
      "CVE-2020-6575",
      "CVE-2020-6574",
      "CVE-2020-6573"
    ],
    "advisories": [
      "ASA-202009-6",
      "ASA-202009-6"
    ]
  },
  {
    "name": "AVG-1202",
    "packages": [
      "samba"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "4.12.3-2",
    "fixed": "4.12.6-1",
    "ticket": null,
    "issues": [
      "CVE-2020-14303",
      "CVE-2020-10760",
      "CVE-2020-10745",
      "CVE-2020-10730"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1216",
    "packages": [
      "ark"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary filesystem access",
    "affected": "20.08.0-1",
    "fixed": "20.08.0-2",
    "ticket": null,
    "issues": [
      "CVE-2020-24654"
    ],
    "advisories": [
      "ASA-202009-2"
    ]
  },
  {
    "name": "AVG-1213",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "78.0.2-1",
    "fixed": "79.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6514",
      "CVE-2020-6463",
      "CVE-2020-15659",
      "CVE-2020-15658",
      "CVE-2020-15656",
      "CVE-2020-15655",
      "CVE-2020-15654",
      "CVE-2020-15653",
      "CVE-2020-15652"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1212",
    "packages": [
      "libx11"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.6.9-7",
    "fixed": "1.6.10-1",
    "ticket": null,
    "issues": [
      "CVE-2020-14344"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1214",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "68.11.0-1",
    "fixed": "68.12.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6514",
      "CVE-2020-6463",
      "CVE-2020-15659",
      "CVE-2020-15658",
      "CVE-2020-15656",
      "CVE-2020-15655",
      "CVE-2020-15654",
      "CVE-2020-15653",
      "CVE-2020-15652"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1205",
    "packages": [
      "tomcat9"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "9.0.35-1",
    "fixed": "9.0.37-1",
    "ticket": null,
    "issues": [
      "CVE-2020-13935",
      "CVE-2020-13934"
    ],
    "advisories": []
  },
  {
    "name": "AVG-903",
    "packages": [
      "nasm"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.14.02-2",
    "fixed": "2.15.02-1",
    "ticket": null,
    "issues": [
      "CVE-2019-8343"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1185",
    "packages": [
      "libjcat"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "insufficient validation",
    "affected": "0.1.2-1",
    "fixed": "0.1.3-1",
    "ticket": null,
    "issues": [
      "CVE-2020-10759"
    ],
    "advisories": [
      "ASA-202007-6"
    ]
  },
  {
    "name": "AVG-1180",
    "packages": [
      "ffmpeg"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2:4.2.3-2",
    "fixed": "2:4.3.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-13904"
    ],
    "advisories": [
      "ASA-202007-4"
    ]
  },
  {
    "name": "AVG-1194",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.70.0-1",
    "fixed": "7.71.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-8177",
      "CVE-2020-8169"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1166",
    "packages": [
      "libexif"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "0.6.21-1",
    "fixed": "0.6.22-1",
    "ticket": null,
    "issues": [
      "CVE-2020-13114",
      "CVE-2020-13113",
      "CVE-2020-13112",
      "CVE-2020-12767",
      "CVE-2020-0093",
      "CVE-2019-9278",
      "CVE-2018-20030",
      "CVE-2017-7544",
      "CVE-2016-6328"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1190",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "83.0.4103.97-2",
    "fixed": "83.0.4103.106-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6507",
      "CVE-2020-6506",
      "CVE-2020-6505"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1193",
    "packages": [
      "freerdp"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2:2.1.1-1",
    "fixed": "2:2.1.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-4033",
      "CVE-2020-4032",
      "CVE-2020-4031",
      "CVE-2020-4030",
      "CVE-2020-11099",
      "CVE-2020-11098",
      "CVE-2020-11097",
      "CVE-2020-11096",
      "CVE-2020-11095"
    ],
    "advisories": [
      "ASA-202006-15"
    ]
  },
  {
    "name": "AVG-1182",
    "packages": [
      "sqlite"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "3.32.2-1",
    "fixed": "3.32.3-1",
    "ticket": null,
    "issues": [
      "CVE-2020-13871"
    ],
    "advisories": [
      "ASA-202006-11",
      "ASA-202006-11"
    ]
  },
  {
    "name": "AVG-1192",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "83.0.4103.106-3",
    "fixed": "83.0.4103.116-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6509"
    ],
    "advisories": [
      "ASA-202006-12",
      "ASA-202006-12"
    ]
  },
  {
    "name": "AVG-1187",
    "packages": [
      "intel-ucode"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "20200520-1",
    "fixed": "20200609-1",
    "ticket": null,
    "issues": [
      "CVE-2020-0549",
      "CVE-2020-0548",
      "CVE-2020-0543"
    ],
    "advisories": [
      "ASA-202006-10"
    ]
  },
  {
    "name": "AVG-1186",
    "packages": [
      "fwupd"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "insufficient validation",
    "affected": "0.1.2-1",
    "fixed": "1.4.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-10759"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1168",
    "packages": [
      "clamav"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "0.102.1-1",
    "fixed": "0.102.3-1",
    "ticket": null,
    "issues": [
      "CVE-2020-7613",
      "CVE-2020-3123"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1179",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "68.8.1-1",
    "fixed": "68.9.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-12410",
      "CVE-2020-12406",
      "CVE-2020-12405",
      "CVE-2020-12399",
      "CVE-2020-12398"
    ],
    "advisories": [
      "ASA-202006-4"
    ]
  },
  {
    "name": "AVG-1178",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "83.0.4103.61-2",
    "fixed": "83.0.4103.97-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6496",
      "CVE-2020-6495",
      "CVE-2020-6494",
      "CVE-2020-6493"
    ],
    "advisories": [
      "ASA-202006-3",
      "ASA-202006-3"
    ]
  },
  {
    "name": "AVG-1177",
    "packages": [
      "gnutls"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "man-in-the-middle",
    "affected": "3.6.13-2",
    "fixed": "3.6.14-1",
    "ticket": null,
    "issues": [
      "CVE-2020-13777"
    ],
    "advisories": [
      "ASA-202006-2"
    ]
  },
  {
    "name": "AVG-1173",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "76.0.1-1",
    "fixed": "77.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-12411",
      "CVE-2020-12410",
      "CVE-2020-12409",
      "CVE-2020-12408",
      "CVE-2020-12407",
      "CVE-2020-12406",
      "CVE-2020-12405",
      "CVE-2020-12399"
    ],
    "advisories": [
      "ASA-202006-1"
    ]
  },
  {
    "name": "AVG-1174",
    "packages": [
      "libvirt"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "5.10.0-1",
    "fixed": "6.3.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-10703"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1171",
    "packages": [
      "tomcat9"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "9.0.31-1",
    "fixed": "9.0.35-1",
    "ticket": null,
    "issues": [
      "CVE-2020-9484"
    ],
    "advisories": [
      "ASA-202006-7"
    ]
  },
  {
    "name": "AVG-1172",
    "packages": [
      "freerdp"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "2:2.1.0-1",
    "fixed": "2:2.1.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-13398",
      "CVE-2020-13397",
      "CVE-2020-13396"
    ],
    "advisories": [
      "ASA-202005-16"
    ]
  },
  {
    "name": "AVG-1164",
    "packages": [
      "unbound"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "1.10.0-2",
    "fixed": "1.10.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-12663",
      "CVE-2020-12662"
    ],
    "advisories": [
      "ASA-202005-14"
    ]
  },
  {
    "name": "AVG-1165",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "9.16.2-2",
    "fixed": "9.16.3-1",
    "ticket": null,
    "issues": [
      "CVE-2020-8617",
      "CVE-2020-8616"
    ],
    "advisories": [
      "ASA-202005-13"
    ]
  },
  {
    "name": "AVG-1167",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "81.0.4044.138-2",
    "fixed": "83.0.4103.61-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6491",
      "CVE-2020-6490",
      "CVE-2020-6489",
      "CVE-2020-6488",
      "CVE-2020-6487",
      "CVE-2020-6486",
      "CVE-2020-6485",
      "CVE-2020-6484",
      "CVE-2020-6483",
      "CVE-2020-6482",
      "CVE-2020-6481",
      "CVE-2020-6480",
      "CVE-2020-6479",
      "CVE-2020-6478",
      "CVE-2020-6477",
      "CVE-2020-6476",
      "CVE-2020-6475",
      "CVE-2020-6474",
      "CVE-2020-6473",
      "CVE-2020-6472",
      "CVE-2020-6471",
      "CVE-2020-6470",
      "CVE-2020-6469",
      "CVE-2020-6468",
      "CVE-2020-6467",
      "CVE-2020-6466",
      "CVE-2020-6465"
    ],
    "advisories": [
      "ASA-202005-12",
      "ASA-202005-12"
    ]
  },
  {
    "name": "AVG-1162",
    "packages": [
      "dovecot"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.3.10-2",
    "fixed": "2.3.10.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-10967",
      "CVE-2020-10958",
      "CVE-2020-10957"
    ],
    "advisories": [
      "ASA-202005-9"
    ]
  },
  {
    "name": "AVG-1158",
    "packages": [
      "keycloak"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "10.0.0-1",
    "fixed": "10.0.1-1",
    "ticket": "66642",
    "issues": [
      "CVE-2020-1714"
    ],
    "advisories": [
      "ASA-202005-8"
    ]
  },
  {
    "name": "AVG-1150",
    "packages": [
      "a2ps"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.14-8",
    "fixed": "4.14-9",
    "ticket": null,
    "issues": [
      "CVE-2015-8107",
      "CVE-2014-0466"
    ],
    "advisories": [
      "ASA-202005-4"
    ]
  },
  {
    "name": "AVG-1149",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "81.0.4044.129-2",
    "fixed": "81.0.4044.138-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6831",
      "CVE-2020-6464"
    ],
    "advisories": [
      "ASA-202005-2",
      "ASA-202005-2"
    ]
  },
  {
    "name": "AVG-1143",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "81.0.4044.122-2",
    "fixed": "81.0.4044.129-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6462",
      "CVE-2020-6461"
    ],
    "advisories": [
      "ASA-202004-22",
      "ASA-202004-22"
    ]
  },
  {
    "name": "AVG-1142",
    "packages": [
      "lib32-openssl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "1.1.1.f-1",
    "fixed": "1.1.1.g-1",
    "ticket": null,
    "issues": [
      "CVE-2020-1967"
    ],
    "advisories": [
      "ASA-202004-19"
    ]
  },
  {
    "name": "AVG-1140",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "81.0.4044.113-1",
    "fixed": "81.0.4044.122-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6460",
      "CVE-2020-6459",
      "CVE-2020-6458"
    ],
    "advisories": [
      "ASA-202004-20",
      "ASA-202004-20"
    ]
  },
  {
    "name": "AVG-1139",
    "packages": [
      "openssl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "1.1.1.f-1",
    "fixed": "1.1.1.g-1",
    "ticket": null,
    "issues": [
      "CVE-2020-1967"
    ],
    "advisories": [
      "ASA-202004-18"
    ]
  },
  {
    "name": "AVG-1138",
    "packages": [
      "git"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "2.26.1-1",
    "fixed": "2.26.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-11008"
    ],
    "advisories": [
      "ASA-202004-21"
    ]
  },
  {
    "name": "AVG-848",
    "packages": [
      "libmp4v2"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.0.0-5",
    "fixed": "4.1.3-1",
    "ticket": null,
    "issues": [
      "CVE-2018-14403",
      "CVE-2018-14379",
      "CVE-2018-14326",
      "CVE-2018-14325",
      "CVE-2018-14054"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1133",
    "packages": [
      "git"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "2.26.0-1",
    "fixed": "2.26.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-5260"
    ],
    "advisories": [
      "ASA-202004-13"
    ]
  },
  {
    "name": "AVG-1128",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "80.0.3987.163-1",
    "fixed": "81.0.4044.92-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6456",
      "CVE-2020-6455",
      "CVE-2020-6454",
      "CVE-2020-6448",
      "CVE-2020-6447",
      "CVE-2020-6446",
      "CVE-2020-6445",
      "CVE-2020-6444",
      "CVE-2020-6443",
      "CVE-2020-6442",
      "CVE-2020-6441",
      "CVE-2020-6440",
      "CVE-2020-6439",
      "CVE-2020-6438",
      "CVE-2020-6437",
      "CVE-2020-6436",
      "CVE-2020-6435",
      "CVE-2020-6434",
      "CVE-2020-6433",
      "CVE-2020-6432",
      "CVE-2020-6431",
      "CVE-2020-6430",
      "CVE-2020-6423"
    ],
    "advisories": [
      "ASA-202004-9",
      "ASA-202004-9"
    ]
  },
  {
    "name": "AVG-1123",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "80.0.3987.149-1",
    "fixed": "80.0.3987.162-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6452",
      "CVE-2020-6451",
      "CVE-2020-6450"
    ],
    "advisories": [
      "ASA-202004-1",
      "ASA-202004-1"
    ]
  },
  {
    "name": "AVG-1122",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.5.13.arch1-1",
    "fixed": "5.5.13.arch2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-8835"
    ],
    "advisories": [
      "ASA-202004-4"
    ]
  },
  {
    "name": "AVG-1121",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.4.28-1",
    "fixed": "5.4.28-2",
    "ticket": null,
    "issues": [
      "CVE-2020-8835"
    ],
    "advisories": [
      "ASA-202004-3"
    ]
  },
  {
    "name": "AVG-1120",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.5.13.a-1",
    "fixed": "5.5.13.b-1",
    "ticket": null,
    "issues": [
      "CVE-2020-8835"
    ],
    "advisories": [
      "ASA-202004-2"
    ]
  },
  {
    "name": "AVG-1118",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "80.0.3987.132-2",
    "fixed": "80.0.3987.149-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6449",
      "CVE-2020-6429",
      "CVE-2020-6428",
      "CVE-2020-6427",
      "CVE-2020-6426",
      "CVE-2020-6425",
      "CVE-2020-6424",
      "CVE-2020-6422",
      "CVE-2019-20503"
    ],
    "advisories": [
      "ASA-202003-12",
      "ASA-202003-12"
    ]
  },
  {
    "name": "AVG-1116",
    "packages": [
      "bluez"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "access restriction bypass",
    "affected": "5.53-1",
    "fixed": "5.54-1",
    "ticket": null,
    "issues": [
      "CVE-2020-0556"
    ],
    "advisories": [
      "ASA-202003-13"
    ]
  },
  {
    "name": "AVG-1104",
    "packages": [
      "mbedtls"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "private key recovery",
    "affected": "2.16.3-1",
    "fixed": "2.16.5-1",
    "ticket": null,
    "issues": [
      "CVE-2019-18222"
    ],
    "advisories": [
      "ASA-202003-7"
    ]
  },
  {
    "name": "AVG-1108",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.5.6.arch1-1",
    "fixed": "5.5.7.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-9383",
      "CVE-2020-2732"
    ],
    "advisories": [
      "ASA-202003-6"
    ]
  },
  {
    "name": "AVG-1107",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "access restriction bypass",
    "affected": "80.0.3987.122-1",
    "fixed": "80.0.3987.132-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6420"
    ],
    "advisories": [
      "ASA-202003-1",
      "ASA-202003-1"
    ]
  },
  {
    "name": "AVG-1102",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "80.0.3987.116-1",
    "fixed": "80.0.3987.122-1",
    "ticket": null,
    "issues": [
      "CVE-2020-6418",
      "CVE-2020-6407"
    ],
    "advisories": [
      "ASA-202002-11",
      "ASA-202002-11"
    ]
  },
  {
    "name": "AVG-1094",
    "packages": [
      "systemd"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "244.1-1",
    "fixed": "244.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-1712"
    ],
    "advisories": [
      "ASA-202002-8"
    ]
  },
  {
    "name": "AVG-1095",
    "packages": [
      "ksh"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary command execution",
    "affected": "2020.0.0-1",
    "fixed": "2020.0.0-2",
    "ticket": null,
    "issues": [
      "CVE-2019-14868"
    ],
    "advisories": [
      "ASA-202002-4"
    ]
  },
  {
    "name": "AVG-1093",
    "packages": [
      "sudo"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "1.8.30-1",
    "fixed": "1.8.31-1",
    "ticket": null,
    "issues": [
      "CVE-2019-18634"
    ],
    "advisories": [
      "ASA-202002-2"
    ]
  },
  {
    "name": "AVG-1083",
    "packages": [
      "file"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.37-1",
    "fixed": "5.38-1",
    "ticket": "64430",
    "issues": [
      "CVE-2019-18218"
    ],
    "advisories": [
      "ASA-202001-2"
    ]
  },
  {
    "name": "AVG-1080",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "insufficient validation",
    "affected": "2.2.6-1",
    "fixed": "2.2.9-1",
    "ticket": null,
    "issues": [
      "CVE-2019-19844"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1075",
    "packages": [
      "libgit2"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1:0.28.3-1",
    "fixed": "1:0.28.4-1",
    "ticket": null,
    "issues": [
      "CVE-2019-1387",
      "CVE-2019-1352",
      "CVE-2019-1349",
      "CVE-2019-1348"
    ],
    "advisories": [
      "ASA-201912-5"
    ]
  },
  {
    "name": "AVG-1079",
    "packages": [
      "shadow"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.7-3",
    "fixed": "4.8-1",
    "ticket": "64836",
    "issues": [
      "CVE-2019-19882"
    ],
    "advisories": [
      "ASA-201912-4"
    ]
  },
  {
    "name": "AVG-1073",
    "packages": [
      "git"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.24.0-1",
    "fixed": "2.24.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-19604",
      "CVE-2019-1387",
      "CVE-2019-1352",
      "CVE-2019-1349",
      "CVE-2019-1348"
    ],
    "advisories": [
      "ASA-201912-6"
    ]
  },
  {
    "name": "AVG-1074",
    "packages": [
      "git"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.24.0-1",
    "fixed": "2.24.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-1354",
      "CVE-2019-1353",
      "CVE-2019-1351",
      "CVE-2019-1350"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1046",
    "packages": [
      "crypto++"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "private key recovery",
    "affected": "8.2.0-1",
    "fixed": "8.2.0-2",
    "ticket": null,
    "issues": [
      "CVE-2019-14318"
    ],
    "advisories": [
      "ASA-201912-3"
    ]
  },
  {
    "name": "AVG-1069",
    "packages": [
      "ghostscript"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "sandbox escape",
    "affected": "9.27-2",
    "fixed": "9.50-1",
    "ticket": null,
    "issues": [
      "CVE-2019-14869"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1068",
    "packages": [
      "intel-ucode"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "20190918-1",
    "fixed": "20191112-1",
    "ticket": null,
    "issues": [
      "CVE-2019-11139",
      "CVE-2019-11135",
      "CVE-2019-0117"
    ],
    "advisories": [
      "ASA-201911-14"
    ]
  },
  {
    "name": "AVG-1067",
    "packages": [
      "libjpeg-turbo"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.0.2-1",
    "fixed": "2.0.3-1",
    "ticket": null,
    "issues": [
      "CVE-2019-2201"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1031",
    "packages": [
      "ghostscript"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "sandbox escape",
    "affected": "9.27-2",
    "fixed": "9.50-1",
    "ticket": null,
    "issues": [
      "CVE-2019-14817",
      "CVE-2019-14813",
      "CVE-2019-14812",
      "CVE-2019-14811"
    ],
    "advisories": [
      "ASA-201911-5"
    ]
  },
  {
    "name": "AVG-1017",
    "packages": [
      "icedtea-web"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.7-1",
    "fixed": "1.8.3-1",
    "ticket": null,
    "issues": [
      "CVE-2019-10185",
      "CVE-2019-10182",
      "CVE-2019-10181"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1053",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "77.0.3865.120-1",
    "fixed": "78.0.3904.70-1",
    "ticket": null,
    "issues": [
      "CVE-2019-15903",
      "CVE-2019-13719",
      "CVE-2019-13718",
      "CVE-2019-13717",
      "CVE-2019-13716",
      "CVE-2019-13715",
      "CVE-2019-13714",
      "CVE-2019-13713",
      "CVE-2019-13711",
      "CVE-2019-13710",
      "CVE-2019-13709",
      "CVE-2019-13708",
      "CVE-2019-13707",
      "CVE-2019-13706",
      "CVE-2019-13705",
      "CVE-2019-13704",
      "CVE-2019-13703",
      "CVE-2019-13702",
      "CVE-2019-13701",
      "CVE-2019-13700",
      "CVE-2019-13699"
    ],
    "advisories": [
      "ASA-201910-17",
      "ASA-201910-17"
    ]
  },
  {
    "name": "AVG-1050",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "access restriction bypass",
    "affected": "2:1.12.9-1",
    "fixed": "2:1.13.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-16276"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1049",
    "packages": [
      "pacman"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary command execution",
    "affected": "5.1.3-1",
    "fixed": "5.2.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-18183",
      "CVE-2019-18182"
    ],
    "advisories": [
      "ASA-201910-13"
    ]
  },
  {
    "name": "AVG-1047",
    "packages": [
      "sudo"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "1.8.27-1",
    "fixed": "1.8.28-1",
    "ticket": null,
    "issues": [
      "CVE-2019-14287"
    ],
    "advisories": [
      "ASA-201910-9"
    ]
  },
  {
    "name": "AVG-1045",
    "packages": [
      "lib32-libgcrypt"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "private key recovery",
    "affected": "1.8.4-1",
    "fixed": "1.8.5-1",
    "ticket": null,
    "issues": [
      "CVE-2019-13627"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1044",
    "packages": [
      "libgcrypt"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "private key recovery",
    "affected": "1.8.4-1",
    "fixed": "1.8.5-1",
    "ticket": null,
    "issues": [
      "CVE-2019-13627"
    ],
    "advisories": []
  },
  {
    "name": "AVG-855",
    "packages": [
      "glibc"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "2.29-4",
    "fixed": "2.30-1",
    "ticket": null,
    "issues": [
      "CVE-2019-9169"
    ],
    "advisories": [
      "ASA-201911-3"
    ]
  },
  {
    "name": "AVG-1043",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "77.0.3865.90-1",
    "fixed": "77.0.3865.120-1",
    "ticket": null,
    "issues": [
      "CVE-2019-13697",
      "CVE-2019-13696",
      "CVE-2019-13695",
      "CVE-2019-13694",
      "CVE-2019-13693"
    ],
    "advisories": [
      "ASA-201910-7",
      "ASA-201910-7"
    ]
  },
  {
    "name": "AVG-1042",
    "packages": [
      "unbound"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "1.9.3-4",
    "fixed": "1.9.4-1",
    "ticket": null,
    "issues": [
      "CVE-2019-16866"
    ],
    "advisories": [
      "ASA-201910-6"
    ]
  },
  {
    "name": "AVG-1036",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "68.0.2-1",
    "fixed": "69.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-9812",
      "CVE-2019-5849",
      "CVE-2019-11752",
      "CVE-2019-11750",
      "CVE-2019-11749",
      "CVE-2019-11748",
      "CVE-2019-11747",
      "CVE-2019-11746",
      "CVE-2019-11744",
      "CVE-2019-11743",
      "CVE-2019-11742",
      "CVE-2019-11741",
      "CVE-2019-11740",
      "CVE-2019-11738",
      "CVE-2019-11737",
      "CVE-2019-11735",
      "CVE-2019-11734"
    ],
    "advisories": [
      "ASA-201909-2"
    ]
  },
  {
    "name": "AVG-1028",
    "packages": [
      "irssi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.2.1-1",
    "fixed": "1.2.2-1",
    "ticket": null,
    "issues": [
      "CVE-2019-15717"
    ],
    "advisories": [
      "ASA-201908-20"
    ]
  },
  {
    "name": "AVG-1018",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "76.0.3809.87-1",
    "fixed": "76.0.3809.100-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5868",
      "CVE-2019-5867"
    ],
    "advisories": [
      "ASA-201908-6",
      "ASA-201908-6"
    ]
  },
  {
    "name": "AVG-1016",
    "packages": [
      "subversion"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "1.12.0-3",
    "fixed": "1.12.2-1",
    "ticket": null,
    "issues": [
      "CVE-2019-0203",
      "CVE-2018-11782"
    ],
    "advisories": [
      "ASA-201908-10"
    ]
  },
  {
    "name": "AVG-1013",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "75.0.3770.142-1",
    "fixed": "76.0.3809.87-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5865",
      "CVE-2019-5864",
      "CVE-2019-5862",
      "CVE-2019-5861",
      "CVE-2019-5860",
      "CVE-2019-5859",
      "CVE-2019-5858",
      "CVE-2019-5857",
      "CVE-2019-5856",
      "CVE-2019-5855",
      "CVE-2019-5854",
      "CVE-2019-5853",
      "CVE-2019-5852",
      "CVE-2019-5851",
      "CVE-2019-5850"
    ],
    "advisories": [
      "ASA-201908-1",
      "ASA-201908-1"
    ]
  },
  {
    "name": "AVG-1012",
    "packages": [
      "jenkins"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.185-1",
    "fixed": "2.186-1",
    "ticket": null,
    "issues": [
      "CVE-2019-10354",
      "CVE-2019-10353",
      "CVE-2019-10352"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1010",
    "packages": [
      "libreoffice-still"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "6.1.6-2",
    "fixed": "6.2.6-1",
    "ticket": null,
    "issues": [
      "CVE-2019-9849",
      "CVE-2019-9848"
    ],
    "advisories": [
      "ASA-201908-9"
    ]
  },
  {
    "name": "AVG-1009",
    "packages": [
      "libreoffice-fresh"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "6.2.4-2",
    "fixed": "6.2.5-1",
    "ticket": null,
    "issues": [
      "CVE-2019-9849",
      "CVE-2019-9848"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1005",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "75.0.3770.100-1",
    "fixed": "75.0.3770.142-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5848",
      "CVE-2019-5847"
    ],
    "advisories": [
      "ASA-201907-6",
      "ASA-201907-6"
    ]
  },
  {
    "name": "AVG-1000",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "silent downgrade",
    "affected": "2.2.2-1",
    "fixed": "2.2.3-1",
    "ticket": null,
    "issues": [
      "CVE-2019-12781"
    ],
    "advisories": [
      "ASA-201907-2"
    ]
  },
  {
    "name": "AVG-999",
    "packages": [
      "irssi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.2.0-4",
    "fixed": "1.2.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-13045"
    ],
    "advisories": [
      "ASA-201907-1"
    ]
  },
  {
    "name": "AVG-997",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "sandbox escape",
    "affected": "67.0.3-1",
    "fixed": "67.0.4-1",
    "ticket": null,
    "issues": [
      "CVE-2019-11708"
    ],
    "advisories": [
      "ASA-201906-20"
    ]
  },
  {
    "name": "AVG-996",
    "packages": [
      "linux"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "denial of service",
    "affected": "5.1.11.arch1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2019-12881"
    ],
    "advisories": []
  },
  {
    "name": "AVG-993",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "access restriction bypass",
    "affected": "4.9.78-1",
    "fixed": "4.9.79-1",
    "ticket": null,
    "issues": [
      "CVE-2017-17450",
      "CVE-2017-17448"
    ],
    "advisories": []
  },
  {
    "name": "AVG-987",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "access restriction bypass",
    "affected": "4.14.11-1",
    "fixed": "4.15.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5753",
      "CVE-2017-5715"
    ],
    "advisories": []
  },
  {
    "name": "AVG-986",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "5.1.10.a-1",
    "fixed": "5.1.11.a-1",
    "ticket": null,
    "issues": [
      "CVE-2019-11479",
      "CVE-2019-11478",
      "CVE-2019-11477"
    ],
    "advisories": [
      "ASA-201906-12"
    ]
  },
  {
    "name": "AVG-985",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "5.1.10.zen1-1",
    "fixed": "5.1.11.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-11479",
      "CVE-2019-11478",
      "CVE-2019-11477"
    ],
    "advisories": [
      "ASA-201906-15"
    ]
  },
  {
    "name": "AVG-984",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "4.19.51-1",
    "fixed": "4.19.52-1",
    "ticket": null,
    "issues": [
      "CVE-2019-11479",
      "CVE-2019-11478",
      "CVE-2019-11477"
    ],
    "advisories": [
      "ASA-201906-14"
    ]
  },
  {
    "name": "AVG-983",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "5.1.10.arch1-1",
    "fixed": "5.1.11.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-11479",
      "CVE-2019-11478",
      "CVE-2019-11477"
    ],
    "advisories": [
      "ASA-201906-13"
    ]
  },
  {
    "name": "AVG-981",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "75.0.3770.80-1",
    "fixed": "75.0.3770.90-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5842"
    ],
    "advisories": [
      "ASA-201906-11",
      "ASA-201906-11"
    ]
  },
  {
    "name": "AVG-980",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "60.7.0-1",
    "fixed": "60.7.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-11706",
      "CVE-2019-11705",
      "CVE-2019-11704",
      "CVE-2019-11703"
    ],
    "advisories": [
      "ASA-201906-10"
    ]
  },
  {
    "name": "AVG-979",
    "packages": [
      "neovim"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "0.3.5-1",
    "fixed": "0.3.6-1",
    "ticket": null,
    "issues": [
      "CVE-2019-12735"
    ],
    "advisories": []
  },
  {
    "name": "AVG-977",
    "packages": [
      "python"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "3.7.2-1",
    "fixed": "3.7.3-1",
    "ticket": null,
    "issues": [
      "CVE-2019-9636"
    ],
    "advisories": [
      "ASA-201906-17",
      "ASA-201906-17"
    ]
  },
  {
    "name": "AVG-976",
    "packages": [
      "gvim"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "8.1.1186-1",
    "fixed": "8.1.1467-1",
    "ticket": null,
    "issues": [
      "CVE-2019-12735"
    ],
    "advisories": [
      "ASA-201906-9"
    ]
  },
  {
    "name": "AVG-975",
    "packages": [
      "vim"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "8.1.1186-1",
    "fixed": "8.1.1467-1",
    "ticket": null,
    "issues": [
      "CVE-2019-12735"
    ],
    "advisories": [
      "ASA-201906-8"
    ]
  },
  {
    "name": "AVG-974",
    "packages": [
      "dbus"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "access restriction bypass",
    "affected": "1.12.14-1",
    "fixed": "1.12.16-1",
    "ticket": null,
    "issues": [
      "CVE-2019-12749"
    ],
    "advisories": [
      "ASA-201906-16"
    ]
  },
  {
    "name": "AVG-971",
    "packages": [
      "flatpak"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "sandbox escape",
    "affected": "1.2.4-1",
    "fixed": "1.3.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-10063"
    ],
    "advisories": []
  },
  {
    "name": "AVG-968",
    "packages": [
      "docker"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "1:18.09.6-1",
    "fixed": "1:18.09.7-1",
    "ticket": null,
    "issues": [
      "CVE-2018-15664"
    ],
    "advisories": []
  },
  {
    "name": "AVG-964",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.64.1-2",
    "fixed": "7.65.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5436"
    ],
    "advisories": [
      "ASA-201905-16"
    ]
  },
  {
    "name": "AVG-963",
    "packages": [
      "lib32-curl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.64.1-1",
    "fixed": "7.65.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5436",
      "CVE-2019-5435"
    ],
    "advisories": [
      "ASA-201905-15"
    ]
  },
  {
    "name": "AVG-962",
    "packages": [
      "lib32-libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.64.1-1",
    "fixed": "7.65.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5436",
      "CVE-2019-5435"
    ],
    "advisories": [
      "ASA-201905-14"
    ]
  },
  {
    "name": "AVG-961",
    "packages": [
      "lib32-libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.64.1-1",
    "fixed": "7.65.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5436",
      "CVE-2019-5435"
    ],
    "advisories": [
      "ASA-201905-13"
    ]
  },
  {
    "name": "AVG-960",
    "packages": [
      "libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.64.1-1",
    "fixed": "7.65.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5436"
    ],
    "advisories": [
      "ASA-201905-12"
    ]
  },
  {
    "name": "AVG-959",
    "packages": [
      "libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.64.1-1",
    "fixed": "7.65.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5436"
    ],
    "advisories": [
      "ASA-201905-11"
    ]
  },
  {
    "name": "AVG-958",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.0.11.a-1",
    "fixed": "5.0.12.a-1",
    "ticket": null,
    "issues": [
      "CVE-2019-11683"
    ],
    "advisories": []
  },
  {
    "name": "AVG-957",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.0.12.zen1-1",
    "fixed": "5.0.12.zen2-1",
    "ticket": null,
    "issues": [
      "CVE-2019-11683"
    ],
    "advisories": [
      "ASA-201905-4"
    ]
  },
  {
    "name": "AVG-956",
    "packages": [
      "nautilus"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "sandbox escape",
    "affected": "3.32.0+5+g73876bdcd-1",
    "fixed": "3.32.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-11461"
    ],
    "advisories": [
      "ASA-201905-3"
    ]
  },
  {
    "name": "AVG-955",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.0.12.arch1-1",
    "fixed": "5.0.12.arch2-1",
    "ticket": null,
    "issues": [
      "CVE-2019-11683"
    ],
    "advisories": [
      "ASA-201905-2"
    ]
  },
  {
    "name": "AVG-953",
    "packages": [
      "munin"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary file overwrite",
    "affected": "2.0.26-5",
    "fixed": "2.0.47-1",
    "ticket": "57537",
    "issues": [
      "CVE-2017-6188"
    ],
    "advisories": [
      "ASA-201905-1"
    ]
  },
  {
    "name": "AVG-951",
    "packages": [
      "openssh"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.9p1-1",
    "fixed": "8.0p1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-6111",
      "CVE-2019-6109",
      "CVE-2018-20685"
    ],
    "advisories": [
      "ASA-201904-11"
    ]
  },
  {
    "name": "AVG-944",
    "packages": [
      "dovecot"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "2.3.5-2",
    "fixed": "2.3.5.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-7524"
    ],
    "advisories": [
      "ASA-201903-16"
    ]
  },
  {
    "name": "AVG-941",
    "packages": [
      "memcached"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "insufficient validation",
    "affected": "1.5.5-1",
    "fixed": "1.5.6-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000115"
    ],
    "advisories": []
  },
  {
    "name": "AVG-940",
    "packages": [
      "beep"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "1.3-4",
    "fixed": "1.4.4-1",
    "ticket": null,
    "issues": [
      "CVE-2018-0492"
    ],
    "advisories": []
  },
  {
    "name": "AVG-939",
    "packages": [
      "imagemagick"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "7.0.5.1-1",
    "fixed": "7.0.5.2-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9098"
    ],
    "advisories": []
  },
  {
    "name": "AVG-936",
    "packages": [
      "binutils"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.26.0-1",
    "fixed": "2.27.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7226",
      "CVE-2017-7225",
      "CVE-2017-7224",
      "CVE-2017-7223"
    ],
    "advisories": []
  },
  {
    "name": "AVG-929",
    "packages": [
      "ghostscript"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "sandbox escape",
    "affected": "9.26-2",
    "fixed": "9.27-1",
    "ticket": "62102",
    "issues": [
      "CVE-2019-3838",
      "CVE-2019-3835"
    ],
    "advisories": [
      "ASA-201904-5"
    ]
  },
  {
    "name": "AVG-928",
    "packages": [
      "libseccomp"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "access restriction bypass",
    "affected": "2.3.3-1",
    "fixed": "2.4.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-9893"
    ],
    "advisories": []
  },
  {
    "name": "AVG-927",
    "packages": [
      "powerdns"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "insufficient validation",
    "affected": "4.1.6-2",
    "fixed": "4.1.7-1",
    "ticket": null,
    "issues": [
      "CVE-2019-3871"
    ],
    "advisories": [
      "ASA-201903-13"
    ]
  },
  {
    "name": "AVG-923",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "72.0.3626.121-1",
    "fixed": "73.0.3683.75-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5803",
      "CVE-2019-5802",
      "CVE-2019-5800",
      "CVE-2019-5799",
      "CVE-2019-5798",
      "CVE-2019-5797",
      "CVE-2019-5796",
      "CVE-2019-5795",
      "CVE-2019-5794",
      "CVE-2019-5793",
      "CVE-2019-5792",
      "CVE-2019-5791",
      "CVE-2019-5790",
      "CVE-2019-5789",
      "CVE-2019-5788",
      "CVE-2019-5787"
    ],
    "advisories": [
      "ASA-201903-8",
      "ASA-201903-8"
    ]
  },
  {
    "name": "AVG-922",
    "packages": [
      "mxml"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.12-1",
    "fixed": "3.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-20593",
      "CVE-2018-20592",
      "CVE-2018-20005",
      "CVE-2018-20004"
    ],
    "advisories": []
  },
  {
    "name": "AVG-921",
    "packages": [
      "pacman"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.1.2-1",
    "fixed": "5.1.3-1",
    "ticket": null,
    "issues": [
      "CVE-2019-9686"
    ],
    "advisories": [
      "ASA-201903-7"
    ]
  },
  {
    "name": "AVG-916",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "72.0.3626.119-1",
    "fixed": "72.0.3626.121-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5786"
    ],
    "advisories": [
      "ASA-201903-1",
      "ASA-201903-1"
    ]
  },
  {
    "name": "AVG-915",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "9.13.5-5",
    "fixed": "9.13.7-1",
    "ticket": null,
    "issues": [
      "CVE-2019-6465",
      "CVE-2018-5745",
      "CVE-2018-5744"
    ],
    "advisories": [
      "ASA-201902-25"
    ]
  },
  {
    "name": "AVG-909",
    "packages": [
      "wordpress"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "directory traversal",
    "affected": "5.0.3-1",
    "fixed": "5.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-8943"
    ],
    "advisories": [
      "ASA-201903-10"
    ]
  },
  {
    "name": "AVG-907",
    "packages": [
      "file"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.35-1",
    "fixed": "5.36-1",
    "ticket": null,
    "issues": [
      "CVE-2019-8907",
      "CVE-2019-8906",
      "CVE-2019-8905",
      "CVE-2019-8904"
    ],
    "advisories": [
      "ASA-201903-5"
    ]
  },
  {
    "name": "AVG-906",
    "packages": [
      "systemd"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "240.95-2",
    "fixed": "241.7-1",
    "ticket": "61804",
    "issues": [
      "CVE-2019-6454"
    ],
    "advisories": [
      "ASA-201902-24"
    ]
  },
  {
    "name": "AVG-905",
    "packages": [
      "msmtp"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "certificate verification bypass",
    "affected": "1.8.2-1",
    "fixed": "1.8.3-1",
    "ticket": null,
    "issues": [
      "CVE-2019-8337"
    ],
    "advisories": [
      "ASA-201902-22"
    ]
  },
  {
    "name": "AVG-902",
    "packages": [
      "tcpreplay"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.3.1-1",
    "fixed": "4.3.2-1",
    "ticket": null,
    "issues": [
      "CVE-2019-8381",
      "CVE-2019-8377",
      "CVE-2019-8376"
    ],
    "advisories": [
      "ASA-201905-5"
    ]
  },
  {
    "name": "AVG-898",
    "packages": [
      "python-mysql-connector"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "authentication bypass",
    "affected": "8.0.13-1",
    "fixed": "8.0.15-1",
    "ticket": "61758",
    "issues": [
      "CVE-2019-2435"
    ],
    "advisories": [
      "ASA-201902-21"
    ]
  },
  {
    "name": "AVG-897",
    "packages": [
      "polkit"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "authentication bypass",
    "affected": "0.115+24+g5230646-1",
    "fixed": "0.116-1",
    "ticket": "61751",
    "issues": [
      "CVE-2019-6133"
    ],
    "advisories": []
  },
  {
    "name": "AVG-896",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "65.0-2",
    "fixed": "65.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5785",
      "CVE-2018-18511",
      "CVE-2018-18356"
    ],
    "advisories": [
      "ASA-201902-16"
    ]
  },
  {
    "name": "AVG-895",
    "packages": [
      "podman-docker"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "1.0.0-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2019-5736"
    ],
    "advisories": []
  },
  {
    "name": "AVG-893",
    "packages": [
      "lxc"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "1:3.1.0-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2019-5736"
    ],
    "advisories": []
  },
  {
    "name": "AVG-892",
    "packages": [
      "docker"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "1:18.09.1-2",
    "fixed": "1:18.09.2-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5736"
    ],
    "advisories": []
  },
  {
    "name": "AVG-889",
    "packages": [
      "evolution"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "content spoofing",
    "affected": "3.30.5-1",
    "fixed": "3.32.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-15587"
    ],
    "advisories": [
      "ASA-201904-1"
    ]
  },
  {
    "name": "AVG-885",
    "packages": [
      "gettext"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "0.19.8.1-1",
    "fixed": "0.20.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-18751"
    ],
    "advisories": [
      "ASA-201908-14"
    ]
  },
  {
    "name": "AVG-883",
    "packages": [
      "libreoffice-fresh"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "6.1.2-1",
    "fixed": "6.1.3-1",
    "ticket": null,
    "issues": [
      "CVE-2018-16858"
    ],
    "advisories": []
  },
  {
    "name": "AVG-880",
    "packages": [
      "flatpak"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "1.2.2-1",
    "fixed": "1.2.3-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5736"
    ],
    "advisories": [
      "ASA-201902-20"
    ]
  },
  {
    "name": "AVG-879",
    "packages": [
      "gdm"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "access restriction bypass",
    "affected": "3.30.2-2",
    "fixed": "3.30.3-1",
    "ticket": null,
    "issues": [
      "CVE-2019-3825",
      "CVE-2019-3820"
    ],
    "advisories": [
      "ASA-201903-3"
    ]
  },
  {
    "name": "AVG-878",
    "packages": [
      "runc"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "1.0.0rc5+168+g079817cc-1",
    "fixed": "1.0.0rc6-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5736"
    ],
    "advisories": [
      "ASA-201902-6"
    ]
  },
  {
    "name": "AVG-877",
    "packages": [
      "libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.63.0-2",
    "fixed": "7.64.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-3823",
      "CVE-2019-3822",
      "CVE-2018-16890"
    ],
    "advisories": [
      "ASA-201902-10"
    ]
  },
  {
    "name": "AVG-876",
    "packages": [
      "lib32-libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.63.0-2",
    "fixed": "7.64.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-3823",
      "CVE-2019-3822",
      "CVE-2018-16890"
    ],
    "advisories": [
      "ASA-201902-11"
    ]
  },
  {
    "name": "AVG-875",
    "packages": [
      "lib32-libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.63.0-2",
    "fixed": "7.64.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-3823",
      "CVE-2019-3822",
      "CVE-2018-16890"
    ],
    "advisories": [
      "ASA-201902-12"
    ]
  },
  {
    "name": "AVG-874",
    "packages": [
      "lib32-curl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.63.0-2",
    "fixed": "7.64.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-3823",
      "CVE-2019-3822",
      "CVE-2018-16890"
    ],
    "advisories": [
      "ASA-201902-13"
    ]
  },
  {
    "name": "AVG-873",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.63.0-4",
    "fixed": "7.64.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-3823",
      "CVE-2019-3822",
      "CVE-2018-16890"
    ],
    "advisories": [
      "ASA-201902-9"
    ]
  },
  {
    "name": "AVG-872",
    "packages": [
      "dovecot"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "authentication bypass",
    "affected": "2.3.4-3",
    "fixed": "2.3.4.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-3814"
    ],
    "advisories": [
      "ASA-201902-1"
    ]
  },
  {
    "name": "AVG-871",
    "packages": [
      "rdesktop"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.8.3-1",
    "fixed": "1.8.4-1",
    "ticket": "61652",
    "issues": [
      "CVE-2018-8800",
      "CVE-2018-8799",
      "CVE-2018-8798",
      "CVE-2018-8797",
      "CVE-2018-8796",
      "CVE-2018-8795",
      "CVE-2018-8794",
      "CVE-2018-8793",
      "CVE-2018-8792",
      "CVE-2018-8791",
      "CVE-2018-20182",
      "CVE-2018-20181",
      "CVE-2018-20180",
      "CVE-2018-20179",
      "CVE-2018-20178",
      "CVE-2018-20177",
      "CVE-2018-20176",
      "CVE-2018-20175",
      "CVE-2018-20174"
    ],
    "advisories": [
      "ASA-201902-5"
    ]
  },
  {
    "name": "AVG-860",
    "packages": [
      "ghostscript"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "sandbox escape",
    "affected": "9.26-1",
    "fixed": "9.26-2",
    "ticket": null,
    "issues": [
      "CVE-2019-6116"
    ],
    "advisories": [
      "ASA-201901-18"
    ]
  },
  {
    "name": "AVG-858",
    "packages": [
      "subversion"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "1.11.0-2",
    "fixed": "1.11.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-11803"
    ],
    "advisories": [
      "ASA-201901-17"
    ]
  },
  {
    "name": "AVG-857",
    "packages": [
      "apache"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.4.37-1",
    "fixed": "2.4.38-1",
    "ticket": null,
    "issues": [
      "CVE-2019-0190",
      "CVE-2018-17199",
      "CVE-2018-17189"
    ],
    "advisories": [
      "ASA-201901-14"
    ]
  },
  {
    "name": "AVG-846",
    "packages": [
      "matrix-synapse"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "private key recovery",
    "affected": "0.34.0-1",
    "fixed": "0.34.1.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5885"
    ],
    "advisories": [
      "ASA-201901-12",
      "ASA-201901-12"
    ]
  },
  {
    "name": "AVG-845",
    "packages": [
      "systemd"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "240.0-3",
    "fixed": "240.34-1",
    "ticket": null,
    "issues": [
      "CVE-2018-16865",
      "CVE-2018-16864"
    ],
    "advisories": [
      "ASA-201901-9"
    ]
  },
  {
    "name": "AVG-843",
    "packages": [
      "python-yaml"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "3.13-2",
    "fixed": "5.1-1",
    "ticket": "61311",
    "issues": [
      "CVE-2017-18342"
    ],
    "advisories": []
  },
  {
    "name": "AVG-842",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "4.20.arch1-1",
    "fixed": "5.0.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5489"
    ],
    "advisories": []
  },
  {
    "name": "AVG-837",
    "packages": [
      "libarchive"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "3.3.3-1",
    "fixed": "3.4.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-1000020",
      "CVE-2019-1000019",
      "CVE-2018-1000880",
      "CVE-2018-1000879",
      "CVE-2018-1000878",
      "CVE-2018-1000877"
    ],
    "advisories": [
      "ASA-201906-21"
    ]
  },
  {
    "name": "AVG-835",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2:1.11.2-2",
    "fixed": "2:1.11.3-1",
    "ticket": null,
    "issues": [
      "CVE-2018-16875",
      "CVE-2018-16874",
      "CVE-2018-16873"
    ],
    "advisories": [
      "ASA-201812-11"
    ]
  },
  {
    "name": "AVG-832",
    "packages": [
      "binutils"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.31.1-4",
    "fixed": "2.32-1",
    "ticket": null,
    "issues": [
      "CVE-2018-20712",
      "CVE-2018-20002",
      "CVE-2018-19932",
      "CVE-2018-19931"
    ],
    "advisories": [
      "ASA-201906-3"
    ]
  },
  {
    "name": "AVG-829",
    "packages": [
      "lib32-polkit"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "0.114-1",
    "fixed": "0.116-1",
    "ticket": null,
    "issues": [
      "CVE-2018-19788"
    ],
    "advisories": []
  },
  {
    "name": "AVG-828",
    "packages": [
      "polkit"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "0.115+3+g8638ec5-1",
    "fixed": "0.115+24+g5230646-1",
    "ticket": null,
    "issues": [
      "CVE-2018-19788"
    ],
    "advisories": [
      "ASA-201901-2"
    ]
  },
  {
    "name": "AVG-823",
    "packages": [
      "samba"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.9.2-1",
    "fixed": "4.9.3-1",
    "ticket": null,
    "issues": [
      "CVE-2018-16857",
      "CVE-2018-16853",
      "CVE-2018-16852",
      "CVE-2018-16851",
      "CVE-2018-16841",
      "CVE-2018-14629"
    ],
    "advisories": [
      "ASA-201811-22"
    ]
  },
  {
    "name": "AVG-813",
    "packages": [
      "libtiff"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.0.9-1",
    "fixed": "4.0.9-2",
    "ticket": null,
    "issues": [
      "CVE-2018-8905",
      "CVE-2018-7456",
      "CVE-2018-5784",
      "CVE-2018-10963",
      "CVE-2017-18013"
    ],
    "advisories": []
  },
  {
    "name": "AVG-811",
    "packages": [
      "grafana"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary filesystem access",
    "affected": "5.3.2-1",
    "fixed": "5.3.4-1",
    "ticket": null,
    "issues": [
      "CVE-2018-19039"
    ],
    "advisories": [
      "ASA-201811-15"
    ]
  },
  {
    "name": "AVG-808",
    "packages": [
      "patch"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.7.6-3",
    "fixed": "2.7.6-7",
    "ticket": "57526",
    "issues": [
      "CVE-2018-6952",
      "CVE-2018-1000156"
    ],
    "advisories": [
      "ASA-201811-14"
    ]
  },
  {
    "name": "AVG-802",
    "packages": [
      "gitlab"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "multiple issues",
    "affected": "11.4.0-1",
    "fixed": "11.4.3-2",
    "ticket": null,
    "issues": [
      "CVE-2018-18843",
      "CVE-2018-18647",
      "CVE-2018-18644",
      "CVE-2018-18642"
    ],
    "advisories": []
  },
  {
    "name": "AVG-800",
    "packages": [
      "libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.61.1-1",
    "fixed": "7.62.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-16840"
    ],
    "advisories": [
      "ASA-201811-5"
    ]
  },
  {
    "name": "AVG-799",
    "packages": [
      "libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.61.1-1",
    "fixed": "7.62.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-16840"
    ],
    "advisories": [
      "ASA-201811-6"
    ]
  },
  {
    "name": "AVG-798",
    "packages": [
      "lib32-libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.61.1-1",
    "fixed": "7.62.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-16840",
      "CVE-2018-16839"
    ],
    "advisories": [
      "ASA-201811-7"
    ]
  },
  {
    "name": "AVG-797",
    "packages": [
      "lib32-libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.61.1-1",
    "fixed": "7.62.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-16840",
      "CVE-2018-16839"
    ],
    "advisories": [
      "ASA-201811-8"
    ]
  },
  {
    "name": "AVG-796",
    "packages": [
      "lib32-curl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.61.1-1",
    "fixed": "7.62.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-16840",
      "CVE-2018-16839"
    ],
    "advisories": [
      "ASA-201811-9"
    ]
  },
  {
    "name": "AVG-795",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.61.1-3",
    "fixed": "7.62.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-16842",
      "CVE-2018-16840"
    ],
    "advisories": [
      "ASA-201811-4"
    ]
  },
  {
    "name": "AVG-791",
    "packages": [
      "lib32-libtiff"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.0.9-1",
    "fixed": "4.0.10-1",
    "ticket": "60599",
    "issues": [
      "CVE-2018-8905",
      "CVE-2018-7456",
      "CVE-2018-5784",
      "CVE-2018-18661",
      "CVE-2018-18557",
      "CVE-2018-10963",
      "CVE-2018-10779",
      "CVE-2017-9935",
      "CVE-2017-18013",
      "CVE-2017-11613"
    ],
    "advisories": [
      "ASA-201811-18"
    ]
  },
  {
    "name": "AVG-790",
    "packages": [
      "libtiff"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.0.9-2",
    "fixed": "4.0.10-1",
    "ticket": "60599",
    "issues": [
      "CVE-2018-18661",
      "CVE-2018-18557",
      "CVE-2017-9935",
      "CVE-2017-11613"
    ],
    "advisories": [
      "ASA-201811-17"
    ]
  },
  {
    "name": "AVG-788",
    "packages": [
      "xorg-server"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "1.20.2-1",
    "fixed": "1.20.3-1",
    "ticket": null,
    "issues": [
      "CVE-2018-14665"
    ],
    "advisories": [
      "ASA-201810-15"
    ]
  },
  {
    "name": "AVG-786",
    "packages": [
      "ghostscript"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "sandbox escape",
    "affected": "9.25-3",
    "fixed": "9.25-4",
    "ticket": null,
    "issues": [
      "CVE-2018-18284",
      "CVE-2018-18073",
      "CVE-2018-17961"
    ],
    "advisories": [
      "ASA-201811-3"
    ]
  },
  {
    "name": "AVG-783",
    "packages": [
      "net-snmp"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "5.7.3-9",
    "fixed": "5.8-1",
    "ticket": null,
    "issues": [
      "CVE-2018-18066"
    ],
    "advisories": []
  },
  {
    "name": "AVG-779",
    "packages": [
      "wireshark-cli"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.6.3-1",
    "fixed": "2.6.4-1",
    "ticket": null,
    "issues": [
      "CVE-2018-18227",
      "CVE-2018-18226",
      "CVE-2018-18225",
      "CVE-2018-12086"
    ],
    "advisories": [
      "ASA-201810-9"
    ]
  },
  {
    "name": "AVG-777",
    "packages": [
      "net-snmp"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "5.7.3-9",
    "fixed": "5.8-1",
    "ticket": null,
    "issues": [
      "CVE-2018-18065",
      "CVE-2015-5621"
    ],
    "advisories": [
      "ASA-201810-11"
    ]
  },
  {
    "name": "AVG-776",
    "packages": [
      "git"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.19.0-1",
    "fixed": "2.19.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-17456"
    ],
    "advisories": [
      "ASA-201810-7"
    ]
  },
  {
    "name": "AVG-771",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.18.8.arch1-1",
    "fixed": "4.18.9.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-17182"
    ],
    "advisories": []
  },
  {
    "name": "AVG-770",
    "packages": [
      "texlive-bin"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2018.47465-5",
    "fixed": "2018.48691-1",
    "ticket": null,
    "issues": [
      "CVE-2018-17407"
    ],
    "advisories": [
      "ASA-201812-4"
    ]
  },
  {
    "name": "AVG-769",
    "packages": [
      "strongswan"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "authentication bypass",
    "affected": "5.6.3-1",
    "fixed": "5.7.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-16152",
      "CVE-2018-16151"
    ],
    "advisories": [
      "ASA-201809-4"
    ]
  },
  {
    "name": "AVG-767",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "4.14.70-1",
    "fixed": "4.14.71-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5391"
    ],
    "advisories": []
  },
  {
    "name": "AVG-762",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "4.18.1.a-1",
    "fixed": "4.19.4.a-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5391"
    ],
    "advisories": []
  },
  {
    "name": "AVG-761",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "4.18.zen1-1",
    "fixed": "4.19.1.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5391"
    ],
    "advisories": []
  },
  {
    "name": "AVG-760",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "4.18.arch1-1",
    "fixed": "4.19.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5391"
    ],
    "advisories": []
  },
  {
    "name": "AVG-759",
    "packages": [
      "couchdb"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.1.1-1",
    "fixed": "2.1.2-1",
    "ticket": null,
    "issues": [
      "CVE-2018-8007"
    ],
    "advisories": []
  },
  {
    "name": "AVG-758",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "4.14.62-1",
    "fixed": "4.14.63-1",
    "ticket": null,
    "issues": [
      "CVE-2018-3646",
      "CVE-2018-3620",
      "CVE-2018-3615"
    ],
    "advisories": []
  },
  {
    "name": "AVG-757",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "4.17.14.zen1-1",
    "fixed": "4.18.1.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-3646",
      "CVE-2018-3620",
      "CVE-2018-3615"
    ],
    "advisories": []
  },
  {
    "name": "AVG-756",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "4.17.14.arch1-1",
    "fixed": "4.18.1.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-3646",
      "CVE-2018-3620",
      "CVE-2018-3615"
    ],
    "advisories": []
  },
  {
    "name": "AVG-755",
    "packages": [
      "vlc"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "3.0.3-1",
    "fixed": "3.0.3.r1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-11529"
    ],
    "advisories": []
  },
  {
    "name": "AVG-754",
    "packages": [
      "lxc"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary filesystem access",
    "affected": "1:3.0.1-1",
    "fixed": "1:3.0.2-1",
    "ticket": null,
    "issues": [
      "CVE-2018-6556"
    ],
    "advisories": []
  },
  {
    "name": "AVG-753",
    "packages": [
      "couchdb"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.1.2-1",
    "fixed": "2.2.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-11769"
    ],
    "advisories": []
  },
  {
    "name": "AVG-752",
    "packages": [
      "wpa_supplicant"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "1:2.6-11",
    "fixed": "1:2.6-12",
    "ticket": null,
    "issues": [
      "CVE-2018-14526"
    ],
    "advisories": []
  },
  {
    "name": "AVG-750",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "4.17.10.a-1",
    "fixed": "4.17.11.a-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5390"
    ],
    "advisories": [
      "ASA-201808-7"
    ]
  },
  {
    "name": "AVG-749",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "4.17.10-1",
    "fixed": "4.17.11-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5390"
    ],
    "advisories": [
      "ASA-201808-6"
    ]
  },
  {
    "name": "AVG-748",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "4.14.56-1",
    "fixed": "4.14.59-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5390"
    ],
    "advisories": [
      "ASA-201808-5"
    ]
  },
  {
    "name": "AVG-747",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "4.17.10-1",
    "fixed": "4.17.11-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5390"
    ],
    "advisories": [
      "ASA-201808-4"
    ]
  },
  {
    "name": "AVG-745",
    "packages": [
      "cgit"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "directory traversal",
    "affected": "1.2-1",
    "fixed": "1.2.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-14912"
    ],
    "advisories": [
      "ASA-201808-2"
    ]
  },
  {
    "name": "AVG-742",
    "packages": [
      "mbedtls"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "2.8.0-1",
    "fixed": "2.12.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-0497"
    ],
    "advisories": []
  },
  {
    "name": "AVG-741",
    "packages": [
      "wesnoth"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.14.3-1",
    "fixed": "1.14.4-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1999023"
    ],
    "advisories": [
      "ASA-201807-15"
    ]
  },
  {
    "name": "AVG-740",
    "packages": [
      "neomutt"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "20180622-2",
    "fixed": "20180716-1",
    "ticket": null,
    "issues": [
      "CVE-2018-14363",
      "CVE-2018-14362",
      "CVE-2018-14361",
      "CVE-2018-14360",
      "CVE-2018-14359",
      "CVE-2018-14358",
      "CVE-2018-14357",
      "CVE-2018-14356",
      "CVE-2018-14355",
      "CVE-2018-14354",
      "CVE-2018-14353",
      "CVE-2018-14352",
      "CVE-2018-14351",
      "CVE-2018-14350",
      "CVE-2018-14349"
    ],
    "advisories": []
  },
  {
    "name": "AVG-739",
    "packages": [
      "networkmanager-vpnc"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "1.2.4-3",
    "fixed": "1.2.6-1",
    "ticket": null,
    "issues": [
      "CVE-2018-10900"
    ],
    "advisories": [
      "ASA-201807-13"
    ]
  },
  {
    "name": "AVG-738",
    "packages": [
      "jenkins"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.132-1",
    "fixed": "2.133-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1999007",
      "CVE-2018-1999006",
      "CVE-2018-1999005",
      "CVE-2018-1999004",
      "CVE-2018-1999003",
      "CVE-2018-1999002",
      "CVE-2018-1999001"
    ],
    "advisories": [
      "ASA-201807-14"
    ]
  },
  {
    "name": "AVG-737",
    "packages": [
      "znc"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.7.0-2",
    "fixed": "1.7.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-14056",
      "CVE-2018-14055"
    ],
    "advisories": [
      "ASA-201807-11"
    ]
  },
  {
    "name": "AVG-734",
    "packages": [
      "libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.60.0-1",
    "fixed": "7.61.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-0500"
    ],
    "advisories": [
      "ASA-201807-9"
    ]
  },
  {
    "name": "AVG-733",
    "packages": [
      "libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.60.0-1",
    "fixed": "7.61.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-0500"
    ],
    "advisories": [
      "ASA-201807-8"
    ]
  },
  {
    "name": "AVG-732",
    "packages": [
      "lib32-libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.60.0-1",
    "fixed": "7.61.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-0500"
    ],
    "advisories": [
      "ASA-201807-7"
    ]
  },
  {
    "name": "AVG-731",
    "packages": [
      "lib32-libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.60.0-1",
    "fixed": "7.61.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-0500"
    ],
    "advisories": [
      "ASA-201807-6"
    ]
  },
  {
    "name": "AVG-730",
    "packages": [
      "lib32-curl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.60.0-1",
    "fixed": "7.61.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-0500"
    ],
    "advisories": [
      "ASA-201807-5"
    ]
  },
  {
    "name": "AVG-729",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.60.0-1",
    "fixed": "7.61.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-0500"
    ],
    "advisories": [
      "ASA-201807-10"
    ]
  },
  {
    "name": "AVG-725",
    "packages": [
      "git-annex"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "6.20180529-18",
    "fixed": "6.20180626-1",
    "ticket": null,
    "issues": [
      "CVE-2018-10859",
      "CVE-2018-10857"
    ],
    "advisories": [
      "ASA-201807-2"
    ]
  },
  {
    "name": "AVG-720",
    "packages": [
      "pass"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.7.1-1",
    "fixed": "1.7.2-1",
    "ticket": null,
    "issues": [
      "CVE-2018-12356"
    ],
    "advisories": [
      "ASA-201806-11"
    ]
  },
  {
    "name": "AVG-719",
    "packages": [
      "libgcrypt"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "private key recovery",
    "affected": "1.8.2-1",
    "fixed": "1.8.3-1",
    "ticket": null,
    "issues": [
      "CVE-2018-0495"
    ],
    "advisories": [
      "ASA-201806-10"
    ]
  },
  {
    "name": "AVG-717",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "67.0.3396.79-1",
    "fixed": "67.0.3396.87-1",
    "ticket": null,
    "issues": [
      "CVE-2018-6149"
    ],
    "advisories": [
      "ASA-201806-9",
      "ASA-201806-9"
    ]
  },
  {
    "name": "AVG-715",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "60.0.1-1",
    "fixed": "60.0.2-1",
    "ticket": null,
    "issues": [
      "CVE-2018-6126"
    ],
    "advisories": [
      "ASA-201806-5"
    ]
  },
  {
    "name": "AVG-713",
    "packages": [
      "gnupg"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "content spoofing",
    "affected": "2.2.7-1",
    "fixed": "2.2.8-1",
    "ticket": "58931",
    "issues": [
      "CVE-2018-12020"
    ],
    "advisories": [
      "ASA-201806-8"
    ]
  },
  {
    "name": "AVG-712",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "access restriction bypass",
    "affected": "67.0.3396.62-1",
    "fixed": "67.0.3396.79-1",
    "ticket": null,
    "issues": [
      "CVE-2018-6148"
    ],
    "advisories": [
      "ASA-201806-4",
      "ASA-201806-4"
    ]
  },
  {
    "name": "AVG-709",
    "packages": [
      "radare2"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.5.0-1",
    "fixed": "2.6.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-11384",
      "CVE-2018-11383",
      "CVE-2018-11382",
      "CVE-2018-11381",
      "CVE-2018-11380",
      "CVE-2018-11379",
      "CVE-2018-11378",
      "CVE-2018-11377",
      "CVE-2018-11376",
      "CVE-2018-11375"
    ],
    "advisories": [
      "ASA-201806-2"
    ]
  },
  {
    "name": "AVG-704",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.16.9-1",
    "fixed": "4.17-1",
    "ticket": null,
    "issues": [
      "CVE-2018-8897",
      "CVE-2018-1121",
      "CVE-2018-1120"
    ],
    "advisories": []
  },
  {
    "name": "AVG-703",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.16.9.a-1",
    "fixed": "4.17a-1",
    "ticket": null,
    "issues": [
      "CVE-2018-8897",
      "CVE-2018-1121",
      "CVE-2018-1120"
    ],
    "advisories": []
  },
  {
    "name": "AVG-702",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.14.41-1",
    "fixed": "4.14.44-1",
    "ticket": null,
    "issues": [
      "CVE-2018-8897",
      "CVE-2018-1121",
      "CVE-2018-1120"
    ],
    "advisories": []
  },
  {
    "name": "AVG-701",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.16.9-1",
    "fixed": "4.17.2-1",
    "ticket": null,
    "issues": [
      "CVE-2018-8897",
      "CVE-2018-1121",
      "CVE-2018-1120"
    ],
    "advisories": []
  },
  {
    "name": "AVG-700",
    "packages": [
      "tinyxml2"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "6.2.0-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2018-11210"
    ],
    "advisories": []
  },
  {
    "name": "AVG-691",
    "packages": [
      "zathura-pdf-mupdf"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "0.3.3-2",
    "fixed": "0.3.3-3",
    "ticket": "57486",
    "issues": [
      "CVE-2018-6544",
      "CVE-2018-6192",
      "CVE-2018-6187",
      "CVE-2018-5686",
      "CVE-2018-1000051"
    ],
    "advisories": [
      "ASA-201805-12"
    ]
  },
  {
    "name": "AVG-689",
    "packages": [
      "libmupdf"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.12.0-2",
    "fixed": "1.13.0-1",
    "ticket": "57486",
    "issues": [
      "CVE-2018-6544",
      "CVE-2018-6192",
      "CVE-2018-6187",
      "CVE-2018-5686",
      "CVE-2018-1000051"
    ],
    "advisories": [
      "ASA-201805-6"
    ]
  },
  {
    "name": "AVG-688",
    "packages": [
      "mupdf-tools"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.12.0-2",
    "fixed": "1.13.0-1",
    "ticket": "57486",
    "issues": [
      "CVE-2018-6544",
      "CVE-2018-6192",
      "CVE-2018-6187",
      "CVE-2018-5686",
      "CVE-2018-1000051"
    ],
    "advisories": [
      "ASA-201805-7"
    ]
  },
  {
    "name": "AVG-687",
    "packages": [
      "mupdf-gl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.12.0-2",
    "fixed": "1.13.0-1",
    "ticket": "57486",
    "issues": [
      "CVE-2018-6544",
      "CVE-2018-6192",
      "CVE-2018-6187",
      "CVE-2018-5686",
      "CVE-2018-1000051"
    ],
    "advisories": [
      "ASA-201805-5"
    ]
  },
  {
    "name": "AVG-686",
    "packages": [
      "powerdns"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.1.1-2",
    "fixed": "4.1.2-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1046"
    ],
    "advisories": [
      "ASA-201805-1"
    ]
  },
  {
    "name": "AVG-670",
    "packages": [
      "roundcubemail"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary command execution",
    "affected": "1.3.5-1",
    "fixed": "1.3.6-1",
    "ticket": null,
    "issues": [
      "CVE-2018-9846"
    ],
    "advisories": [
      "ASA-201804-8"
    ]
  },
  {
    "name": "AVG-669",
    "packages": [
      "zsh"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "5.4.2-2",
    "fixed": "5.5-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1100"
    ],
    "advisories": [
      "ASA-201804-5"
    ]
  },
  {
    "name": "AVG-666",
    "packages": [
      "mupdf-tools"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.10_a-2",
    "fixed": "1.12-1",
    "ticket": null,
    "issues": [
      "CVE-2017-6060"
    ],
    "advisories": []
  },
  {
    "name": "AVG-650",
    "packages": [
      "calibre"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary command execution",
    "affected": "3.18.0-1",
    "fixed": "3.19.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-7889"
    ],
    "advisories": [
      "ASA-201803-8"
    ]
  },
  {
    "name": "AVG-648",
    "packages": [
      "dhclient"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "4.4.0-1",
    "fixed": "4.4.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5732"
    ],
    "advisories": [
      "ASA-201803-3"
    ]
  },
  {
    "name": "AVG-647",
    "packages": [
      "ntp"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.2.8.p10-1",
    "fixed": "4.2.8.p11-1",
    "ticket": null,
    "issues": [
      "CVE-2018-7185",
      "CVE-2018-7184",
      "CVE-2018-7183",
      "CVE-2018-7182",
      "CVE-2018-7170",
      "CVE-2016-1549"
    ],
    "advisories": [
      "ASA-201803-11"
    ]
  },
  {
    "name": "AVG-646",
    "packages": [
      "dhcp"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "4.4.0-1",
    "fixed": "4.4.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5733"
    ],
    "advisories": [
      "ASA-201803-4"
    ]
  },
  {
    "name": "AVG-645",
    "packages": [
      "dovecot"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.3.0-2",
    "fixed": "2.3.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-15132",
      "CVE-2017-15130",
      "CVE-2017-14461"
    ],
    "advisories": [
      "ASA-201803-7"
    ]
  },
  {
    "name": "AVG-644",
    "packages": [
      "xerces-c"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "3.2.0-2",
    "fixed": "3.2.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-12627"
    ],
    "advisories": [
      "ASA-201803-23"
    ]
  },
  {
    "name": "AVG-643",
    "packages": [
      "postgresql"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "10.2-1",
    "fixed": "10.3-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1058"
    ],
    "advisories": [
      "ASA-201803-9"
    ]
  },
  {
    "name": "AVG-641",
    "packages": [
      "libcdio"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.1.0-1",
    "fixed": "2.0.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-18201"
    ],
    "advisories": []
  },
  {
    "name": "AVG-634",
    "packages": [
      "lib32-wavpack"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.80.0-1",
    "fixed": "5.1.0-2",
    "ticket": "57609",
    "issues": [
      "CVE-2018-7254",
      "CVE-2018-7253",
      "CVE-2018-6767"
    ],
    "advisories": [
      "ASA-201802-13"
    ]
  },
  {
    "name": "AVG-631",
    "packages": [
      "wavpack"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.80.0-1",
    "fixed": "5.1.0-2",
    "ticket": "57609",
    "issues": [
      "CVE-2018-7254",
      "CVE-2018-7253",
      "CVE-2018-6767"
    ],
    "advisories": [
      "ASA-201802-12"
    ]
  },
  {
    "name": "AVG-629",
    "packages": [
      "python-openpyxl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "xml external entity injection",
    "affected": "2.4.0-1",
    "fixed": "2.4.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5992"
    ],
    "advisories": []
  },
  {
    "name": "AVG-628",
    "packages": [
      "libvncserver"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "0.9.11-3",
    "fixed": "0.9.12-1",
    "ticket": null,
    "issues": [
      "CVE-2018-7226",
      "CVE-2018-7225"
    ],
    "advisories": []
  },
  {
    "name": "AVG-627",
    "packages": [
      "unixodbc"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.3.4-1",
    "fixed": "2.3.5-1",
    "ticket": null,
    "issues": [
      "CVE-2018-7409"
    ],
    "advisories": [
      "ASA-201802-14"
    ]
  },
  {
    "name": "AVG-626",
    "packages": [
      "npm"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "access restriction bypass",
    "affected": "5.7.0-1",
    "fixed": "5.7.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-7408"
    ],
    "advisories": []
  },
  {
    "name": "AVG-621",
    "packages": [
      "systemd"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "access restriction bypass",
    "affected": "236.0-1",
    "fixed": "237.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-18078"
    ],
    "advisories": []
  },
  {
    "name": "AVG-619",
    "packages": [
      "patch"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.7.6-1",
    "fixed": "2.7.6-3",
    "ticket": "57526",
    "issues": [
      "CVE-2018-6952",
      "CVE-2018-6951",
      "CVE-2018-1000156"
    ],
    "advisories": [
      "ASA-201810-8"
    ]
  },
  {
    "name": "AVG-617",
    "packages": [
      "mbedtls"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.6.0-1",
    "fixed": "2.7.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-0488",
      "CVE-2018-0487"
    ],
    "advisories": [
      "ASA-201802-15"
    ]
  },
  {
    "name": "AVG-616",
    "packages": [
      "irssi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.1.0-1",
    "fixed": "1.1.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-7054",
      "CVE-2018-7053",
      "CVE-2018-7052",
      "CVE-2018-7051",
      "CVE-2018-7050"
    ],
    "advisories": [
      "ASA-201802-8"
    ]
  },
  {
    "name": "AVG-609",
    "packages": [
      "mupdf"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.12.0-2",
    "fixed": "1.13.0-1",
    "ticket": "57486",
    "issues": [
      "CVE-2018-6544",
      "CVE-2018-6192",
      "CVE-2018-6187",
      "CVE-2018-5686",
      "CVE-2018-1000051"
    ],
    "advisories": [
      "ASA-201805-4"
    ]
  },
  {
    "name": "AVG-608",
    "packages": [
      "exim"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.90-3",
    "fixed": "4.90.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-6789"
    ],
    "advisories": [
      "ASA-201802-6"
    ]
  },
  {
    "name": "AVG-607",
    "packages": [
      "plasma-workspace"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary command execution",
    "affected": "5.11.5-2",
    "fixed": "5.12.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-6791"
    ],
    "advisories": [
      "ASA-201802-4"
    ]
  },
  {
    "name": "AVG-606",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.9.3-1",
    "fixed": "1.9.4-1",
    "ticket": null,
    "issues": [
      "CVE-2018-6574"
    ],
    "advisories": [
      "ASA-201802-2"
    ]
  },
  {
    "name": "AVG-605",
    "packages": [
      "mpv"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1:0.27.0-6",
    "fixed": "1:0.27.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-6360"
    ],
    "advisories": [
      "ASA-201802-7"
    ]
  },
  {
    "name": "AVG-600",
    "packages": [
      "zathura-pdf-mupdf"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "0.3.2-1",
    "fixed": "0.3.2-2",
    "ticket": null,
    "issues": [
      "CVE-2017-17858"
    ],
    "advisories": [
      "ASA-201801-31"
    ]
  },
  {
    "name": "AVG-599",
    "packages": [
      "mupdf-tools",
      "libmupdf",
      "mupdf-gl",
      "mupdf"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.12.0-1",
    "fixed": "1.12.0-2",
    "ticket": null,
    "issues": [
      "CVE-2017-17858"
    ],
    "advisories": [
      "ASA-201801-29",
      "ASA-201801-27",
      "ASA-201801-28",
      "ASA-201801-30"
    ]
  },
  {
    "name": "AVG-590",
    "packages": [
      "glibc",
      "lib32-glibc"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "2.26-10",
    "fixed": "2.26-11",
    "ticket": null,
    "issues": [
      "CVE-2018-1000001"
    ],
    "advisories": [
      "ASA-201801-18",
      "ASA-201801-19"
    ]
  },
  {
    "name": "AVG-589",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "9.11.2-1",
    "fixed": "9.11.2.P1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-3145"
    ],
    "advisories": [
      "ASA-201801-16"
    ]
  },
  {
    "name": "AVG-588",
    "packages": [
      "transmission-cli"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary command execution",
    "affected": "2.92-7",
    "fixed": "2.92-8",
    "ticket": "57086",
    "issues": [
      "CVE-2018-5702"
    ],
    "advisories": [
      "ASA-201801-13"
    ]
  },
  {
    "name": "AVG-583",
    "packages": [
      "linux-firmware"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "access restriction bypass",
    "affected": "20171206.fdee922-1",
    "fixed": "20180518.2a9b2cf-1",
    "ticket": "56951",
    "issues": [
      "CVE-2017-5715"
    ],
    "advisories": []
  },
  {
    "name": "AVG-582",
    "packages": [
      "intel-ucode"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "access restriction bypass",
    "affected": "20171117-1",
    "fixed": "20180108-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5715"
    ],
    "advisories": [
      "ASA-201801-10"
    ]
  },
  {
    "name": "AVG-577",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "access restriction bypass",
    "affected": "4.9.74-1",
    "fixed": "4.9.75-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5754"
    ],
    "advisories": [
      "ASA-201801-6"
    ]
  },
  {
    "name": "AVG-576",
    "packages": [
      "qtpass"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "private key recovery",
    "affected": "1.2.0-1",
    "fixed": "1.2.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-18021"
    ],
    "advisories": [
      "ASA-201801-11"
    ]
  },
  {
    "name": "AVG-574",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.14.7.a-1",
    "fixed": "4.14.11.a-1",
    "ticket": "56832",
    "issues": [
      "CVE-2017-8824",
      "CVE-2017-5754",
      "CVE-2017-17864",
      "CVE-2017-17863",
      "CVE-2017-17862",
      "CVE-2017-17857",
      "CVE-2017-17856",
      "CVE-2017-17855",
      "CVE-2017-17854",
      "CVE-2017-17853",
      "CVE-2017-17852",
      "CVE-2017-17806",
      "CVE-2017-17805",
      "CVE-2017-17741",
      "CVE-2017-17712",
      "CVE-2017-17558",
      "CVE-2017-17450",
      "CVE-2017-17449",
      "CVE-2017-17448",
      "CVE-2017-16996",
      "CVE-2017-16995"
    ],
    "advisories": [
      "ASA-201801-4"
    ]
  },
  {
    "name": "AVG-572",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.14.11-1",
    "fixed": "4.16.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-17741",
      "CVE-2017-17450",
      "CVE-2017-17448",
      "CVE-2017-16644"
    ],
    "advisories": []
  },
  {
    "name": "AVG-571",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.14.7-1",
    "fixed": "4.14.11-1",
    "ticket": "56832",
    "issues": [
      "CVE-2017-8824",
      "CVE-2017-5754",
      "CVE-2017-17864",
      "CVE-2017-17863",
      "CVE-2017-17862",
      "CVE-2017-17857",
      "CVE-2017-17856",
      "CVE-2017-17855",
      "CVE-2017-17854",
      "CVE-2017-17853",
      "CVE-2017-17852",
      "CVE-2017-17806",
      "CVE-2017-17805",
      "CVE-2017-17712",
      "CVE-2017-17558",
      "CVE-2017-17449",
      "CVE-2017-16996",
      "CVE-2017-16995"
    ],
    "advisories": [
      "ASA-201801-3"
    ]
  },
  {
    "name": "AVG-570",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.9.59-1",
    "fixed": "4.9.60-1",
    "ticket": null,
    "issues": [
      "CVE-2017-16650",
      "CVE-2017-16649",
      "CVE-2017-16648",
      "CVE-2017-16647",
      "CVE-2017-16646",
      "CVE-2017-16645",
      "CVE-2017-16643"
    ],
    "advisories": []
  },
  {
    "name": "AVG-569",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.13.11-1",
    "fixed": "4.14-1",
    "ticket": null,
    "issues": [
      "CVE-2017-16650",
      "CVE-2017-16649",
      "CVE-2017-16648",
      "CVE-2017-16647",
      "CVE-2017-16646",
      "CVE-2017-16645",
      "CVE-2017-16643"
    ],
    "advisories": []
  },
  {
    "name": "AVG-568",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.13.11-1",
    "fixed": "4.14-1",
    "ticket": null,
    "issues": [
      "CVE-2017-16650",
      "CVE-2017-16649",
      "CVE-2017-16648",
      "CVE-2017-16647",
      "CVE-2017-16646",
      "CVE-2017-16645",
      "CVE-2017-16643"
    ],
    "advisories": []
  },
  {
    "name": "AVG-567",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.14.11-1",
    "fixed": "4.16-1",
    "ticket": null,
    "issues": [
      "CVE-2017-17741",
      "CVE-2017-17450",
      "CVE-2017-17448",
      "CVE-2017-16644"
    ],
    "advisories": []
  },
  {
    "name": "AVG-566",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.9.81-1",
    "fixed": "4.9.82-1",
    "ticket": null,
    "issues": [
      "CVE-2017-8824",
      "CVE-2017-16644"
    ],
    "advisories": []
  },
  {
    "name": "AVG-561",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.9.68-1",
    "fixed": "4.9.74-1",
    "ticket": null,
    "issues": [
      "CVE-2017-17864",
      "CVE-2017-17863",
      "CVE-2017-17862",
      "CVE-2017-17806",
      "CVE-2017-17805",
      "CVE-2017-17712",
      "CVE-2017-17558",
      "CVE-2017-17449",
      "CVE-2017-16995"
    ],
    "advisories": [
      "ASA-201801-2"
    ]
  },
  {
    "name": "AVG-560",
    "packages": [
      "linux-lts"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.9.73-1",
    "fixed": "4.9.74-1",
    "ticket": "56832",
    "issues": [
      "CVE-2017-17857",
      "CVE-2017-17856",
      "CVE-2017-17855",
      "CVE-2017-17854",
      "CVE-2017-17853",
      "CVE-2017-17852",
      "CVE-2017-16996"
    ],
    "advisories": []
  },
  {
    "name": "AVG-559",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "access restriction bypass",
    "affected": "4.9.74-1",
    "fixed": "4.9.75-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5753",
      "CVE-2017-5715"
    ],
    "advisories": []
  },
  {
    "name": "AVG-558",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "access restriction bypass",
    "affected": "4.14.11.a-1",
    "fixed": "4.15.1.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5753",
      "CVE-2017-5715"
    ],
    "advisories": []
  },
  {
    "name": "AVG-557",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "access restriction bypass",
    "affected": "4.14.11-1",
    "fixed": "4.15.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5753",
      "CVE-2017-5715"
    ],
    "advisories": []
  },
  {
    "name": "AVG-552",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.14.7-1",
    "fixed": "4.14.11-1",
    "ticket": "56832",
    "issues": [
      "CVE-2017-8824",
      "CVE-2017-5754",
      "CVE-2017-17864",
      "CVE-2017-17863",
      "CVE-2017-17862",
      "CVE-2017-17857",
      "CVE-2017-17856",
      "CVE-2017-17855",
      "CVE-2017-17854",
      "CVE-2017-17853",
      "CVE-2017-17852",
      "CVE-2017-17806",
      "CVE-2017-17805",
      "CVE-2017-17712",
      "CVE-2017-17558",
      "CVE-2017-17449",
      "CVE-2017-16996",
      "CVE-2017-16995"
    ],
    "advisories": [
      "ASA-201801-1"
    ]
  },
  {
    "name": "AVG-546",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "cross-site scripting",
    "affected": "63.0.3239.84-1",
    "fixed": "63.0.3239.108-1",
    "ticket": null,
    "issues": [
      "CVE-2017-15429"
    ],
    "advisories": [
      "ASA-201712-8",
      "ASA-201712-8"
    ]
  },
  {
    "name": "AVG-539",
    "packages": [
      "tor"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "0.3.1.8-1",
    "fixed": "0.3.1.9-1",
    "ticket": null,
    "issues": [
      "CVE-2017-8823",
      "CVE-2017-8822",
      "CVE-2017-8820",
      "CVE-2017-8819"
    ],
    "advisories": [
      "ASA-201712-10"
    ]
  },
  {
    "name": "AVG-538",
    "packages": [
      "binutils"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.29.1-3",
    "fixed": "2.30-1",
    "ticket": null,
    "issues": [
      "CVE-2017-17126",
      "CVE-2017-17125",
      "CVE-2017-17124",
      "CVE-2017-17123",
      "CVE-2017-17122"
    ],
    "advisories": []
  },
  {
    "name": "AVG-537",
    "packages": [
      "cacti"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.1.17-1",
    "fixed": "1.1.28-1",
    "ticket": null,
    "issues": [
      "CVE-2017-16785",
      "CVE-2017-16661",
      "CVE-2017-16660",
      "CVE-2017-16641"
    ],
    "advisories": [
      "ASA-201712-2"
    ]
  },
  {
    "name": "AVG-535",
    "packages": [
      "samba"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.7.1-1",
    "fixed": "4.7.3-1",
    "ticket": null,
    "issues": [
      "CVE-2017-15275",
      "CVE-2017-14746"
    ],
    "advisories": [
      "ASA-201712-1"
    ]
  },
  {
    "name": "AVG-532",
    "packages": [
      "lib32-libxcursor"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.1.14-1",
    "fixed": "1.1.15-1",
    "ticket": null,
    "issues": [
      "CVE-2017-16612"
    ],
    "advisories": [
      "ASA-201711-42"
    ]
  },
  {
    "name": "AVG-531",
    "packages": [
      "libxcursor"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.1.14-1",
    "fixed": "1.1.15-1",
    "ticket": null,
    "issues": [
      "CVE-2017-16612"
    ],
    "advisories": [
      "ASA-201711-41"
    ]
  },
  {
    "name": "AVG-529",
    "packages": [
      "libcurl-gnutls"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.56.1-1",
    "fixed": "7.57.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-8818",
      "CVE-2017-8816"
    ],
    "advisories": []
  },
  {
    "name": "AVG-528",
    "packages": [
      "libcurl-compat"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.56.1-1",
    "fixed": "7.57.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-8818",
      "CVE-2017-8816"
    ],
    "advisories": []
  },
  {
    "name": "AVG-527",
    "packages": [
      "curl"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "7.56.1-1",
    "fixed": "7.57.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-8818",
      "CVE-2017-8816"
    ],
    "advisories": []
  },
  {
    "name": "AVG-523",
    "packages": [
      "lib32-libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.56.1-1",
    "fixed": "7.57.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-8818",
      "CVE-2017-8817",
      "CVE-2017-8816"
    ],
    "advisories": [
      "ASA-201711-37"
    ]
  },
  {
    "name": "AVG-522",
    "packages": [
      "lib32-libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.56.1-1",
    "fixed": "7.57.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-8818",
      "CVE-2017-8817",
      "CVE-2017-8816"
    ],
    "advisories": [
      "ASA-201711-38"
    ]
  },
  {
    "name": "AVG-521",
    "packages": [
      "lib32-curl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.56.1-1",
    "fixed": "7.57.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-8818",
      "CVE-2017-8817",
      "CVE-2017-8816"
    ],
    "advisories": [
      "ASA-201711-36"
    ]
  },
  {
    "name": "AVG-514",
    "packages": [
      "mkinitcpio-busybox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.27.2-1",
    "fixed": "1.28.1-1",
    "ticket": "56391",
    "issues": [
      "CVE-2017-16544"
    ],
    "advisories": [
      "ASA-201803-2"
    ]
  },
  {
    "name": "AVG-512",
    "packages": [
      "busybox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.27.2-1",
    "fixed": "1.28.1-1",
    "ticket": "56391",
    "issues": [
      "CVE-2017-16544"
    ],
    "advisories": [
      "ASA-201803-1"
    ]
  },
  {
    "name": "AVG-511",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.13.7.a-1",
    "fixed": "4.13.8.a-1",
    "ticket": null,
    "issues": [
      "CVE-2017-15265"
    ],
    "advisories": []
  },
  {
    "name": "AVG-510",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.9.56-1",
    "fixed": "4.9.57-1",
    "ticket": null,
    "issues": [
      "CVE-2017-15265"
    ],
    "advisories": []
  },
  {
    "name": "AVG-509",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.13.7-1",
    "fixed": "4.13.8-1",
    "ticket": null,
    "issues": [
      "CVE-2017-15265"
    ],
    "advisories": []
  },
  {
    "name": "AVG-508",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.13.7-1",
    "fixed": "4.13.8-1",
    "ticket": null,
    "issues": [
      "CVE-2017-15265"
    ],
    "advisories": []
  },
  {
    "name": "AVG-506",
    "packages": [
      "roundcubemail"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary filesystem access",
    "affected": "1.3.2-1",
    "fixed": "1.3.3-1",
    "ticket": null,
    "issues": [
      "CVE-2017-16651"
    ],
    "advisories": [
      "ASA-201711-27"
    ]
  },
  {
    "name": "AVG-501",
    "packages": [
      "perl-xml-libxml"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.0129-1",
    "fixed": "2.0130-1",
    "ticket": "56377",
    "issues": [
      "CVE-2017-10672"
    ],
    "advisories": [
      "ASA-201801-15"
    ]
  },
  {
    "name": "AVG-500",
    "packages": [
      "perl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "5.26.0-1",
    "fixed": "5.26.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-12883"
    ],
    "advisories": []
  },
  {
    "name": "AVG-495",
    "packages": [
      "couchdb"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.1.0-1",
    "fixed": "2.1.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-12636",
      "CVE-2017-12635"
    ],
    "advisories": [
      "ASA-201711-24"
    ]
  },
  {
    "name": "AVG-490",
    "packages": [
      "mediawiki"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.29.1-1",
    "fixed": "1.29.2-1",
    "ticket": null,
    "issues": [
      "CVE-2017-8815",
      "CVE-2017-8814",
      "CVE-2017-8812",
      "CVE-2017-8811",
      "CVE-2017-8810",
      "CVE-2017-8809",
      "CVE-2017-8808",
      "CVE-2017-0361"
    ],
    "advisories": [
      "ASA-201711-20"
    ]
  },
  {
    "name": "AVG-488",
    "packages": [
      "postgresql-old-upgrade"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "9.6.5-1",
    "fixed": "9.6.6-1",
    "ticket": null,
    "issues": [
      "CVE-2017-12172"
    ],
    "advisories": []
  },
  {
    "name": "AVG-487",
    "packages": [
      "postgresql"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "10.0-1",
    "fixed": "10.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-12172"
    ],
    "advisories": []
  },
  {
    "name": "AVG-484",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.13.11-1",
    "fixed": "4.14-1",
    "ticket": null,
    "issues": [
      "CVE-2017-16650",
      "CVE-2017-16649",
      "CVE-2017-16648",
      "CVE-2017-16647",
      "CVE-2017-16646",
      "CVE-2017-16645",
      "CVE-2017-16643"
    ],
    "advisories": []
  },
  {
    "name": "AVG-483",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.13.11-1",
    "fixed": "4.14-1",
    "ticket": null,
    "issues": [
      "CVE-2017-16538",
      "CVE-2017-16537",
      "CVE-2017-16536",
      "CVE-2017-16535",
      "CVE-2017-16534",
      "CVE-2017-16533",
      "CVE-2017-16532",
      "CVE-2017-16531",
      "CVE-2017-16530",
      "CVE-2017-16529",
      "CVE-2017-16528",
      "CVE-2017-16527",
      "CVE-2017-16526",
      "CVE-2017-16525",
      "CVE-2017-15115"
    ],
    "advisories": []
  },
  {
    "name": "AVG-476",
    "packages": [
      "zathura-pdf-mupdf"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "0.3.1-3",
    "fixed": "0.3.1-4",
    "ticket": null,
    "issues": [
      "CVE-2017-15587",
      "CVE-2017-14687",
      "CVE-2017-14686",
      "CVE-2017-14685"
    ],
    "advisories": [
      "ASA-201711-5"
    ]
  },
  {
    "name": "AVG-470",
    "packages": [
      "lightdm"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "1:1.22.0-1",
    "fixed": null,
    "ticket": "56116",
    "issues": [
      "CVE-2017-7358"
    ],
    "advisories": []
  },
  {
    "name": "AVG-461",
    "packages": [
      "irssi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.0.4-3",
    "fixed": "1.0.5-1",
    "ticket": null,
    "issues": [
      "CVE-2017-15723",
      "CVE-2017-15722",
      "CVE-2017-15721",
      "CVE-2017-15228",
      "CVE-2017-15227"
    ],
    "advisories": [
      "ASA-201710-30"
    ]
  },
  {
    "name": "AVG-460",
    "packages": [
      "glibc",
      "lib32-glibc"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.26-8",
    "fixed": "2.26-9",
    "ticket": null,
    "issues": [
      "CVE-2017-15671",
      "CVE-2017-15670"
    ],
    "advisories": [
      "ASA-201801-9",
      "ASA-201801-8"
    ]
  },
  {
    "name": "AVG-458",
    "packages": [
      "mupdf-tools",
      "libmupdf",
      "mupdf-gl",
      "mupdf"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.11-4",
    "fixed": "1.11-5",
    "ticket": null,
    "issues": [
      "CVE-2017-15587",
      "CVE-2017-14687",
      "CVE-2017-14686",
      "CVE-2017-14685"
    ],
    "advisories": [
      "ASA-201711-2",
      "ASA-201711-4",
      "ASA-201711-1",
      "ASA-201711-3"
    ]
  },
  {
    "name": "AVG-455",
    "packages": [
      "linux-lts"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.9.55-1",
    "fixed": "4.9.56-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5123"
    ],
    "advisories": []
  },
  {
    "name": "AVG-454",
    "packages": [
      "wpa_supplicant"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "man-in-the-middle",
    "affected": "1:2.5-1",
    "fixed": "1:2.6-1",
    "ticket": null,
    "issues": [
      "CVE-2017-13086"
    ],
    "advisories": []
  },
  {
    "name": "AVG-453",
    "packages": [
      "hostapd"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "man-in-the-middle",
    "affected": "2.5-1",
    "fixed": "2.6-1",
    "ticket": null,
    "issues": [
      "CVE-2017-13086"
    ],
    "advisories": []
  },
  {
    "name": "AVG-452",
    "packages": [
      "wpa_supplicant"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "man-in-the-middle",
    "affected": "1:2.6-10",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2017-13084"
    ],
    "advisories": []
  },
  {
    "name": "AVG-451",
    "packages": [
      "hostapd"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "man-in-the-middle",
    "affected": "2.6-5",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2017-13084"
    ],
    "advisories": []
  },
  {
    "name": "AVG-448",
    "packages": [
      "hostapd"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "man-in-the-middle",
    "affected": "2.6-5",
    "fixed": "2.6-6",
    "ticket": null,
    "issues": [
      "CVE-2017-13088",
      "CVE-2017-13087",
      "CVE-2017-13082",
      "CVE-2017-13081",
      "CVE-2017-13080",
      "CVE-2017-13079",
      "CVE-2017-13078",
      "CVE-2017-13077"
    ],
    "advisories": [
      "ASA-201710-23"
    ]
  },
  {
    "name": "AVG-447",
    "packages": [
      "wpa_supplicant"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "man-in-the-middle",
    "affected": "1:2.6-10",
    "fixed": "1:2.6-11",
    "ticket": null,
    "issues": [
      "CVE-2017-13088",
      "CVE-2017-13087",
      "CVE-2017-13082",
      "CVE-2017-13081",
      "CVE-2017-13080",
      "CVE-2017-13079",
      "CVE-2017-13078",
      "CVE-2017-13077"
    ],
    "advisories": [
      "ASA-201710-22"
    ]
  },
  {
    "name": "AVG-446",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.13.6.a-1",
    "fixed": "4.13.7.a-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5123"
    ],
    "advisories": [
      "ASA-201710-25"
    ]
  },
  {
    "name": "AVG-445",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.13.6-1",
    "fixed": "4.13.7-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5123"
    ],
    "advisories": [
      "ASA-201710-24"
    ]
  },
  {
    "name": "AVG-444",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.13.6-1",
    "fixed": "4.13.7-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5123"
    ],
    "advisories": [
      "ASA-201710-26"
    ]
  },
  {
    "name": "AVG-443",
    "packages": [
      "xorg-server"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.19.4-1",
    "fixed": "1.19.5-1",
    "ticket": null,
    "issues": [
      "CVE-2017-12183",
      "CVE-2017-12178",
      "CVE-2017-12177",
      "CVE-2017-12176"
    ],
    "advisories": [
      "ASA-201710-29"
    ]
  },
  {
    "name": "AVG-442",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary command execution",
    "affected": "2:1.9-1",
    "fixed": "2:1.9.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-15041"
    ],
    "advisories": [
      "ASA-201710-15"
    ]
  },
  {
    "name": "AVG-435",
    "packages": [
      "binutils"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.29.1-3",
    "fixed": "2.30-1",
    "ticket": null,
    "issues": [
      "CVE-2017-15996",
      "CVE-2017-15025",
      "CVE-2017-15024",
      "CVE-2017-15023",
      "CVE-2017-15022",
      "CVE-2017-15021",
      "CVE-2017-15020"
    ],
    "advisories": []
  },
  {
    "name": "AVG-434",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.12.10-1",
    "fixed": "4.13-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000112",
      "CVE-2017-1000111"
    ],
    "advisories": []
  },
  {
    "name": "AVG-433",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "2:1.7-1",
    "fixed": "2:1.8-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000098"
    ],
    "advisories": []
  },
  {
    "name": "AVG-417",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "access restriction bypass",
    "affected": "4.13.3-1",
    "fixed": "4.13.5-1",
    "ticket": null,
    "issues": [
      "CVE-2017-12154"
    ],
    "advisories": []
  },
  {
    "name": "AVG-415",
    "packages": [
      "lib32-krb5"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.15.1-1",
    "fixed": "1.15.2-1",
    "ticket": null,
    "issues": [
      "CVE-2017-11462"
    ],
    "advisories": [
      "ASA-201710-9"
    ]
  },
  {
    "name": "AVG-414",
    "packages": [
      "krb5"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.15.1-1",
    "fixed": "1.15.2-1",
    "ticket": null,
    "issues": [
      "CVE-2017-11462",
      "CVE-2017-11368"
    ],
    "advisories": [
      "ASA-201710-8"
    ]
  },
  {
    "name": "AVG-410",
    "packages": [
      "libraw"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "0.18.4-1",
    "fixed": "0.18.5-1",
    "ticket": null,
    "issues": [
      "CVE-2017-14265",
      "CVE-2017-13735"
    ],
    "advisories": [
      "ASA-201709-18"
    ]
  },
  {
    "name": "AVG-404",
    "packages": [
      "apache"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "2.4.27-1",
    "fixed": "2.4.27-2",
    "ticket": null,
    "issues": [
      "CVE-2017-9798"
    ],
    "advisories": [
      "ASA-201709-15"
    ]
  },
  {
    "name": "AVG-396",
    "packages": [
      "bluez"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "5.46-1",
    "fixed": "5.46-2",
    "ticket": "55603",
    "issues": [
      "CVE-2017-1000250"
    ],
    "advisories": [
      "ASA-201709-3"
    ]
  },
  {
    "name": "AVG-395",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.13.1.a-1",
    "fixed": "4.13.1.b-1",
    "ticket": "55602",
    "issues": [
      "CVE-2017-1000251"
    ],
    "advisories": [
      "ASA-201709-4"
    ]
  },
  {
    "name": "AVG-394",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.13.1-1.1",
    "fixed": "4.13.2-1",
    "ticket": "55601",
    "issues": [
      "CVE-2017-1000251"
    ],
    "advisories": [
      "ASA-201709-12"
    ]
  },
  {
    "name": "AVG-393",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.9.49-1",
    "fixed": "4.9.49-2",
    "ticket": "55601",
    "issues": [
      "CVE-2017-1000251"
    ],
    "advisories": [
      "ASA-201709-8"
    ]
  },
  {
    "name": "AVG-392",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.12.12-1",
    "fixed": "4.12.13-1",
    "ticket": "55601",
    "issues": [
      "CVE-2017-1000251"
    ],
    "advisories": [
      "ASA-201709-9"
    ]
  },
  {
    "name": "AVG-390",
    "packages": [
      "libzip"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.2.0-1",
    "fixed": "1.3.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-12858"
    ],
    "advisories": [
      "ASA-201711-13"
    ]
  },
  {
    "name": "AVG-381",
    "packages": [
      "postgresql"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "9.6.3-3",
    "fixed": "9.6.4-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7548",
      "CVE-2017-7547",
      "CVE-2017-7546"
    ],
    "advisories": [
      "ASA-201709-2"
    ]
  },
  {
    "name": "AVG-374",
    "packages": [
      "varnish"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "5.1.2-1",
    "fixed": "5.1.3-1",
    "ticket": null,
    "issues": [
      "CVE-2017-12425"
    ],
    "advisories": [
      "ASA-201708-4"
    ]
  },
  {
    "name": "AVG-359",
    "packages": [
      "libsass"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "3.4.9-1",
    "fixed": "3.5.4-1",
    "ticket": null,
    "issues": [
      "CVE-2017-11608",
      "CVE-2017-11605",
      "CVE-2017-11555",
      "CVE-2017-11554"
    ],
    "advisories": []
  },
  {
    "name": "AVG-355",
    "packages": [
      "graphicsmagick"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.3.26-3",
    "fixed": "1.3.27-1",
    "ticket": null,
    "issues": [
      "CVE-2017-16547",
      "CVE-2017-15930",
      "CVE-2017-14165",
      "CVE-2017-13777",
      "CVE-2017-13776",
      "CVE-2017-13134",
      "CVE-2017-13066",
      "CVE-2017-13065",
      "CVE-2017-13064",
      "CVE-2017-13063",
      "CVE-2017-12937",
      "CVE-2017-12936",
      "CVE-2017-12935",
      "CVE-2017-11403"
    ],
    "advisories": [
      "ASA-201801-7"
    ]
  },
  {
    "name": "AVG-349",
    "packages": [
      "spice"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "0.12.8-2",
    "fixed": "0.12.8+8+ga957a90b-1",
    "ticket": "54808",
    "issues": [
      "CVE-2017-7506"
    ],
    "advisories": [
      "ASA-201708-12"
    ]
  },
  {
    "name": "AVG-347",
    "packages": [
      "vim",
      "gvim"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "8.0.0628-1",
    "fixed": "8.0.0722-1",
    "ticket": "54773",
    "issues": [
      "CVE-2017-11109"
    ],
    "advisories": [
      "ASA-201707-19",
      "ASA-201707-22"
    ]
  },
  {
    "name": "AVG-346",
    "packages": [
      "nginx-mainline"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "1.13.2-1",
    "fixed": "1.13.3-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7529"
    ],
    "advisories": [
      "ASA-201707-12"
    ]
  },
  {
    "name": "AVG-345",
    "packages": [
      "nginx"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "1.12.0-2",
    "fixed": "1.12.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7529"
    ],
    "advisories": [
      "ASA-201707-11"
    ]
  },
  {
    "name": "AVG-341",
    "packages": [
      "xorg-server"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.19.3-2",
    "fixed": "1.19.3-3",
    "ticket": null,
    "issues": [
      "CVE-2017-10972",
      "CVE-2017-10971"
    ],
    "advisories": [
      "ASA-201708-11"
    ]
  },
  {
    "name": "AVG-338",
    "packages": [
      "libgcrypt"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "private key recovery",
    "affected": "1.7.7-1",
    "fixed": "1.7.8-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7526"
    ],
    "advisories": [
      "ASA-201707-1"
    ]
  },
  {
    "name": "AVG-335",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "access restriction bypass",
    "affected": "9.11.1.P1-1",
    "fixed": "9.11.1.P2-1",
    "ticket": null,
    "issues": [
      "CVE-2017-3143",
      "CVE-2017-3142"
    ],
    "advisories": [
      "ASA-201707-3"
    ]
  },
  {
    "name": "AVG-334",
    "packages": [
      "rkhunter"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.4.2-2",
    "fixed": "1.4.4-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7480"
    ],
    "advisories": [
      "ASA-201707-24"
    ]
  },
  {
    "name": "AVG-330",
    "packages": [
      "lame"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "3.99.5-3",
    "fixed": "3.100-1",
    "ticket": "54859",
    "issues": [
      "CVE-2017-9872",
      "CVE-2017-9871",
      "CVE-2017-9870",
      "CVE-2017-9869",
      "CVE-2017-9412",
      "CVE-2017-9411",
      "CVE-2017-9410",
      "CVE-2017-8419",
      "CVE-2017-15046",
      "CVE-2017-15045",
      "CVE-2017-15019",
      "CVE-2017-13712",
      "CVE-2017-11720",
      "CVE-2015-9101",
      "CVE-2015-9100",
      "CVE-2015-9099"
    ],
    "advisories": []
  },
  {
    "name": "AVG-328",
    "packages": [
      "faad2"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "2.7-4",
    "fixed": "2.8.1-1",
    "ticket": "54613",
    "issues": [
      "CVE-2017-9257",
      "CVE-2017-9256",
      "CVE-2017-9255",
      "CVE-2017-9254",
      "CVE-2017-9253",
      "CVE-2017-9223",
      "CVE-2017-9222",
      "CVE-2017-9221",
      "CVE-2017-9220",
      "CVE-2017-9219",
      "CVE-2017-9218"
    ],
    "advisories": []
  },
  {
    "name": "AVG-326",
    "packages": [
      "poppler"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "0.55.0-3",
    "fixed": "0.56.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9776",
      "CVE-2017-9775"
    ],
    "advisories": [
      "ASA-201706-33"
    ]
  },
  {
    "name": "AVG-325",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.9.33-1",
    "fixed": "4.9.34-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000364"
    ],
    "advisories": []
  },
  {
    "name": "AVG-324",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.11.6-1",
    "fixed": "4.11.6-3",
    "ticket": null,
    "issues": [
      "CVE-2017-1000364"
    ],
    "advisories": [
      "ASA-201706-30"
    ]
  },
  {
    "name": "AVG-317",
    "packages": [
      "linux-hardened"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.11.6.b-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2017-1000377"
    ],
    "advisories": []
  },
  {
    "name": "AVG-316",
    "packages": [
      "apache"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.4.25-3",
    "fixed": "2.4.26-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7679",
      "CVE-2017-7668",
      "CVE-2017-7659",
      "CVE-2017-3169",
      "CVE-2017-3167"
    ],
    "advisories": [
      "ASA-201706-34"
    ]
  },
  {
    "name": "AVG-314",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.11.6.b-1",
    "fixed": "4.11.6.d-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000364"
    ],
    "advisories": [
      "ASA-201706-28"
    ]
  },
  {
    "name": "AVG-313",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.11.6-1",
    "fixed": "4.11.6-3",
    "ticket": null,
    "issues": [
      "CVE-2017-1000364"
    ],
    "advisories": [
      "ASA-201706-31"
    ]
  },
  {
    "name": "AVG-310",
    "packages": [
      "libffi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "3.1-3",
    "fixed": "3.2.1-1",
    "ticket": "54857",
    "issues": [
      "CVE-2017-1000376"
    ],
    "advisories": []
  },
  {
    "name": "AVG-308",
    "packages": [
      "lib32-glibc"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "2.25-3",
    "fixed": "2.25-4",
    "ticket": null,
    "issues": [
      "CVE-2017-1000366"
    ],
    "advisories": [
      "ASA-201706-22"
    ]
  },
  {
    "name": "AVG-307",
    "packages": [
      "glibc"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "2.25-3",
    "fixed": "2.25-4",
    "ticket": null,
    "issues": [
      "CVE-2017-1000366"
    ],
    "advisories": [
      "ASA-201706-23"
    ]
  },
  {
    "name": "AVG-304",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "59.0.3071.86-1",
    "fixed": "59.0.3071.104-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5089",
      "CVE-2017-5088",
      "CVE-2017-5087"
    ],
    "advisories": [
      "ASA-201706-21",
      "ASA-201706-21"
    ]
  },
  {
    "name": "AVG-286",
    "packages": [
      "lib32-libtasn1"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.10-1",
    "fixed": "4.11-1",
    "ticket": null,
    "issues": [
      "CVE-2017-6891"
    ],
    "advisories": [
      "ASA-201706-10"
    ]
  },
  {
    "name": "AVG-285",
    "packages": [
      "libtasn1"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.10-1",
    "fixed": "4.11-1",
    "ticket": null,
    "issues": [
      "CVE-2017-6891"
    ],
    "advisories": [
      "ASA-201706-3"
    ]
  },
  {
    "name": "AVG-284",
    "packages": [
      "gajim"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "information disclosure",
    "affected": "0.16.7-1",
    "fixed": "0.16.8-1",
    "ticket": null,
    "issues": [
      "CVE-2016-1037"
    ],
    "advisories": [
      "ASA-201706-4"
    ]
  },
  {
    "name": "AVG-283",
    "packages": [
      "vlc"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.2.4-9",
    "fixed": "2.2.6-1",
    "ticket": "54194",
    "issues": [
      "CVE-2017-8312",
      "CVE-2017-8311",
      "CVE-2017-8310"
    ],
    "advisories": [
      "ASA-201706-1"
    ]
  },
  {
    "name": "AVG-281",
    "packages": [
      "freeradius"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "authentication bypass",
    "affected": "3.0.13-1",
    "fixed": "3.0.14-3",
    "ticket": null,
    "issues": [
      "CVE-2017-9148"
    ],
    "advisories": [
      "ASA-201706-2"
    ]
  },
  {
    "name": "AVG-280",
    "packages": [
      "postgresql-libs"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "man-in-the-middle",
    "affected": "9.6.2-1",
    "fixed": "9.6.3-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7485"
    ],
    "advisories": [
      "ASA-201705-24"
    ]
  },
  {
    "name": "AVG-279",
    "packages": [
      "samba"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.5.8-1",
    "fixed": "4.5.10-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7494"
    ],
    "advisories": [
      "ASA-201705-22"
    ]
  },
  {
    "name": "AVG-278",
    "packages": [
      "lynis"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary file overwrite",
    "affected": "2.4.9-1",
    "fixed": "2.5.0-1",
    "ticket": "54067",
    "issues": [
      "CVE-2017-8108"
    ],
    "advisories": [
      "ASA-201705-20"
    ]
  },
  {
    "name": "AVG-276",
    "packages": [
      "binutils"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.28.0-4",
    "fixed": "2.29.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9044",
      "CVE-2017-9043",
      "CVE-2017-9042",
      "CVE-2017-9041",
      "CVE-2017-9040",
      "CVE-2017-9039",
      "CVE-2017-9038",
      "CVE-2017-7210",
      "CVE-2017-7209",
      "CVE-2017-6969",
      "CVE-2017-6966",
      "CVE-2017-6965"
    ],
    "advisories": []
  },
  {
    "name": "AVG-275",
    "packages": [
      "libytnef"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.9.2-1",
    "fixed": "1.9.2-2",
    "ticket": null,
    "issues": [
      "CVE-2017-9058"
    ],
    "advisories": [
      "ASA-201708-10"
    ]
  },
  {
    "name": "AVG-271",
    "packages": [
      "openvpn"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "2.4.1-2",
    "fixed": "2.4.2-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7479",
      "CVE-2017-7478"
    ],
    "advisories": [
      "ASA-201705-16"
    ]
  },
  {
    "name": "AVG-269",
    "packages": [
      "kauth"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "5.33.0-1",
    "fixed": "5.33.0-2",
    "ticket": null,
    "issues": [
      "CVE-2017-8422"
    ],
    "advisories": [
      "ASA-201705-12"
    ]
  },
  {
    "name": "AVG-268",
    "packages": [
      "smb4k"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "2.0.0-1",
    "fixed": "2.0.0-2",
    "ticket": null,
    "issues": [
      "CVE-2017-8849"
    ],
    "advisories": [
      "ASA-201705-11"
    ]
  },
  {
    "name": "AVG-267",
    "packages": [
      "git"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "access restriction bypass",
    "affected": "2.12.2-4",
    "fixed": "2.13.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-8386"
    ],
    "advisories": [
      "ASA-201705-14"
    ]
  },
  {
    "name": "AVG-260",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "58.0.3029.81-4",
    "fixed": "58.0.3029.96-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5068"
    ],
    "advisories": [
      "ASA-201705-2",
      "ASA-201705-2"
    ]
  },
  {
    "name": "AVG-258",
    "packages": [
      "lib32-freetype2"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.7.1-1",
    "fixed": "2.7.1-2",
    "ticket": null,
    "issues": [
      "CVE-2017-8287",
      "CVE-2017-8105"
    ],
    "advisories": [
      "ASA-201705-10"
    ]
  },
  {
    "name": "AVG-257",
    "packages": [
      "freetype2"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.7.1-1",
    "fixed": "2.7.1-2",
    "ticket": null,
    "issues": [
      "CVE-2017-8287",
      "CVE-2017-8105"
    ],
    "advisories": [
      "ASA-201705-7"
    ]
  },
  {
    "name": "AVG-256",
    "packages": [
      "ghostscript"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary command execution",
    "affected": "9.21-1",
    "fixed": "9.21-2",
    "ticket": null,
    "issues": [
      "CVE-2017-8291"
    ],
    "advisories": [
      "ASA-201705-3"
    ]
  },
  {
    "name": "AVG-255",
    "packages": [
      "jenkins"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.56-1",
    "fixed": "2.57-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000356",
      "CVE-2017-1000355",
      "CVE-2017-1000354"
    ],
    "advisories": [
      "ASA-201704-8"
    ]
  },
  {
    "name": "AVG-253",
    "packages": [
      "weechat"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "1.7-2",
    "fixed": "1.7.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-8073"
    ],
    "advisories": [
      "ASA-201704-7"
    ]
  },
  {
    "name": "AVG-252",
    "packages": [
      "lib32-freetype2"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.7-2",
    "fixed": "2.7.1-1",
    "ticket": null,
    "issues": [
      "CVE-2016-10328"
    ],
    "advisories": []
  },
  {
    "name": "AVG-251",
    "packages": [
      "freetype2"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "2.7-2",
    "fixed": "2.7.1-1",
    "ticket": null,
    "issues": [
      "CVE-2016-10328"
    ],
    "advisories": []
  },
  {
    "name": "AVG-239",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "9.11.0.P3-4",
    "fixed": "9.11.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-3138",
      "CVE-2017-3137",
      "CVE-2017-3136"
    ],
    "advisories": [
      "ASA-201704-11"
    ]
  },
  {
    "name": "AVG-236",
    "packages": [
      "mediawiki"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.28.0-1",
    "fixed": "1.28.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-0370",
      "CVE-2017-0369",
      "CVE-2017-0368",
      "CVE-2017-0367",
      "CVE-2017-0366",
      "CVE-2017-0365",
      "CVE-2017-0364",
      "CVE-2017-0363",
      "CVE-2017-0362",
      "CVE-2017-0361"
    ],
    "advisories": [
      "ASA-201704-3"
    ]
  },
  {
    "name": "AVG-232",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.10.6-1",
    "fixed": "4.10.8-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7374"
    ],
    "advisories": []
  },
  {
    "name": "AVG-224",
    "packages": [
      "irssi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.0.1-1",
    "fixed": "1.0.2-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7191"
    ],
    "advisories": [
      "ASA-201703-17"
    ]
  },
  {
    "name": "AVG-219",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "52.0-2",
    "fixed": "52.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5428"
    ],
    "advisories": [
      "ASA-201703-15"
    ]
  },
  {
    "name": "AVG-218",
    "packages": [
      "mupdf"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.10_a-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2017-6060"
    ],
    "advisories": []
  },
  {
    "name": "AVG-216",
    "packages": [
      "podofo"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "0.9.5-2",
    "fixed": "0.9.6-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7994",
      "CVE-2017-7383",
      "CVE-2017-7382",
      "CVE-2017-7381",
      "CVE-2017-7380",
      "CVE-2017-7379",
      "CVE-2017-7378",
      "CVE-2017-6842",
      "CVE-2017-6841",
      "CVE-2017-6840"
    ],
    "advisories": []
  },
  {
    "name": "AVG-215",
    "packages": [
      "libplist"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.12-6",
    "fixed": "2.0.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-6440",
      "CVE-2017-6439",
      "CVE-2017-6438",
      "CVE-2017-6437",
      "CVE-2017-6436",
      "CVE-2017-6435",
      "CVE-2017-5836",
      "CVE-2017-5835",
      "CVE-2017-5834",
      "CVE-2017-5545",
      "CVE-2017-5209"
    ],
    "advisories": [
      "ASA-201705-18"
    ]
  },
  {
    "name": "AVG-212",
    "packages": [
      "ettercap"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "0.8.2-4",
    "fixed": "0.8.2-5",
    "ticket": null,
    "issues": [
      "CVE-2017-8366",
      "CVE-2017-6430"
    ],
    "advisories": [
      "ASA-201709-16"
    ]
  },
  {
    "name": "AVG-211",
    "packages": [
      "tcpreplay"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "4.1.0-1",
    "fixed": "4.2.5-1",
    "ticket": null,
    "issues": [
      "CVE-2017-6429"
    ],
    "advisories": [
      "ASA-201706-29"
    ]
  },
  {
    "name": "AVG-207",
    "packages": [
      "jasper"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.900.9-1",
    "fixed": "1.900.20-1",
    "ticket": null,
    "issues": [
      "CVE-2016-10251",
      "CVE-2016-10249",
      "CVE-2016-10248"
    ],
    "advisories": []
  },
  {
    "name": "AVG-206",
    "packages": [
      "jasper"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.0.13-2",
    "fixed": "2.0.14-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9782",
      "CVE-2017-6852",
      "CVE-2017-6850",
      "CVE-2017-5505",
      "CVE-2017-5504",
      "CVE-2017-5503"
    ],
    "advisories": []
  },
  {
    "name": "AVG-205",
    "packages": [
      "audiofile"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "0.3.6-3",
    "fixed": "0.3.6-4",
    "ticket": null,
    "issues": [
      "CVE-2017-6839",
      "CVE-2017-6838",
      "CVE-2017-6837",
      "CVE-2017-6836",
      "CVE-2017-6835",
      "CVE-2017-6834",
      "CVE-2017-6833",
      "CVE-2017-6832",
      "CVE-2017-6831",
      "CVE-2017-6830",
      "CVE-2017-6829",
      "CVE-2017-6828",
      "CVE-2017-6827"
    ],
    "advisories": [
      "ASA-201708-9"
    ]
  },
  {
    "name": "AVG-203",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.10.1-1",
    "fixed": "4.10.2-1",
    "ticket": "53242",
    "issues": [
      "CVE-2017-2636"
    ],
    "advisories": [
      "ASA-201703-13"
    ]
  },
  {
    "name": "AVG-200",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.9.13-1",
    "fixed": "4.9.14-1",
    "ticket": "53242",
    "issues": [
      "CVE-2017-2636"
    ],
    "advisories": [
      "ASA-201703-6"
    ]
  },
  {
    "name": "AVG-192",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.10.1-1",
    "fixed": "4.10.2-1",
    "ticket": "53242",
    "issues": [
      "CVE-2017-2636"
    ],
    "advisories": [
      "ASA-201703-8"
    ]
  },
  {
    "name": "AVG-191",
    "packages": [
      "zziplib"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "0.13.62-2",
    "fixed": "0.13.66-2",
    "ticket": "53133",
    "issues": [
      "CVE-2017-5981",
      "CVE-2017-5979",
      "CVE-2017-5976",
      "CVE-2017-5975",
      "CVE-2017-5974"
    ],
    "advisories": [
      "ASA-201705-15"
    ]
  },
  {
    "name": "AVG-190",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.4.1-1",
    "fixed": "4.4.41-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9588",
      "CVE-2016-10088"
    ],
    "advisories": []
  },
  {
    "name": "AVG-189",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.4.50-1",
    "fixed": "4.9.13-1",
    "ticket": null,
    "issues": [
      "CVE-2017-6074"
    ],
    "advisories": []
  },
  {
    "name": "AVG-188",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.4.50-1",
    "fixed": "4.9.13-1",
    "ticket": null,
    "issues": [
      "CVE-2017-6001",
      "CVE-2017-5986"
    ],
    "advisories": []
  },
  {
    "name": "AVG-187",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.9.6-1",
    "fixed": "4.9.7-1",
    "ticket": null,
    "issues": [
      "CVE-2017-6001"
    ],
    "advisories": []
  },
  {
    "name": "AVG-186",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.9.8-1",
    "fixed": "4.9.11-2",
    "ticket": null,
    "issues": [
      "CVE-2017-6074",
      "CVE-2017-5986",
      "CVE-2016-9588",
      "CVE-2016-10088"
    ],
    "advisories": [
      "ASA-201702-18"
    ]
  },
  {
    "name": "AVG-178",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.9.8-1",
    "fixed": "4.9.11-1",
    "ticket": null,
    "issues": [
      "CVE-2017-6074",
      "CVE-2017-5986",
      "CVE-2016-9588",
      "CVE-2016-10088"
    ],
    "advisories": [
      "ASA-201702-17"
    ]
  },
  {
    "name": "AVG-169",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "9.11.0.P2-1",
    "fixed": "9.11.0.P3-1",
    "ticket": null,
    "issues": [
      "CVE-2017-3135"
    ],
    "advisories": [
      "ASA-201702-8"
    ]
  },
  {
    "name": "AVG-152",
    "packages": [
      "php"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "access restriction bypass",
    "affected": "7.0.9-1",
    "fixed": "7.0.10-1",
    "ticket": null,
    "issues": [
      "CVE-2016-7125"
    ],
    "advisories": []
  },
  {
    "name": "AVG-144",
    "packages": [
      "lib32-openssl"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "denial of service",
    "affected": "1:1.1.0.a-1",
    "fixed": "1:1.1.0.c-1",
    "ticket": null,
    "issues": [
      "CVE-2016-7054"
    ],
    "advisories": []
  },
  {
    "name": "AVG-143",
    "packages": [
      "openssl"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "denial of service",
    "affected": "1.1.0.a-1",
    "fixed": "1.1.0.c-1",
    "ticket": null,
    "issues": [
      "CVE-2016-7054",
      "CVE-2016-7053"
    ],
    "advisories": []
  },
  {
    "name": "AVG-142",
    "packages": [
      "wordpress"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.7-1",
    "fixed": "4.7.1-1",
    "ticket": "52555",
    "issues": [
      "CVE-2017-5493",
      "CVE-2017-5492",
      "CVE-2017-5491",
      "CVE-2017-5490",
      "CVE-2017-5489",
      "CVE-2017-5488",
      "CVE-2017-5487",
      "CVE-2016-10045",
      "CVE-2016-10033"
    ],
    "advisories": [
      "ASA-201701-22"
    ]
  },
  {
    "name": "AVG-139",
    "packages": [
      "nginx-mainline"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "1.11.8-1",
    "fixed": "1.11.8-2",
    "ticket": "52547",
    "issues": [
      "CVE-2016-1247"
    ],
    "advisories": [
      "ASA-201701-24"
    ]
  },
  {
    "name": "AVG-138",
    "packages": [
      "nginx"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "1.10.2-2",
    "fixed": "1.10.2-3",
    "ticket": "52546",
    "issues": [
      "CVE-2016-1247"
    ],
    "advisories": [
      "ASA-201701-23"
    ]
  },
  {
    "name": "AVG-137",
    "packages": [
      "ansible"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary command execution",
    "affected": "2.2.0.0-1",
    "fixed": "2.2.1.0rc5-3",
    "ticket": null,
    "issues": [
      "CVE-2016-9587"
    ],
    "advisories": []
  },
  {
    "name": "AVG-134",
    "packages": [
      "runc"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "0.1.1-4",
    "fixed": "1.0.0rc5+19+g69663f0b-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9962"
    ],
    "advisories": [
      "ASA-201805-11"
    ]
  },
  {
    "name": "AVG-133",
    "packages": [
      "docker"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "1:1.12.5-1",
    "fixed": "1:1.12.6-1",
    "ticket": "52493",
    "issues": [
      "CVE-2016-9962"
    ],
    "advisories": [
      "ASA-201701-19"
    ]
  },
  {
    "name": "AVG-132",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "9.11.0.P1-3",
    "fixed": "9.11.0.P2-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9778",
      "CVE-2016-9444",
      "CVE-2016-9147",
      "CVE-2016-9131"
    ],
    "advisories": [
      "ASA-201701-15"
    ]
  },
  {
    "name": "AVG-131",
    "packages": [
      "libgit2"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1:0.24.3-1",
    "fixed": "1:0.24.6-1",
    "ticket": null,
    "issues": [
      "CVE-2016-10130",
      "CVE-2016-10129",
      "CVE-2016-10128"
    ],
    "advisories": [
      "ASA-201701-21"
    ]
  },
  {
    "name": "AVG-130",
    "packages": [
      "ark"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary command execution",
    "affected": "16.12.0-1",
    "fixed": "16.12.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5330"
    ],
    "advisories": [
      "ASA-201701-18"
    ]
  },
  {
    "name": "AVG-129",
    "packages": [
      "icoutils"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "0.31.0-1",
    "fixed": "0.31.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5208"
    ],
    "advisories": [
      "ASA-201701-13"
    ]
  },
  {
    "name": "AVG-128",
    "packages": [
      "firejail"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "0.9.44.2-1",
    "fixed": "0.9.44.10-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5207",
      "CVE-2017-5206",
      "CVE-2017-5180",
      "CVE-2016-10123",
      "CVE-2016-10122",
      "CVE-2016-10121",
      "CVE-2016-10120",
      "CVE-2016-10119",
      "CVE-2016-10118",
      "CVE-2016-10117"
    ],
    "advisories": []
  },
  {
    "name": "AVG-127",
    "packages": [
      "irssi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "0.8.20-1",
    "fixed": "0.8.21-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5196",
      "CVE-2017-5195",
      "CVE-2017-5194",
      "CVE-2017-5193"
    ],
    "advisories": [
      "ASA-201701-14"
    ]
  },
  {
    "name": "AVG-105",
    "packages": [
      "php"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.0.13-1",
    "fixed": "7.1.1-0",
    "ticket": null,
    "issues": [
      "CVE-2017-5340",
      "CVE-2016-9936",
      "CVE-2016-9935"
    ],
    "advisories": [
      "ASA-201701-28"
    ]
  },
  {
    "name": "AVG-104",
    "packages": [
      "linux-lts"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "denial of service",
    "affected": "4.4.36-1",
    "fixed": "4.4.37-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9919"
    ],
    "advisories": []
  },
  {
    "name": "AVG-102",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "4.8.12-2",
    "fixed": "4.8.13-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9919"
    ],
    "advisories": [
      "ASA-201612-14"
    ]
  },
  {
    "name": "AVG-101",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "4.8.12-2",
    "fixed": "4.8.12-3",
    "ticket": null,
    "issues": [
      "CVE-2016-9919"
    ],
    "advisories": [
      "ASA-201612-10"
    ]
  },
  {
    "name": "AVG-98",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.8.12-1",
    "fixed": "4.8.12-2",
    "ticket": null,
    "issues": [
      "CVE-2016-8655"
    ],
    "advisories": [
      "ASA-201612-8"
    ]
  },
  {
    "name": "AVG-96",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.4.35-1",
    "fixed": "4.4.36-1",
    "ticket": null,
    "issues": [
      "CVE-2016-8655"
    ],
    "advisories": [
      "ASA-201612-7"
    ]
  },
  {
    "name": "AVG-95",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.8.12-1",
    "fixed": "4.8.12-2",
    "ticket": null,
    "issues": [
      "CVE-2016-8655"
    ],
    "advisories": [
      "ASA-201612-6"
    ]
  },
  {
    "name": "AVG-89",
    "packages": [
      "libdwarf"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "20161021-1",
    "fixed": "20161124-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9558",
      "CVE-2016-9480",
      "CVE-2016-9276",
      "CVE-2016-9275",
      "CVE-2016-8681",
      "CVE-2016-8680",
      "CVE-2016-8679",
      "CVE-2016-7511",
      "CVE-2016-7510",
      "CVE-2016-5044",
      "CVE-2016-5043",
      "CVE-2016-5041",
      "CVE-2016-5040",
      "CVE-2016-5037",
      "CVE-2016-5035",
      "CVE-2016-5033",
      "CVE-2016-5032",
      "CVE-2016-5031",
      "CVE-2016-5030",
      "CVE-2016-5029",
      "CVE-2016-5028",
      "CVE-2016-5027"
    ],
    "advisories": [
      "ASA-201612-4"
    ]
  },
  {
    "name": "AVG-88",
    "packages": [
      "jasper"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.900.1-14",
    "fixed": "1.900.1-15",
    "ticket": "48511",
    "issues": [
      "CVE-2016-2116",
      "CVE-2016-1577"
    ],
    "advisories": []
  },
  {
    "name": "AVG-83",
    "packages": [
      "vim"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary command execution",
    "affected": "8.0.0055-1",
    "fixed": "8.0.0056-1",
    "ticket": null,
    "issues": [
      "CVE-2016-1248"
    ],
    "advisories": []
  },
  {
    "name": "AVG-82",
    "packages": [
      "neovim"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary command execution",
    "affected": "0.1.6-1",
    "fixed": "0.1.7-1",
    "ticket": "51927",
    "issues": [
      "CVE-2016-1248"
    ],
    "advisories": [
      "ASA-201611-29"
    ]
  },
  {
    "name": "AVG-81",
    "packages": [
      "ntp"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "denial of service",
    "affected": "4.2.8.p8-1",
    "fixed": "4.2.8.p9-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9312"
    ],
    "advisories": []
  },
  {
    "name": "AVG-80",
    "packages": [
      "ntp"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.2.8.p8-1",
    "fixed": "4.2.8.p9-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9311",
      "CVE-2016-9310",
      "CVE-2016-7434",
      "CVE-2016-7433",
      "CVE-2016-7431",
      "CVE-2016-7429",
      "CVE-2016-7428",
      "CVE-2016-7427",
      "CVE-2016-7426"
    ],
    "advisories": []
  },
  {
    "name": "AVG-79",
    "packages": [
      "ntp"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.2.8.p8-1",
    "fixed": "4.2.8.p9-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9311",
      "CVE-2016-9310",
      "CVE-2016-7434",
      "CVE-2016-7433",
      "CVE-2016-7431",
      "CVE-2016-7429",
      "CVE-2016-7428",
      "CVE-2016-7427",
      "CVE-2016-7426"
    ],
    "advisories": [
      "ASA-201611-28"
    ]
  },
  {
    "name": "AVG-78",
    "packages": [
      "wireshark-cli",
      "wireshark-qt"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.2.1-1",
    "fixed": "2.2.2-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9376",
      "CVE-2016-9375",
      "CVE-2016-9374",
      "CVE-2016-9373"
    ],
    "advisories": [
      "ASA-201611-25",
      "ASA-201611-24"
    ]
  },
  {
    "name": "AVG-76",
    "packages": [
      "gst-plugins-bad"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.10.0-1",
    "fixed": "1.10.2-2",
    "ticket": null,
    "issues": [
      "CVE-2016-9446",
      "CVE-2016-9445"
    ],
    "advisories": [
      "ASA-201701-3"
    ]
  },
  {
    "name": "AVG-69",
    "packages": [
      "jasper"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.0.10-1",
    "fixed": "2.0.12-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9591",
      "CVE-2016-8886"
    ],
    "advisories": [
      "ASA-201703-9"
    ]
  },
  {
    "name": "AVG-66",
    "packages": [
      "lib32-libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.50.3-1",
    "fixed": "7.51.0-1",
    "ticket": null,
    "issues": [
      "CVE-2016-8625",
      "CVE-2016-8624",
      "CVE-2016-8623",
      "CVE-2016-8621",
      "CVE-2016-8619",
      "CVE-2016-8618",
      "CVE-2016-8617",
      "CVE-2016-8616",
      "CVE-2016-8615"
    ],
    "advisories": [
      "ASA-201611-10"
    ]
  },
  {
    "name": "AVG-65",
    "packages": [
      "libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.50.3-1",
    "fixed": "7.51.0-1",
    "ticket": null,
    "issues": [
      "CVE-2016-8625",
      "CVE-2016-8624",
      "CVE-2016-8623",
      "CVE-2016-8622",
      "CVE-2016-8621",
      "CVE-2016-8619",
      "CVE-2016-8617",
      "CVE-2016-8616",
      "CVE-2016-8615"
    ],
    "advisories": [
      "ASA-201611-9"
    ]
  },
  {
    "name": "AVG-63",
    "packages": [
      "lib32-libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.50.3-1",
    "fixed": "7.51.0-1",
    "ticket": null,
    "issues": [
      "CVE-2016-8625",
      "CVE-2016-8624",
      "CVE-2016-8623",
      "CVE-2016-8621",
      "CVE-2016-8619",
      "CVE-2016-8618",
      "CVE-2016-8617",
      "CVE-2016-8616",
      "CVE-2016-8615"
    ],
    "advisories": [
      "ASA-201611-5"
    ]
  },
  {
    "name": "AVG-62",
    "packages": [
      "libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.50.3-1",
    "fixed": "7.51.0-1",
    "ticket": null,
    "issues": [
      "CVE-2016-8625",
      "CVE-2016-8624",
      "CVE-2016-8623",
      "CVE-2016-8622",
      "CVE-2016-8621",
      "CVE-2016-8619",
      "CVE-2016-8617",
      "CVE-2016-8616",
      "CVE-2016-8615"
    ],
    "advisories": [
      "ASA-201611-8"
    ]
  },
  {
    "name": "AVG-61",
    "packages": [
      "lib32-curl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.50.3-1",
    "fixed": "7.51.0-1",
    "ticket": null,
    "issues": [
      "CVE-2016-8625",
      "CVE-2016-8624",
      "CVE-2016-8623",
      "CVE-2016-8621",
      "CVE-2016-8619",
      "CVE-2016-8618",
      "CVE-2016-8617",
      "CVE-2016-8616",
      "CVE-2016-8615"
    ],
    "advisories": [
      "ASA-201611-4"
    ]
  },
  {
    "name": "AVG-60",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.50.3-1",
    "fixed": "7.51.0-1",
    "ticket": null,
    "issues": [
      "CVE-2016-8625",
      "CVE-2016-8624",
      "CVE-2016-8623",
      "CVE-2016-8622",
      "CVE-2016-8621",
      "CVE-2016-8620",
      "CVE-2016-8619",
      "CVE-2016-8617",
      "CVE-2016-8616",
      "CVE-2016-8615"
    ],
    "advisories": [
      "ASA-201611-7"
    ]
  },
  {
    "name": "AVG-59",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "9.11.0-2",
    "fixed": "9.11.0.P1-1",
    "ticket": null,
    "issues": [
      "CVE-2016-8864"
    ],
    "advisories": [
      "ASA-201611-3"
    ]
  },
  {
    "name": "AVG-58",
    "packages": [
      "php"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "7.0.12-2",
    "fixed": "7.0.13-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9934",
      "CVE-2016-9933",
      "CVE-2016-9138",
      "CVE-2016-8670",
      "CVE-2016-7568",
      "CVE-2016-7478",
      "CVE-2016-6911"
    ],
    "advisories": [
      "ASA-201611-19"
    ]
  },
  {
    "name": "AVG-57",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.10.2-1",
    "fixed": "1.10.3-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9014",
      "CVE-2016-9013"
    ],
    "advisories": [
      "ASA-201611-15"
    ]
  },
  {
    "name": "AVG-54",
    "packages": [
      "openjpeg2"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.1.2-2",
    "fixed": "2.2.0-1",
    "ticket": "54860",
    "issues": [
      "CVE-2016-9118",
      "CVE-2016-9117",
      "CVE-2016-9116",
      "CVE-2016-9115",
      "CVE-2016-9114",
      "CVE-2016-9113"
    ],
    "advisories": []
  },
  {
    "name": "AVG-50",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.4.25-1",
    "fixed": "4.4.26-1",
    "ticket": null,
    "issues": [
      "CVE-2016-5195"
    ],
    "advisories": [
      "ASA-201610-11"
    ]
  },
  {
    "name": "AVG-48",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "privilege escalation",
    "affected": "4.8.2-1",
    "fixed": "4.8.3-1",
    "ticket": null,
    "issues": [
      "CVE-2016-5195"
    ],
    "advisories": [
      "ASA-201610-14"
    ]
  },
  {
    "name": "AVG-47",
    "packages": [
      "guile"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.0.12-1",
    "fixed": "2.0.13-1",
    "ticket": null,
    "issues": [
      "CVE-2016-8606",
      "CVE-2016-8605"
    ],
    "advisories": [
      "ASA-201610-10"
    ]
  },
  {
    "name": "AVG-40",
    "packages": [
      "imagemagick"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "6.9.5.10-1",
    "fixed": "6.9.6.0-1",
    "ticket": null,
    "issues": [
      "CVE-2016-7906",
      "CVE-2016-7799"
    ],
    "advisories": [
      "ASA-201610-6"
    ]
  },
  {
    "name": "AVG-39",
    "packages": [
      "wordpress"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.6.0-1",
    "fixed": "4.6.1-1",
    "ticket": null,
    "issues": [
      "CVE-2016-7169",
      "CVE-2016-7168"
    ],
    "advisories": [
      "ASA-201609-32"
    ]
  },
  {
    "name": "AVG-38",
    "packages": [
      "systemd"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "231-1",
    "fixed": "231-2",
    "ticket": "51035",
    "issues": [
      "CVE-2016-7795"
    ],
    "advisories": [
      "ASA-201610-2"
    ]
  },
  {
    "name": "AVG-37",
    "packages": [
      "c-ares"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "1.11.0-1",
    "fixed": "1.12.0-1",
    "ticket": null,
    "issues": [
      "CVE-2016-5180"
    ],
    "advisories": [
      "ASA-201609-31"
    ]
  },
  {
    "name": "AVG-36",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "denial of service",
    "affected": "9.10.4.P2-1",
    "fixed": "9.10.4.P3-1",
    "ticket": null,
    "issues": [
      "CVE-2016-2776"
    ],
    "advisories": [
      "ASA-201609-29"
    ]
  },
  {
    "name": "AVG-30",
    "packages": [
      "lib32-openssl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1:1.0.2.h-1",
    "fixed": "1:1.0.2.i-1",
    "ticket": null,
    "issues": [
      "CVE-2016-6306",
      "CVE-2016-6304",
      "CVE-2016-6303",
      "CVE-2016-6302",
      "CVE-2016-2183",
      "CVE-2016-2182",
      "CVE-2016-2181",
      "CVE-2016-2180",
      "CVE-2016-2179",
      "CVE-2016-2178",
      "CVE-2016-2177"
    ],
    "advisories": [
      "ASA-201609-24"
    ]
  },
  {
    "name": "AVG-29",
    "packages": [
      "openssl"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1.0.2.h-1",
    "fixed": "1.0.2.i-1",
    "ticket": "49616",
    "issues": [
      "CVE-2016-6306",
      "CVE-2016-6304",
      "CVE-2016-6303",
      "CVE-2016-6302",
      "CVE-2016-2183",
      "CVE-2016-2182",
      "CVE-2016-2181",
      "CVE-2016-2180",
      "CVE-2016-2179",
      "CVE-2016-2178",
      "CVE-2016-2177"
    ],
    "advisories": [
      "ASA-201609-23"
    ]
  },
  {
    "name": "AVG-28",
    "packages": [
      "irssi"
    ],
    "status": "Not affected",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "0.8.19-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2016-7044"
    ],
    "advisories": []
  },
  {
    "name": "AVG-27",
    "packages": [
      "irssi"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "arbitrary code execution",
    "affected": "0.8.19-2",
    "fixed": "0.8.20-1",
    "ticket": null,
    "issues": [
      "CVE-2016-7045"
    ],
    "advisories": [
      "ASA-201609-20"
    ]
  },
  {
    "name": "AVG-10",
    "packages": [
      "hostapd"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "2.5-2",
    "fixed": "2.6-1",
    "ticket": "49196",
    "issues": [
      "CVE-2016-4477",
      "CVE-2016-4476"
    ],
    "advisories": [
      "ASA-201610-3"
    ]
  },
  {
    "name": "AVG-11",
    "packages": [
      "wpa_supplicant"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "1:2.5-3",
    "fixed": "1:2.6-1",
    "ticket": "49196",
    "issues": [
      "CVE-2016-4477",
      "CVE-2016-4476"
    ],
    "advisories": [
      "ASA-201610-7"
    ]
  },
  {
    "name": "AVG-15",
    "packages": [
      "openfire"
    ],
    "status": "Fixed",
    "severity": "High",
    "type": "multiple issues",
    "affected": "4.0.4-1",
    "fixed": "4.1.0-1",
    "ticket": null,
    "issues": [
      "CVE-2015-7707",
      "CVE-2015-6973",
      "CVE-2015-6972"
    ],
    "advisories": [
      "ASA-201612-21"
    ]
  },
  {
    "name": "AVG-1486",
    "packages": [
      "bitcoin-daemon"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "22.0-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3195",
      "CVE-2021-31876"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2902",
    "packages": [
      "sslh"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.2.3-2",
    "fixed": "2.2.4-1",
    "ticket": null,
    "issues": [
      "CVE-2025-46807"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2900",
    "packages": [
      "erlang"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary file overwrite",
    "affected": "28.0-2",
    "fixed": "28.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2025-4748"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2896",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.24.3-1",
    "fixed": "1.24.4-1",
    "ticket": null,
    "issues": [
      "CVE-2025-4673",
      "CVE-2025-22874"
    ],
    "advisories": [
      "ASA-202506-4"
    ]
  },
  {
    "name": "AVG-2887",
    "packages": [
      "curl"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "certificate verification bypass",
    "affected": "8.13.0-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2025-5025",
      "CVE-2025-4947"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2876",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "5.1.8-1",
    "fixed": "5.1.9-1",
    "ticket": null,
    "issues": [
      "CVE-2025-32873"
    ],
    "advisories": [
      "ASA-202505-10"
    ]
  },
  {
    "name": "AVG-2874",
    "packages": [
      "dropbear"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary command execution",
    "affected": "2025.87-1",
    "fixed": "2025.88-1",
    "ticket": null,
    "issues": [
      "CVE-2025-47203"
    ],
    "advisories": [
      "ASA-202505-9"
    ]
  },
  {
    "name": "AVG-2861",
    "packages": [
      "lib32-xz"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "5.8.0-1",
    "fixed": "5.8.1-1",
    "ticket": null,
    "issues": [
      "CVE-2025-31115"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2860",
    "packages": [
      "xz"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "5.8.0-1",
    "fixed": "5.8.1-1",
    "ticket": null,
    "issues": [
      "CVE-2025-31115"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2856",
    "packages": [
      "krb5"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.21.2-1",
    "fixed": "1.21.3-1",
    "ticket": null,
    "issues": [
      "CVE-2024-37371",
      "CVE-2024-37370"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1390",
    "packages": [
      "openjpeg2"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2.4.0-1",
    "fixed": "2.5.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29338",
      "CVE-2019-6988",
      "CVE-2018-20846",
      "CVE-2018-16376"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2396",
    "packages": [
      "libde265"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.0.8-1",
    "fixed": "1.0.10-1",
    "ticket": null,
    "issues": [
      "CVE-2020-21606",
      "CVE-2020-21605",
      "CVE-2020-21604",
      "CVE-2020-21603",
      "CVE-2020-21602",
      "CVE-2020-21601",
      "CVE-2020-21600",
      "CVE-2020-21599",
      "CVE-2020-21598",
      "CVE-2020-21597",
      "CVE-2020-21596",
      "CVE-2020-21595",
      "CVE-2020-21594"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2849",
    "packages": [
      "lib32-openssl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "incorrect calculation",
    "affected": "1:3.1.3-1",
    "fixed": "1:3.1.4-1",
    "ticket": null,
    "issues": [
      "CVE-2023-5363"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2848",
    "packages": [
      "openssl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "incorrect calculation",
    "affected": "3.1.3-1",
    "fixed": "3.1.4-1",
    "ticket": null,
    "issues": [
      "CVE-2023-5363"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2178",
    "packages": [
      "aspell"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "0.60.8-2",
    "fixed": "0.60.8-3",
    "ticket": "71554",
    "issues": [
      "CVE-2019-25051"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2826",
    "packages": [
      "protobuf-c"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.4.0-4",
    "fixed": "1.4.1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-33070"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2702",
    "packages": [
      "openssl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "unknown",
    "affected": "1.1.1.n-1",
    "fixed": "1.1.1.o-1",
    "ticket": null,
    "issues": [
      "CVE-2022-1292"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2797",
    "packages": [
      "python-jwcrypto"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "authentication bypass",
    "affected": "1.3.1-1",
    "fixed": "1.4.0-1",
    "ticket": null,
    "issues": [
      "CVE-2022-3102"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2795",
    "packages": [
      "intel-ucode"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "20220510-1",
    "fixed": "20220809-1",
    "ticket": null,
    "issues": [
      "CVE-2022-21233"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2785",
    "packages": [
      "gitlab"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "unknown",
    "affected": "15.2.0-1",
    "fixed": "15.2.1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-2539",
      "CVE-2022-2534",
      "CVE-2022-2512",
      "CVE-2022-2500",
      "CVE-2022-2497",
      "CVE-2022-2456",
      "CVE-2022-2417",
      "CVE-2022-2326",
      "CVE-2022-2307",
      "CVE-2022-2303",
      "CVE-2022-2095"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2763",
    "packages": [
      "apache"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2.4.53-1",
    "fixed": "2.4.54-1",
    "ticket": null,
    "issues": [
      "CVE-2022-31813",
      "CVE-2022-30556",
      "CVE-2022-30522",
      "CVE-2022-29404",
      "CVE-2022-28615",
      "CVE-2022-28614",
      "CVE-2022-26377"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2716",
    "packages": [
      "dnsmasq"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.86-1",
    "fixed": "2.87-1",
    "ticket": null,
    "issues": [
      "CVE-2022-0934"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2706",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.83.0-1",
    "fixed": "7.83.1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-30115",
      "CVE-2022-27782",
      "CVE-2022-27781",
      "CVE-2022-27780",
      "CVE-2022-27779",
      "CVE-2022-27778"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2697",
    "packages": [
      "dpdk"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "21.11-1",
    "fixed": "22.03-1",
    "ticket": null,
    "issues": [
      "CVE-2022-0669",
      "CVE-2021-3839"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2685",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.82.0-3",
    "fixed": "7.83.0-1",
    "ticket": null,
    "issues": [
      "CVE-2022-27776",
      "CVE-2022-27775",
      "CVE-2022-27774",
      "CVE-2022-22576"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2830",
    "packages": [
      "tomcat9"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "9.0.70-1",
    "fixed": "9.0.71-1",
    "ticket": null,
    "issues": [
      "CVE-2023-24998"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2829",
    "packages": [
      "tomcat10"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "10.1.4-1",
    "fixed": "10.1.5-1",
    "ticket": null,
    "issues": [
      "CVE-2023-24998"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2825",
    "packages": [
      "python-protobuf",
      "protobuf"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "21.5-1",
    "fixed": "21.6-1",
    "ticket": null,
    "issues": [
      "CVE-2022-1941"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2679",
    "packages": [
      "git"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary command execution",
    "affected": "2.35.2-1",
    "fixed": "2.35.3-1",
    "ticket": null,
    "issues": [
      "CVE-2022-24765"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2677",
    "packages": [
      "mediawiki"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site scripting",
    "affected": "1.37.1-1",
    "fixed": "1.37.2-1",
    "ticket": null,
    "issues": [
      "CVE-2022-28202"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2333",
    "packages": [
      "rsync"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "arbitrary command execution",
    "affected": "3.2.3-4",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3755"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2796",
    "packages": [
      "intel-ucode"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "20220419-1",
    "fixed": "20220510-1",
    "ticket": null,
    "issues": [
      "CVE-2022-21151"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2794",
    "packages": [
      "uriparser"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.9.5-1",
    "fixed": "0.9.6-1",
    "ticket": null,
    "issues": [
      "CVE-2021-46142",
      "CVE-2021-46141"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2793",
    "packages": [
      "harfbuzz"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "4.3.0-1",
    "fixed": "4.4.0-1",
    "ticket": null,
    "issues": [
      "CVE-2022-33068"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2771",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "7.83.1-1",
    "fixed": "7.84.0-1",
    "ticket": null,
    "issues": [
      "CVE-2022-32205"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2748",
    "packages": [
      "radare2"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "unknown",
    "affected": "5.5-1",
    "fixed": "5.6-1",
    "ticket": null,
    "issues": [
      "CVE-2022-0419",
      "CVE-2021-44975",
      "CVE-2021-44974"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1741",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.85-1",
    "fixed": "5.15.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43976",
      "CVE-2021-4095",
      "CVE-2021-4028",
      "CVE-2021-4023",
      "CVE-2021-3847",
      "CVE-2021-3759",
      "CVE-2021-3752",
      "CVE-2021-3669",
      "CVE-2021-30178",
      "CVE-2021-29648"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2092",
    "packages": [
      "flac"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.3.3-3",
    "fixed": "1.3.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-0561"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2312",
    "packages": [
      "krb5"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.19.2-2",
    "fixed": "1.19.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37750"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2554",
    "packages": [
      "npm"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "8.1.4-1",
    "fixed": "8.4.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43616"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2628",
    "packages": [
      "mattermost"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.39.1-1",
    "fixed": "5.39.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37861"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2627",
    "packages": [
      "toxcore"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1:0.2.12-3",
    "fixed": "1:0.2.13-1",
    "ticket": null,
    "issues": [
      "CVE-2021-44847"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2680",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.16.13.arch1-1",
    "fixed": "5.16.14.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-0002",
      "CVE-2022-0001"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2681",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.16.13.zen1-1",
    "fixed": "5.16.14.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-0002",
      "CVE-2022-0001"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2682",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.12.19.hardened1-1",
    "fixed": "5.13.13.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-0002",
      "CVE-2022-0001"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1590",
    "packages": [
      "intel-ucode"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "20210608-1",
    "fixed": "20220207-1",
    "ticket": null,
    "issues": [
      "CVE-2020-24491"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1592",
    "packages": [
      "python-reportlab"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "url request injection",
    "affected": "3.5.54-1",
    "fixed": "3.5.55-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28463"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1393",
    "packages": [
      "cockpit"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "259-1",
    "fixed": "260-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3698",
      "CVE-2020-35850"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2036",
    "packages": [
      "python-pip"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "silent downgrade",
    "affected": "20.3.4-4",
    "fixed": "21.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3572"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2079",
    "packages": [
      "quassel-core"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "certificate verification bypass",
    "affected": "0.13.1-9",
    "fixed": "0.14.0-1",
    "ticket": "71419",
    "issues": [
      "CVE-2021-34825"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2176",
    "packages": [
      "libarchive"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "3.5.2-1",
    "fixed": "3.6.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-36976"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2185",
    "packages": [
      "libsndfile"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.0.31-1",
    "fixed": "1.1.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3246"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2618",
    "packages": [
      "dart"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2.14.4-1",
    "fixed": "2.16.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22568",
      "CVE-2021-22567"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2380",
    "packages": [
      "squashfs-tools"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "4.5-1",
    "fixed": "4.5.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41072"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2363",
    "packages": [
      "crypto++"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "8.5.0-2",
    "fixed": "8.6.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-40530"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1934",
    "packages": [
      "lout"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "3.40-2",
    "fixed": "3.41-1",
    "ticket": "70758",
    "issues": [
      "CVE-2019-19918",
      "CVE-2019-19917"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1643",
    "packages": [
      "cgal"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "4.14.3-2",
    "fixed": "5.4-1",
    "ticket": "70043",
    "issues": [
      "CVE-2020-35636",
      "CVE-2020-35635",
      "CVE-2020-35634",
      "CVE-2020-35633",
      "CVE-2020-35632",
      "CVE-2020-35631",
      "CVE-2020-35630",
      "CVE-2020-35629",
      "CVE-2020-35628",
      "CVE-2020-28636",
      "CVE-2020-28635",
      "CVE-2020-28634",
      "CVE-2020-28633",
      "CVE-2020-28632",
      "CVE-2020-28631",
      "CVE-2020-28630",
      "CVE-2020-28629",
      "CVE-2020-28628",
      "CVE-2020-28627",
      "CVE-2020-28626",
      "CVE-2020-28625",
      "CVE-2020-28624",
      "CVE-2020-28623",
      "CVE-2020-28622",
      "CVE-2020-28621",
      "CVE-2020-28620",
      "CVE-2020-28619",
      "CVE-2020-28618",
      "CVE-2020-28617",
      "CVE-2020-28616",
      "CVE-2020-28615",
      "CVE-2020-28614",
      "CVE-2020-28613",
      "CVE-2020-28612",
      "CVE-2020-28611",
      "CVE-2020-28610",
      "CVE-2020-28609",
      "CVE-2020-28608",
      "CVE-2020-28607",
      "CVE-2020-28606",
      "CVE-2020-28605",
      "CVE-2020-28604",
      "CVE-2020-28603",
      "CVE-2020-28602",
      "CVE-2020-28601"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1540",
    "packages": [
      "binutils"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2.36.1-3",
    "fixed": "2.38-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3648",
      "CVE-2021-3530",
      "CVE-2021-20197"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2479",
    "packages": [
      "jre8-openjdk-headless",
      "jdk8-openjdk"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "8.u292-1",
    "fixed": "8.332.u04-1",
    "ticket": null,
    "issues": [
      "CVE-2021-35603",
      "CVE-2021-35588",
      "CVE-2021-35586",
      "CVE-2021-35578",
      "CVE-2021-35567",
      "CVE-2021-35565",
      "CVE-2021-35564",
      "CVE-2021-35561",
      "CVE-2021-35559",
      "CVE-2021-35556",
      "CVE-2021-35550"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2553",
    "packages": [
      "bluez"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "5.62-1",
    "fixed": "5.63-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41229"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2528",
    "packages": [
      "crypto++"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "private key recovery",
    "affected": "8.5.0-2",
    "fixed": "8.6.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43398"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2587",
    "packages": [
      "keepalived"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "2.2.4-1",
    "fixed": "2.2.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-44225"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2027",
    "packages": [
      "lrzsz"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "0.12.20-7",
    "fixed": "0.12.20-8",
    "ticket": "71108",
    "issues": [
      "CVE-2018-10195"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2629",
    "packages": [
      "python-lxml"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site scripting",
    "affected": "4.6.4-3",
    "fixed": "4.6.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43818"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2578",
    "packages": [
      "pgbouncer"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "man-in-the-middle",
    "affected": "1.16.0-1",
    "fixed": "1.16.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3935"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2332",
    "packages": [
      "mosquitto"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "2.0.11-1",
    "fixed": "2.0.12-1",
    "ticket": null,
    "issues": [
      "CVE-2021-34434"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2590",
    "packages": [
      "rizin"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "0.3.1-1",
    "fixed": "0.3.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43814",
      "CVE-2021-4022"
    ],
    "advisories": [
      "ASA-202204-4"
    ]
  },
  {
    "name": "AVG-2402",
    "packages": [
      "ncurses"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "6.2-1",
    "fixed": "6.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39537"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2639",
    "packages": [
      "element-web"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.9.6-1",
    "fixed": "1.9.7-1",
    "ticket": null,
    "issues": [
      "CVE-2021-44538"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2638",
    "packages": [
      "libolm"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "3.2.7-2",
    "fixed": "3.2.8-1",
    "ticket": null,
    "issues": [
      "CVE-2021-44538"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2619",
    "packages": [
      "gitlab-runner"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "14.5.0-1",
    "fixed": "14.5.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39947",
      "CVE-2021-39939"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2613",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.10.83-1",
    "fixed": "5.10.84-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43975"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2612",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.15.6.hardened1-1",
    "fixed": "5.15.7.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43975"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2611",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.15.6.zen2-1",
    "fixed": "5.15.7.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43975"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2610",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.15.6.arch2-1",
    "fixed": "5.15.7.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43975"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2592",
    "packages": [
      "edk2-shell"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "202108-1",
    "fixed": "202111-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28216"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2567",
    "packages": [
      "kdepim-runtime"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "silent downgrade",
    "affected": "21.08.3-1",
    "fixed": "21.12.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-15954"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2447",
    "packages": [
      "scrapy"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "2.5.0-2",
    "fixed": "2.5.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41125"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2294",
    "packages": [
      "vault"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.7.3-1",
    "fixed": "1.9.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43998",
      "CVE-2021-41802",
      "CVE-2021-38554",
      "CVE-2021-38553"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2591",
    "packages": [
      "podman"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "3.4.2-1",
    "fixed": "3.4.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41190",
      "CVE-2021-4024"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2617",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2:1.17.4-1",
    "fixed": "2:1.17.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-44717",
      "CVE-2021-44716"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2641",
    "packages": [
      "openssl"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.1.1.l-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-4044"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2555",
    "packages": [
      "ruby"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "3.0.2-2",
    "fixed": "3.0.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41819",
      "CVE-2021-41817"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2562",
    "packages": [
      "mkinitcpio-busybox"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.33.1-1",
    "fixed": "1.34.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-42386",
      "CVE-2021-42385",
      "CVE-2021-42384",
      "CVE-2021-42383",
      "CVE-2021-42382",
      "CVE-2021-42381",
      "CVE-2021-42380",
      "CVE-2021-42379",
      "CVE-2021-42378",
      "CVE-2021-42377",
      "CVE-2021-42376",
      "CVE-2021-42375",
      "CVE-2021-42374",
      "CVE-2021-42373"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2595",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.10.82-1",
    "fixed": "5.10.83-1",
    "ticket": null,
    "issues": [
      "CVE-2021-4001"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2524",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.14.21.hardened1-1",
    "fixed": "5.15.5.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-4023",
      "CVE-2021-4002",
      "CVE-2021-4001",
      "CVE-2021-3759"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2589",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.10.81-1",
    "fixed": "5.10.82-1",
    "ticket": null,
    "issues": [
      "CVE-2021-4002"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2586",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.15.4.zen1-1",
    "fixed": "5.15.5.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-4002",
      "CVE-2021-4001"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2585",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.15.4.arch1-1",
    "fixed": "5.15.5.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-4002",
      "CVE-2021-4001"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2607",
    "packages": [
      "firefox"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "content spoofing",
    "affected": "94.0.2-2",
    "fixed": "95.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43544"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2492",
    "packages": [
      "gitlab"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "open redirect",
    "affected": "14.3.3-2",
    "fixed": "14.5.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22942"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2604",
    "packages": [
      "gitlab"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "14.5.0-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-39930",
      "CVE-2021-39918",
      "CVE-2021-39916"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2581",
    "packages": [
      "matrix-synapse"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "1.47.0-1",
    "fixed": "1.47.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41281"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2580",
    "packages": [
      "nomad"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "1.2.0-1",
    "fixed": "1.2.1-1",
    "ticket": "72813",
    "issues": [
      "CVE-2021-43415"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2280",
    "packages": [
      "libspf2"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.2.10-6",
    "fixed": "1.2.10-7",
    "ticket": "72802",
    "issues": [
      "CVE-2021-20314"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2588",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.14.18.hardened1-1",
    "fixed": "5.14.21.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3640"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2571",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.15.2.zen1-1",
    "fixed": "5.15.3.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3640"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2570",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.15.2.arch1-1",
    "fixed": "5.15.3.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3640"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2579",
    "packages": [
      "isync"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.4.3-1",
    "fixed": "1.4.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-44143",
      "CVE-2021-3657"
    ],
    "advisories": [
      "ASA-202112-5"
    ]
  },
  {
    "name": "AVG-2574",
    "packages": [
      "docker"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "1:20.10.10-1",
    "fixed": "1:20.10.11-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41190"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2573",
    "packages": [
      "containerd"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "1.5.7-1",
    "fixed": "1.5.8-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41190"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2568",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.10.79-1",
    "fixed": "5.10.80-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3640"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2565",
    "packages": [
      "drupal"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site scripting",
    "affected": "9.2.6-1",
    "fixed": "9.2.9-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41165",
      "CVE-2021-41164"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2594",
    "packages": [
      "consul"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "1.10.3-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-41805"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2575",
    "packages": [
      "imagemagick"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "7.1.0.13-1",
    "fixed": "7.1.0.14-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3962"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2506",
    "packages": [
      "rust"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "content spoofing",
    "affected": "1:1.56.0-3",
    "fixed": "1:1.56.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-42574"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2462",
    "packages": [
      "redmine"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "4.2.2-2",
    "fixed": "4.2.3-1",
    "ticket": "72728",
    "issues": [
      "CVE-2021-42326"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2277",
    "packages": [
      "dotnet-sdk",
      "dotnet-runtime"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.0.8.sdk205-1",
    "fixed": "6.0.0.sdk100-1",
    "ticket": null,
    "issues": [
      "CVE-2021-34532",
      "CVE-2021-34485",
      "CVE-2021-26423"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2541",
    "packages": [
      "puppet"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.12.0-1",
    "fixed": "7.12.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-27025",
      "CVE-2021-27023"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2539",
    "packages": [
      "smbclient"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "silent downgrade",
    "affected": "4.15.1-1",
    "fixed": "4.15.2-1",
    "ticket": null,
    "issues": [
      "CVE-2016-2124"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2538",
    "packages": [
      "samba"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "4.15.1-1",
    "fixed": "4.15.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3738",
      "CVE-2021-23192",
      "CVE-2020-25722",
      "CVE-2020-25721",
      "CVE-2020-25719",
      "CVE-2020-25718",
      "CVE-2020-25717"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2582",
    "packages": [
      "ruby"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "3.0.2-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-41816"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2561",
    "packages": [
      "busybox"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.33.1-1",
    "fixed": "1.34.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-42386",
      "CVE-2021-42385",
      "CVE-2021-42384",
      "CVE-2021-42383",
      "CVE-2021-42382",
      "CVE-2021-42381",
      "CVE-2021-42380",
      "CVE-2021-42379",
      "CVE-2021-42378",
      "CVE-2021-42377",
      "CVE-2021-42376",
      "CVE-2021-42375",
      "CVE-2021-42374",
      "CVE-2021-42373"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2478",
    "packages": [
      "jdk11-openjdk",
      "jre11-openjdk-headless"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "11.0.12.u7-1",
    "fixed": "11.0.13.u8-1",
    "ticket": null,
    "issues": [
      "CVE-2021-35603",
      "CVE-2021-35586",
      "CVE-2021-35578",
      "CVE-2021-35567",
      "CVE-2021-35565",
      "CVE-2021-35564",
      "CVE-2021-35561",
      "CVE-2021-35559",
      "CVE-2021-35556",
      "CVE-2021-35550"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2477",
    "packages": [
      "jre-openjdk-headless",
      "jdk-openjdk"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "17.u35-1",
    "fixed": "17.0.1.u12-1",
    "ticket": null,
    "issues": [
      "CVE-2021-35603",
      "CVE-2021-35586",
      "CVE-2021-35578",
      "CVE-2021-35567",
      "CVE-2021-35564",
      "CVE-2021-35561",
      "CVE-2021-35559",
      "CVE-2021-35556"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2456",
    "packages": [
      "gajim"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.3.2-1",
    "fixed": "1.3.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41055"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2531",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.15.zen1-1",
    "fixed": "5.15.1.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-42739"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2530",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.15.arch1-1",
    "fixed": "5.15.1.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-42739"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2540",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.14.16.hardened1-1",
    "fixed": "5.14.17.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-42739"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2532",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.10.77-3",
    "fixed": "5.10.78-1",
    "ticket": null,
    "issues": [
      "CVE-2021-42739"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2473",
    "packages": [
      "strongswan"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.9.3-1",
    "fixed": "5.9.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41991",
      "CVE-2021-41990"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1989",
    "packages": [
      "ffmpeg"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2:4.4-6",
    "fixed": "2:4.4.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38291",
      "CVE-2021-38171",
      "CVE-2021-38114",
      "CVE-2021-33815",
      "CVE-2020-22037",
      "CVE-2020-22033",
      "CVE-2020-22021",
      "CVE-2020-22019",
      "CVE-2020-22015",
      "CVE-2020-20453",
      "CVE-2020-20446",
      "CVE-2020-20445"
    ],
    "advisories": []
  },
  {
    "name": "AVG-611",
    "packages": [
      "unzip"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "6.0-14",
    "fixed": "6.0-15",
    "ticket": null,
    "issues": [
      "CVE-2019-13232",
      "CVE-2018-18384",
      "CVE-2018-1000035",
      "CVE-2016-9844",
      "CVE-2014-9913"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2559",
    "packages": [
      "grafana"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "8.2.3-1",
    "fixed": "8.2.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41244"
    ],
    "advisories": [
      "ASA-202111-6"
    ]
  },
  {
    "name": "AVG-2500",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.10.75-1",
    "fixed": "5.10.76-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43389",
      "CVE-2021-3896",
      "CVE-2021-3760"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2498",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.14.14.zen1-1",
    "fixed": "5.14.15.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43389",
      "CVE-2021-3896",
      "CVE-2021-3760"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2497",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.14.14.arch1-1",
    "fixed": "5.14.15.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43389",
      "CVE-2021-3896",
      "CVE-2021-3760"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2516",
    "packages": [
      "openvswitch"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "2.16.0-1",
    "fixed": "2.16.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3905"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2508",
    "packages": [
      "libjxl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "0.6-1",
    "fixed": "0.6.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22564",
      "CVE-2021-22563"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2496",
    "packages": [
      "python-dask"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2021.9.1-1",
    "fixed": "2021.10.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-42343"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2003",
    "packages": [
      "hyperkitty"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.3.4-2",
    "fixed": "1.3.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-35058",
      "CVE-2021-35057",
      "CVE-2021-33038"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2362",
    "packages": [
      "botan"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "2.18.1-1",
    "fixed": "2.18.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-40529"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2454",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2:1.17.1-1",
    "fixed": "2:1.17.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38297"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2517",
    "packages": [
      "grafana"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site scripting",
    "affected": "8.2.2-1",
    "fixed": "8.2.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41174"
    ],
    "advisories": [
      "ASA-202111-5"
    ]
  },
  {
    "name": "AVG-2486",
    "packages": [
      "php"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "8.0.11-2",
    "fixed": "8.0.12-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21703"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2507",
    "packages": [
      "rust"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "content spoofing",
    "affected": "1:1.56.0-3",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-42694"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2039",
    "packages": [
      "aom"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "3.1.3-2",
    "fixed": "3.2.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30475"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2502",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "9.16.21-1",
    "fixed": "9.16.22-1",
    "ticket": null,
    "issues": [
      "CVE-2021-25219"
    ],
    "advisories": [
      "ASA-202110-12"
    ]
  },
  {
    "name": "AVG-1923",
    "packages": [
      "neomutt"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "20210205-1",
    "fixed": "20211015-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32055"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2466",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.72-1",
    "fixed": "5.10.73-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41864",
      "CVE-2021-20321"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2465",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.14.11.hardened1-1",
    "fixed": "5.14.13.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41864",
      "CVE-2021-20321"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2464",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.14.11.zen1-1",
    "fixed": "5.14.12.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41864",
      "CVE-2021-20321"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2463",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.14.11.arch1-1",
    "fixed": "5.14.12.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41864",
      "CVE-2021-20321"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2314",
    "packages": [
      "sssd"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "2.5.2-2",
    "fixed": "2.6.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3621"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2484",
    "packages": [
      "wpewebkit"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2.32.4-1",
    "fixed": "2.34.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-42762",
      "CVE-2021-30851",
      "CVE-2021-30846"
    ],
    "advisories": [
      "ASA-202110-10"
    ]
  },
  {
    "name": "AVG-2458",
    "packages": [
      "couchdb"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "3.1.1-4",
    "fixed": "3.1.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38295"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2205",
    "packages": [
      "mupdf"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.18.0-2",
    "fixed": "1.19.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37220"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2488",
    "packages": [
      "freerdp"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2:2.4.0-2",
    "fixed": "2:2.4.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41160",
      "CVE-2021-41159"
    ],
    "advisories": [
      "ASA-202110-11"
    ]
  },
  {
    "name": "AVG-2436",
    "packages": [
      "onionshare"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary file upload",
    "affected": "2.2-5",
    "fixed": "2.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41868"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2417",
    "packages": [
      "libressl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "3.3.4-1",
    "fixed": "3.3.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41581"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2448",
    "packages": [
      "jenkins"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "certificate verification bypass",
    "affected": "2.314-1",
    "fixed": "2.315-1",
    "ticket": null,
    "issues": [
      "CVE-2014-3577"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2439",
    "packages": [
      "containerd"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "1.5.6-1",
    "fixed": "1.5.7-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41103"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2440",
    "packages": [
      "docker"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1:20.10.8-1",
    "fixed": "1:20.10.9-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41092",
      "CVE-2021-41091",
      "CVE-2021-41089"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2434",
    "packages": [
      "mediawiki"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.36.1-1",
    "fixed": "1.36.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41801",
      "CVE-2021-41800",
      "CVE-2021-41799",
      "CVE-2021-41798"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2290",
    "packages": [
      "postgresql"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "13.3-3",
    "fixed": "13.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3677"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2225",
    "packages": [
      "nextcloud"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "22.1.1-1",
    "fixed": "22.2.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32610"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1815",
    "packages": [
      "jhead"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "3.04-1",
    "fixed": "3.06.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3496"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2427",
    "packages": [
      "code"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.58.0-1",
    "fixed": "1.60.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-34528",
      "CVE-2021-34479",
      "CVE-2021-26437"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2460",
    "packages": [
      "nodejs"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "url request injection",
    "affected": "16.11.0-1",
    "fixed": "16.11.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22960",
      "CVE-2021-22959"
    ],
    "advisories": [
      "ASA-202110-4"
    ]
  },
  {
    "name": "AVG-2422",
    "packages": [
      "openssh"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "8.7p1-2",
    "fixed": "8.8p1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41617"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2457",
    "packages": [
      "vault"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "1.7.3-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-42135"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2415",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.10.67-1",
    "fixed": "5.10.68-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41073"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2414",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.14.6.hardened1-1",
    "fixed": "5.14.8.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41073"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2413",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.14.6.zen1-1",
    "fixed": "5.14.7.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41073"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2412",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.14.6.arch1-1",
    "fixed": "5.14.7.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41073"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2449",
    "packages": [
      "jenkins"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "2.314-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-21683",
      "CVE-2021-21682"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2446",
    "packages": [
      "composer"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "arbitrary command execution",
    "affected": "2.1.8-1",
    "fixed": "2.1.9-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41116"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2437",
    "packages": [
      "onionshare"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "2.2-5",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-41867"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2430",
    "packages": [
      "cockpit"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "253-1",
    "fixed": "254-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3660"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2395",
    "packages": [
      "mitmproxy"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "url request injection",
    "affected": "7.0.2-1",
    "fixed": "7.0.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39214"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2365",
    "packages": [
      "weechat"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "3.2-1",
    "fixed": "3.2.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-40516"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2155",
    "packages": [
      "code"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.56.2-3",
    "fixed": "1.58.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-34529"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2429",
    "packages": [
      "code"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "1.60.2-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-34477"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2390",
    "packages": [
      "vim",
      "gvim"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "8.2.3412-1",
    "fixed": "8.2.3441-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3796"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2381",
    "packages": [
      "atftp"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "0.7.4-1",
    "fixed": "0.7.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41054"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2375",
    "packages": [
      "postorius"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.3.4-2",
    "fixed": "1.3.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-40347"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2378",
    "packages": [
      "imagemagick"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "7.1.0.6-1",
    "fixed": "7.1.0.7-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39212"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2326",
    "packages": [
      "fetchmail"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "6.4.21-1",
    "fixed": "6.4.22-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39272"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2376",
    "packages": [
      "libexif"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "0.6.22-1",
    "fixed": "0.6.23-1",
    "ticket": null,
    "issues": [
      "CVE-2020-0452",
      "CVE-2020-0198"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2258",
    "packages": [
      "gd"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2.3.2-4",
    "fixed": "2.3.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-40812",
      "CVE-2021-40145",
      "CVE-2021-38115"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2420",
    "packages": [
      "php"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "8.0.10-1",
    "fixed": "8.0.11-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21706"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2373",
    "packages": [
      "wordpress"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.8-1",
    "fixed": "5.8.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39200"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2327",
    "packages": [
      "libtpms"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "0.8.4-1",
    "fixed": "0.8.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3746"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2382",
    "packages": [
      "edk2-shell"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "202105-1",
    "fixed": "202108-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38575"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2369",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.10.62-1",
    "fixed": "5.10.63-1",
    "ticket": null,
    "issues": [
      "CVE-2021-40490"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2368",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.13.14.hardened1-1",
    "fixed": "5.13.15.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-40490"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2361",
    "packages": [
      "ulfius"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "2.7.3-2",
    "fixed": "2.7.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-40540"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2347",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.13.13.zen1-1",
    "fixed": "5.14.2.zen1-2",
    "ticket": null,
    "issues": [
      "CVE-2021-40490",
      "CVE-2021-3753",
      "CVE-2021-3743",
      "CVE-2021-3739"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2346",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.13.13.arch1-1",
    "fixed": "5.14.2.arch1-2",
    "ticket": null,
    "issues": [
      "CVE-2021-40490",
      "CVE-2021-3753",
      "CVE-2021-3743",
      "CVE-2021-3739"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2329",
    "packages": [
      "ntfs-3g"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2017.3.23-5",
    "fixed": "2021.8.22-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39263",
      "CVE-2021-39262",
      "CVE-2021-39261",
      "CVE-2021-39260",
      "CVE-2021-39259",
      "CVE-2021-39258",
      "CVE-2021-39257",
      "CVE-2021-39256",
      "CVE-2021-39255",
      "CVE-2021-39254",
      "CVE-2021-39253",
      "CVE-2021-39252",
      "CVE-2021-39251",
      "CVE-2021-35269",
      "CVE-2021-35268",
      "CVE-2021-35267",
      "CVE-2021-35266",
      "CVE-2021-33289",
      "CVE-2021-33287",
      "CVE-2021-33286",
      "CVE-2021-33285"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2364",
    "packages": [
      "vim",
      "gvim"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "8.2.3340-1",
    "fixed": "8.2.3412-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3778",
      "CVE-2021-3770"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2343",
    "packages": [
      "haproxy"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "2.4.3-2",
    "fixed": "2.4.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-40346"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2411",
    "packages": [
      "chromium"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "93.0.4577.82-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-37969",
      "CVE-2021-37964"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2348",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.13.13.hardened1-1",
    "fixed": "5.13.14.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3753",
      "CVE-2021-3743",
      "CVE-2021-3739"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1856",
    "packages": [
      "gpac"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1:1.0.0-1",
    "fixed": "1:1.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32271",
      "CVE-2021-32270",
      "CVE-2021-32269",
      "CVE-2021-32268",
      "CVE-2020-23932",
      "CVE-2020-23931",
      "CVE-2020-23930",
      "CVE-2020-23928"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2403",
    "packages": [
      "faad2"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2.9.2-1",
    "fixed": "2.10.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32278",
      "CVE-2021-32277",
      "CVE-2021-32276",
      "CVE-2021-32274",
      "CVE-2021-32273",
      "CVE-2021-32272"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2358",
    "packages": [
      "nextcloud-app-deck"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1:1.5.0-1",
    "fixed": "1:1.5.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37631"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2349",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.61-2",
    "fixed": "5.10.62-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3753",
      "CVE-2021-3743",
      "CVE-2021-3739"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2334",
    "packages": [
      "matrix-synapse"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.40.0-1",
    "fixed": "1.41.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39164",
      "CVE-2021-39163"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2306",
    "packages": [
      "live-media"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2021.08.09-1",
    "fixed": "2021.08.24-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39283",
      "CVE-2021-39282"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2335",
    "packages": [
      "gitlab"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "14.2.1-1",
    "fixed": "14.2.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22258",
      "CVE-2021-22257",
      "CVE-2021-22238"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2281",
    "packages": [
      "qt6-base"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "6.1.2-1",
    "fixed": "6.1.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38593"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2282",
    "packages": [
      "qt5-base"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.15.2+kde+r215-2",
    "fixed": "5.15.2+kde+r222-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38593"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2324",
    "packages": [
      "libssh"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "0.9.5-1",
    "fixed": "0.9.6-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3634"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2357",
    "packages": [
      "emby-server"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "arbitrary filesystem access",
    "affected": "4.6.4.0-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-32833"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2353",
    "packages": [
      "thunderbird"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "arbitrary command execution",
    "affected": "78.13.0-1",
    "fixed": "78.14.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38492"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2351",
    "packages": [
      "firefox"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "91.0.2-1",
    "fixed": "92.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38492",
      "CVE-2021-29993"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2234",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.12.19.hardened1-1",
    "fixed": "5.13.13.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38204",
      "CVE-2021-38166",
      "CVE-2021-3732",
      "CVE-2021-37159",
      "CVE-2021-3679",
      "CVE-2021-3656",
      "CVE-2021-3653",
      "CVE-2021-35477",
      "CVE-2021-34556"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1976",
    "packages": [
      "fig2dev"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "3.2.8.a-1",
    "fixed": "3.2.8.b-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3561"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2279",
    "packages": [
      "usbredir"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "0.9.0-1",
    "fixed": "0.11.0-1",
    "ticket": "71803",
    "issues": [
      "CVE-2021-3700"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2303",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "9.16.19-1",
    "fixed": "9.16.20-1",
    "ticket": null,
    "issues": [
      "CVE-2021-25218"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1905",
    "packages": [
      "gitlab-gitaly"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary command execution",
    "affected": "14.2.1-1",
    "fixed": "14.2.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-31799"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2297",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.56-1",
    "fixed": "5.10.60-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38166",
      "CVE-2021-3732",
      "CVE-2021-3656",
      "CVE-2021-3653"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2296",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.13.10.zen1-1",
    "fixed": "5.13.12.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38166",
      "CVE-2021-3732",
      "CVE-2021-3656",
      "CVE-2021-3653"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2295",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.13.10.arch1-1",
    "fixed": "5.13.12.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38166",
      "CVE-2021-3732",
      "CVE-2021-3656",
      "CVE-2021-3653"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2304",
    "packages": [
      "haproxy"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "2.4.2-1",
    "fixed": "2.4.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39242",
      "CVE-2021-39241",
      "CVE-2021-39240"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2236",
    "packages": [
      "util-linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.37.1-3",
    "fixed": "2.37.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37600"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1357",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2:1.16.7-1",
    "fixed": "2:1.17-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29923",
      "CVE-2020-29511",
      "CVE-2020-29510",
      "CVE-2020-29509"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2330",
    "packages": [
      "mc"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "4.8.26-1",
    "fixed": "4.8.27-1",
    "ticket": null,
    "issues": [
      "CVE-2021-36370"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2328",
    "packages": [
      "squashfs-tools"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "4.4_git.1-1",
    "fixed": "4.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-40153"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1920",
    "packages": [
      "redmine"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "4.2.1-1",
    "fixed": "4.2.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37156",
      "CVE-2021-22904",
      "CVE-2021-22885"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2226",
    "packages": [
      "mariadb"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "10.6.3-1",
    "fixed": "10.6.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-2389",
      "CVE-2021-2372"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2066",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.42-1",
    "fixed": "5.10.43-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38208",
      "CVE-2021-3573",
      "CVE-2021-3564"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2065",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.12.9.hardened1-1",
    "fixed": "5.12.10.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38208",
      "CVE-2021-3573",
      "CVE-2021-3564"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2064",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.12.9.zen1-1",
    "fixed": "5.12.10.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38208",
      "CVE-2021-3573",
      "CVE-2021-3564"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2063",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.12.9.arch1-1",
    "fixed": "5.12.10.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38208",
      "CVE-2021-3573",
      "CVE-2021-3564"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2276",
    "packages": [
      "live-media"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2021.07.20-1",
    "fixed": "2021.08.09-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38382",
      "CVE-2021-38381",
      "CVE-2021-38380"
    ],
    "advisories": []
  },
  {
    "name": "AVG-614",
    "packages": [
      "exiv2"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "0.26-2",
    "fixed": "0.27.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-18771",
      "CVE-2017-17725",
      "CVE-2017-17724",
      "CVE-2017-17723",
      "CVE-2017-17722"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2257",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.10.55-1",
    "fixed": "5.10.56-1",
    "ticket": null,
    "issues": [
      "CVE-2021-35477",
      "CVE-2021-34556"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2256",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.13.7.zen1-1",
    "fixed": "5.13.8.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-35477",
      "CVE-2021-34556"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2255",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.13.7.arch1-1",
    "fixed": "5.13.8.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-35477",
      "CVE-2021-34556"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2235",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.53-1",
    "fixed": "5.10.54-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38204",
      "CVE-2021-37159",
      "CVE-2021-3679"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2233",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.13.5.zen1-1",
    "fixed": "5.13.6.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38204",
      "CVE-2021-37159",
      "CVE-2021-3679"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2232",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.13.5.arch1-1",
    "fixed": "5.13.6.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38204",
      "CVE-2021-37159",
      "CVE-2021-3679"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2268",
    "packages": [
      "c-ares"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "1.17.1-1",
    "fixed": "1.17.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3672"
    ],
    "advisories": [
      "ASA-202108-13"
    ]
  },
  {
    "name": "AVG-2263",
    "packages": [
      "rust"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "1.52.1-3",
    "fixed": "1.53.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29922"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2250",
    "packages": [
      "loki"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "2.2.1-3",
    "fixed": "2.3.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-36156"
    ],
    "advisories": [
      "ASA-202108-12"
    ]
  },
  {
    "name": "AVG-2260",
    "packages": [
      "ansible-core"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary command execution",
    "affected": "2.11.2-1",
    "fixed": "2.11.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3583"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2253",
    "packages": [
      "atomicparsley"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "20210617.200601.1ac7c08-1",
    "fixed": "20210715.151551.e7ad03a-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37232",
      "CVE-2021-37231"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2242",
    "packages": [
      "glances"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "xml external entity injection",
    "affected": "3.2.0-1",
    "fixed": "3.2.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-23418"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2237",
    "packages": [
      "prosody"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1:0.11.9-2",
    "fixed": "1:0.11.10-1",
    "ticket": "71641",
    "issues": [
      "CVE-2021-37601"
    ],
    "advisories": [
      "ASA-202108-11"
    ]
  },
  {
    "name": "AVG-2243",
    "packages": [
      "claws-mail"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "3.17.8-2",
    "fixed": "3.18.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37746"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2229",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.10.50-1",
    "fixed": "5.10.51-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3655"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2228",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.12.17.hardened1-1",
    "fixed": "5.12.18.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3655"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2227",
    "packages": [
      "freerdp"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "2:2.3.2-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-37595",
      "CVE-2021-37594"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2224",
    "packages": [
      "drupal"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "9.2.0-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-32610"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2223",
    "packages": [
      "gitlab-gitaly"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "14.0.4-1",
    "fixed": "14.1.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22904",
      "CVE-2021-22902",
      "CVE-2021-22885"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2206",
    "packages": [
      "389-ds-base"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2.0.3-2",
    "fixed": "2.0.7-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3652",
      "CVE-2021-3514"
    ],
    "advisories": [
      "ASA-202107-72"
    ]
  },
  {
    "name": "AVG-2222",
    "packages": [
      "powerdns"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "4.5.0-1",
    "fixed": "4.5.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-36754"
    ],
    "advisories": [
      "ASA-202107-73"
    ]
  },
  {
    "name": "AVG-2174",
    "packages": [
      "containerd"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "1.5.2-1",
    "fixed": "1.5.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32760"
    ],
    "advisories": [
      "ASA-202107-70"
    ]
  },
  {
    "name": "AVG-2180",
    "packages": [
      "geckodriver"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site request forgery",
    "affected": "0.26.0-1",
    "fixed": "0.29.1-1",
    "ticket": "71558",
    "issues": [
      "CVE-2020-15660"
    ],
    "advisories": [
      "ASA-202107-71"
    ]
  },
  {
    "name": "AVG-2171",
    "packages": [
      "consul"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.9.7-1",
    "fixed": "1.9.8-1",
    "ticket": null,
    "issues": [
      "CVE-2021-36213",
      "CVE-2021-32574"
    ],
    "advisories": [
      "ASA-202107-69"
    ]
  },
  {
    "name": "AVG-2219",
    "packages": [
      "wpewebkit"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.32.1-1",
    "fixed": "2.32.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30758"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2217",
    "packages": [
      "wpewebkit"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "2.30.6-1",
    "fixed": "2.32.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30682"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2215",
    "packages": [
      "wpewebkit"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.30.5-1",
    "fixed": "2.30.6-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21806"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2201",
    "packages": [
      "chromium"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "91.0.4472.164-1",
    "fixed": "92.0.4515.107-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30587",
      "CVE-2021-30586",
      "CVE-2021-30583",
      "CVE-2021-30580",
      "CVE-2021-30577"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2199",
    "packages": [
      "lib32-libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.77.0-1",
    "fixed": "7.78.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22925",
      "CVE-2021-22924"
    ],
    "advisories": [
      "ASA-202107-64"
    ]
  },
  {
    "name": "AVG-2198",
    "packages": [
      "libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.77.0-1",
    "fixed": "7.78.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22925",
      "CVE-2021-22924"
    ],
    "advisories": [
      "ASA-202107-63"
    ]
  },
  {
    "name": "AVG-2197",
    "packages": [
      "lib32-libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.77.0-1",
    "fixed": "7.78.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22925",
      "CVE-2021-22924"
    ],
    "advisories": [
      "ASA-202107-62"
    ]
  },
  {
    "name": "AVG-2196",
    "packages": [
      "libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.77.0-1",
    "fixed": "7.78.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22925",
      "CVE-2021-22924"
    ],
    "advisories": [
      "ASA-202107-61"
    ]
  },
  {
    "name": "AVG-2195",
    "packages": [
      "lib32-curl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.77.0-1",
    "fixed": "7.78.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22925",
      "CVE-2021-22924"
    ],
    "advisories": [
      "ASA-202107-60"
    ]
  },
  {
    "name": "AVG-2194",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.77.0-1",
    "fixed": "7.78.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22925",
      "CVE-2021-22924",
      "CVE-2021-22923",
      "CVE-2021-22922"
    ],
    "advisories": [
      "ASA-202107-59"
    ]
  },
  {
    "name": "AVG-2193",
    "packages": [
      "nvidia-utils"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "465.31-1",
    "fixed": "470.57.02-1",
    "ticket": null,
    "issues": [
      "CVE-2021-1095",
      "CVE-2021-1094",
      "CVE-2021-1093"
    ],
    "advisories": [
      "ASA-202107-58"
    ]
  },
  {
    "name": "AVG-1916",
    "packages": [
      "impacket"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "0.9.22-1",
    "fixed": "0.9.23-1",
    "ticket": "70714",
    "issues": [
      "CVE-2021-31800"
    ],
    "advisories": [
      "ASA-202107-56"
    ]
  },
  {
    "name": "AVG-1774",
    "packages": [
      "libpano13"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.9.19-5",
    "fixed": "2.9.20-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20307"
    ],
    "advisories": [
      "ASA-202107-55"
    ]
  },
  {
    "name": "AVG-2179",
    "packages": [
      "systemd"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "249-4",
    "fixed": "249.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-33910"
    ],
    "advisories": [
      "ASA-202107-57"
    ]
  },
  {
    "name": "AVG-2043",
    "packages": [
      "dino"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "0.2.0-3",
    "fixed": "0.2.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-33896"
    ],
    "advisories": [
      "ASA-202107-35"
    ]
  },
  {
    "name": "AVG-2177",
    "packages": [
      "openvswitch"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.14.2-1",
    "fixed": "2.15.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-36980"
    ],
    "advisories": [
      "ASA-202107-40"
    ]
  },
  {
    "name": "AVG-2175",
    "packages": [
      "racket"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "sandbox escape",
    "affected": "8.1-1",
    "fixed": "8.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32773"
    ],
    "advisories": [
      "ASA-202107-39"
    ]
  },
  {
    "name": "AVG-2172",
    "packages": [
      "firefox-ublock-origin"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.36.0-1",
    "fixed": "1.36.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-36773"
    ],
    "advisories": [
      "ASA-202107-38"
    ]
  },
  {
    "name": "AVG-2131",
    "packages": [
      "libuv"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.41.0-1",
    "fixed": "1.41.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22918"
    ],
    "advisories": [
      "ASA-202107-36"
    ]
  },
  {
    "name": "AVG-2165",
    "packages": [
      "bat"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "arbitrary command execution",
    "affected": "0.18.1-1",
    "fixed": "0.18.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-36753"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2121",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.12.13.hardened1-1",
    "fixed": "5.12.14.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-35039",
      "CVE-2021-22543"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2120",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.12.13.zen1-2",
    "fixed": "5.12.14.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-35039",
      "CVE-2021-22543"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2119",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.12.13.arch1-2",
    "fixed": "5.12.14.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-35039",
      "CVE-2021-22543"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2122",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.46-1",
    "fixed": "5.10.47-1",
    "ticket": null,
    "issues": [
      "CVE-2021-35039",
      "CVE-2021-22543"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2154",
    "packages": [
      "varnish"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "url request injection",
    "affected": "6.6.0-2",
    "fixed": "6.6.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-36740"
    ],
    "advisories": [
      "ASA-202107-28"
    ]
  },
  {
    "name": "AVG-2153",
    "packages": [
      "mbedtls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "2.25.0-1",
    "fixed": "2.26.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-24119"
    ],
    "advisories": [
      "ASA-202107-27"
    ]
  },
  {
    "name": "AVG-2150",
    "packages": [
      "python-pillow"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "8.2.0-2",
    "fixed": "8.3.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-34552"
    ],
    "advisories": [
      "ASA-202107-26"
    ]
  },
  {
    "name": "AVG-1963",
    "packages": [
      "code"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.56.2-3",
    "fixed": "1.58.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-31214",
      "CVE-2021-31211"
    ],
    "advisories": [
      "ASA-202107-34"
    ]
  },
  {
    "name": "AVG-2096",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.12.12.hardened1-1",
    "fixed": "5.12.13.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-34693",
      "CVE-2021-33624"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2095",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.12.12.zen1-1",
    "fixed": "5.12.13.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-34693",
      "CVE-2021-33624"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2094",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.12.12.arch1-1",
    "fixed": "5.12.13.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-34693",
      "CVE-2021-33624"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2097",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.10.45-1",
    "fixed": "5.10.46-1",
    "ticket": null,
    "issues": [
      "CVE-2021-34693",
      "CVE-2021-33624"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2137",
    "packages": [
      "gitlab"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "14.0.1-1",
    "fixed": "14.0.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22233"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2136",
    "packages": [
      "ruby-addressable"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.7.0-3",
    "fixed": "2.8.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32740"
    ],
    "advisories": [
      "ASA-202107-19"
    ]
  },
  {
    "name": "AVG-2090",
    "packages": [
      "gitlab"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "13.12.3-1",
    "fixed": "14.0.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22904",
      "CVE-2021-22902",
      "CVE-2021-22885"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2071",
    "packages": [
      "openexr"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "3.0.4-1",
    "fixed": "3.0.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3598"
    ],
    "advisories": [
      "ASA-202107-14"
    ]
  },
  {
    "name": "AVG-2132",
    "packages": [
      "php"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "8.0.7-1",
    "fixed": "8.0.8-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21705",
      "CVE-2021-21704"
    ],
    "advisories": [
      "ASA-202107-15"
    ]
  },
  {
    "name": "AVG-2130",
    "packages": [
      "nodejs"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "16.4.0-1",
    "fixed": "16.4.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22921"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2124",
    "packages": [
      "libvirt"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1:7.3.0-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3631"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2103",
    "packages": [
      "nginx-mainline"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "1.19.10-1",
    "fixed": "1.21.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3618"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2116",
    "packages": [
      "mruby"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.1.2-1",
    "fixed": "3.0.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-36401"
    ],
    "advisories": [
      "ASA-202107-10"
    ]
  },
  {
    "name": "AVG-2115",
    "packages": [
      "tesseract"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "4.1.1-7",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-36081"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1847",
    "packages": [
      "jre-openjdk-headless",
      "jdk-openjdk"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "15.0.2.u7-1",
    "fixed": "16.0.1.u9-1",
    "ticket": null,
    "issues": [
      "CVE-2021-2163"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2110",
    "packages": [
      "arpwatch"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "3.1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-25321"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2108",
    "packages": [
      "libtpms"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "0.8.3-1",
    "fixed": "0.8.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3623"
    ],
    "advisories": [
      "ASA-202107-9"
    ]
  },
  {
    "name": "AVG-2105",
    "packages": [
      "puppet"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "6.22.1-1",
    "fixed": "6.23.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-27021"
    ],
    "advisories": [
      "ASA-202107-8"
    ]
  },
  {
    "name": "AVG-2107",
    "packages": [
      "openexr"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.4.0-7",
    "fixed": "2.4.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3605"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2093",
    "packages": [
      "mediawiki"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "1.36.0-1",
    "fixed": "1.36.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-35197"
    ],
    "advisories": [
      "ASA-202107-7"
    ]
  },
  {
    "name": "AVG-1921",
    "packages": [
      "metasploit"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "6.0.37-1",
    "fixed": "6.0.48-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22904",
      "CVE-2021-22885"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2060",
    "packages": [
      "python-fastapi"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site request forgery",
    "affected": "0.65.1-1",
    "fixed": "0.65.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32677"
    ],
    "advisories": [
      "ASA-202107-6"
    ]
  },
  {
    "name": "AVG-2088",
    "packages": [
      "pigeonhole"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.5.14-1",
    "fixed": "0.5.15-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28200"
    ],
    "advisories": [
      "ASA-202106-57"
    ]
  },
  {
    "name": "AVG-2033",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.12.7.hardened1-1",
    "fixed": "5.12.9.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-33200",
      "CVE-2021-32606",
      "CVE-2020-26147",
      "CVE-2020-26145",
      "CVE-2020-26141",
      "CVE-2020-26139",
      "CVE-2020-24588",
      "CVE-2020-24587",
      "CVE-2020-24586"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2078",
    "packages": [
      "helm"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "3.6.0-1",
    "fixed": "3.6.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32690"
    ],
    "advisories": [
      "ASA-202106-52"
    ]
  },
  {
    "name": "AVG-2085",
    "packages": [
      "imagemagick"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "7.0.11.13-3",
    "fixed": "7.0.11.14-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3610"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2084",
    "packages": [
      "keycloak"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "certificate verification bypass",
    "affected": "13.0.1-1",
    "fixed": "14.0.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-35509"
    ],
    "advisories": [
      "ASA-202106-53"
    ]
  },
  {
    "name": "AVG-2073",
    "packages": [
      "libslirp"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "4.5.0-1",
    "fixed": "4.6.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3595",
      "CVE-2021-3594",
      "CVE-2021-3593",
      "CVE-2021-3592"
    ],
    "advisories": [
      "ASA-202106-49"
    ]
  },
  {
    "name": "AVG-1987",
    "packages": [
      "nginx-mainline"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.19.10-1",
    "fixed": "1.21.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-23017"
    ],
    "advisories": [
      "ASA-202106-48"
    ]
  },
  {
    "name": "AVG-2080",
    "packages": [
      "linux"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.12.11.arch1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-32078"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2076",
    "packages": [
      "matrix-appservice-irc"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "0.26.1-1",
    "fixed": "0.27.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32659"
    ],
    "advisories": [
      "ASA-202106-51"
    ]
  },
  {
    "name": "AVG-2034",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.41-1",
    "fixed": "5.10.42-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26147",
      "CVE-2020-26145",
      "CVE-2020-26141",
      "CVE-2020-26139",
      "CVE-2020-24588",
      "CVE-2020-24587",
      "CVE-2020-24586"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2032",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.12.8.zen1-1",
    "fixed": "5.12.9.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32606",
      "CVE-2020-26147",
      "CVE-2020-26145",
      "CVE-2020-26141",
      "CVE-2020-26139",
      "CVE-2020-24588",
      "CVE-2020-24587",
      "CVE-2020-24586"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2031",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.12.8.arch1-1",
    "fixed": "5.12.9.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32606",
      "CVE-2020-26147",
      "CVE-2020-26145",
      "CVE-2020-26141",
      "CVE-2020-26139",
      "CVE-2020-24588",
      "CVE-2020-24587",
      "CVE-2020-24586"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2075",
    "packages": [
      "tor"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.4.5.8-2",
    "fixed": "0.4.5.9-1",
    "ticket": null,
    "issues": [
      "CVE-2021-34550",
      "CVE-2021-34549",
      "CVE-2021-34548"
    ],
    "advisories": [
      "ASA-202106-50"
    ]
  },
  {
    "name": "AVG-2074",
    "packages": [
      "firefox"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "89.0-1",
    "fixed": "89.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29968"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2046",
    "packages": [
      "aspnet-runtime"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "5.0.6.sdk203-1",
    "fixed": "5.0.7.sdk204-1",
    "ticket": null,
    "issues": [
      "CVE-2021-31957"
    ],
    "advisories": [
      "ASA-202106-37"
    ]
  },
  {
    "name": "AVG-2010",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.10.40-1",
    "fixed": "5.10.41-1",
    "ticket": null,
    "issues": [
      "CVE-2021-33200"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2008",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.12.7.zen1-1",
    "fixed": "5.12.8.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-33200"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2007",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.12.7.arch1-1",
    "fixed": "5.12.8.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-33200"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2070",
    "packages": [
      "edk2-shell"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "private key recovery",
    "affected": "202105-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-28213"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2068",
    "packages": [
      "ripgrep"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "12.1.1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3013"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1988",
    "packages": [
      "nginx"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.20.0-1",
    "fixed": "1.20.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-23017"
    ],
    "advisories": [
      "ASA-202106-36"
    ]
  },
  {
    "name": "AVG-2062",
    "packages": [
      "thefuck"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary file overwrite",
    "affected": "3.30-3",
    "fixed": "3.31-1",
    "ticket": null,
    "issues": [
      "CVE-2021-34363"
    ],
    "advisories": [
      "ASA-202106-39"
    ]
  },
  {
    "name": "AVG-2061",
    "packages": [
      "bluez"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.55-3",
    "fixed": "5.56-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3588"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2056",
    "packages": [
      "ansible"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "4.0.0-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3533",
      "CVE-2021-3532"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2054",
    "packages": [
      "apache"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.4.46-3",
    "fixed": "2.4.47-1",
    "ticket": null,
    "issues": [
      "CVE-2020-13938"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2053",
    "packages": [
      "apache"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2.4.46-3",
    "fixed": "2.4.47-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30641",
      "CVE-2021-26691",
      "CVE-2021-26690",
      "CVE-2020-35452",
      "CVE-2020-13950",
      "CVE-2019-17567"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2052",
    "packages": [
      "nettle"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "3.7.2-1",
    "fixed": "3.7.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3580"
    ],
    "advisories": [
      "ASA-202106-28"
    ]
  },
  {
    "name": "AVG-2050",
    "packages": [
      "bluez"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "private key recovery",
    "affected": "5.56-2",
    "fixed": "5.57-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26558"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2049",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "private key recovery",
    "affected": "5.12.6.arch1-1",
    "fixed": "5.12.7.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26558"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2012",
    "packages": [
      "lib32-libgcrypt"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "private key recovery",
    "affected": "1.9.2-1",
    "fixed": "1.9.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-33560"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2011",
    "packages": [
      "libgcrypt"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "private key recovery",
    "affected": "1.9.2-1",
    "fixed": "1.9.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-33560"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2040",
    "packages": [
      "python-websockets"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "private key recovery",
    "affected": "9.0.1-3",
    "fixed": "9.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-33880"
    ],
    "advisories": [
      "ASA-202106-26"
    ]
  },
  {
    "name": "AVG-2042",
    "packages": [
      "isync"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.4.1-1",
    "fixed": "1.4.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3578"
    ],
    "advisories": [
      "ASA-202106-27"
    ]
  },
  {
    "name": "AVG-1807",
    "packages": [
      "lib32-libcaca"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "0.99.beta19-4",
    "fixed": "0.99.beta19-5",
    "ticket": null,
    "issues": [
      "CVE-2021-30499",
      "CVE-2021-30498"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1806",
    "packages": [
      "libcaca"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "0.99.beta19-4",
    "fixed": "0.99.beta19-5",
    "ticket": "70520",
    "issues": [
      "CVE-2021-30499",
      "CVE-2021-30498"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2029",
    "packages": [
      "vault"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "authentication bypass",
    "affected": "1.7.1-2",
    "fixed": "1.7.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32923"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1773",
    "packages": [
      "htmldoc"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.9.11-1",
    "fixed": "1.9.12-1",
    "ticket": null,
    "issues": [
      "CVE-2021-26948",
      "CVE-2021-26259",
      "CVE-2021-26252",
      "CVE-2021-23206",
      "CVE-2021-23191",
      "CVE-2021-23180",
      "CVE-2021-23165",
      "CVE-2021-23158",
      "CVE-2021-20308"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2006",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2:1.16.4-1",
    "fixed": "2:1.16.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-33198",
      "CVE-2021-33197",
      "CVE-2021-33196",
      "CVE-2021-33195"
    ],
    "advisories": [
      "ASA-202106-42"
    ]
  },
  {
    "name": "AVG-1925",
    "packages": [
      "aom"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "3.0.0-2",
    "fixed": "3.1.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30474",
      "CVE-2021-30473"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2038",
    "packages": [
      "python-urllib3"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.26.4-2",
    "fixed": "1.26.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-33503"
    ],
    "advisories": [
      "ASA-202106-25"
    ]
  },
  {
    "name": "AVG-2028",
    "packages": [
      "polkit"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "0.118-1",
    "fixed": "0.119-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3560"
    ],
    "advisories": [
      "ASA-202106-24"
    ]
  },
  {
    "name": "AVG-2030",
    "packages": [
      "linux"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "5.12.9.arch1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-26146",
      "CVE-2020-26144",
      "CVE-2020-26143",
      "CVE-2020-26142",
      "CVE-2020-26140"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2026",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "3.2.3-2",
    "fixed": "3.2.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-33571",
      "CVE-2021-33203"
    ],
    "advisories": [
      "ASA-202106-41"
    ]
  },
  {
    "name": "AVG-2025",
    "packages": [
      "nextcloud-client"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "certificate verification bypass",
    "affected": "3.1.2-1",
    "fixed": "3.1.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22895"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1625",
    "packages": [
      "zint"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.9.1-1",
    "fixed": "2.9.1-2",
    "ticket": "70051",
    "issues": [
      "CVE-2021-27799"
    ],
    "advisories": [
      "ASA-202106-13"
    ]
  },
  {
    "name": "AVG-2000",
    "packages": [
      "lib32-libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "7.76.1-1",
    "fixed": "7.77.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22898"
    ],
    "advisories": [
      "ASA-202106-9"
    ]
  },
  {
    "name": "AVG-1999",
    "packages": [
      "libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "7.76.1-1",
    "fixed": "7.77.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22898"
    ],
    "advisories": [
      "ASA-202106-8"
    ]
  },
  {
    "name": "AVG-1961",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.36-2",
    "fixed": "5.10.37-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3491",
      "CVE-2021-3490",
      "CVE-2021-3489",
      "CVE-2021-33034",
      "CVE-2021-32399",
      "CVE-2021-31440",
      "CVE-2021-23134",
      "CVE-2021-23133"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1959",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.12.3.zen2-1",
    "fixed": "5.12.4.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3491",
      "CVE-2021-3490",
      "CVE-2021-3489",
      "CVE-2021-33034",
      "CVE-2021-32399",
      "CVE-2021-31440",
      "CVE-2021-23134",
      "CVE-2021-23133"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1958",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.12.3.arch2-1",
    "fixed": "5.12.4.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3491",
      "CVE-2021-3490",
      "CVE-2021-3489",
      "CVE-2021-33034",
      "CVE-2021-32399",
      "CVE-2021-31440",
      "CVE-2021-23134",
      "CVE-2021-23133"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1960",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.11.20.hardened1-2",
    "fixed": "5.11.21.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3491",
      "CVE-2021-3490",
      "CVE-2021-3489",
      "CVE-2021-33034",
      "CVE-2021-32399",
      "CVE-2021-31440",
      "CVE-2021-23134",
      "CVE-2021-23133"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1891",
    "packages": [
      "ruby-bundler"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "2.2.17-1",
    "fixed": "2.2.18-1",
    "ticket": null,
    "issues": [
      "CVE-2020-36327"
    ],
    "advisories": [
      "ASA-202106-14"
    ]
  },
  {
    "name": "AVG-1954",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.11.19.hardened1-1",
    "fixed": "5.11.20.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3543",
      "CVE-2021-3506"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1953",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.12.2.zen2-1",
    "fixed": "5.12.3.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3543",
      "CVE-2021-3506"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1952",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.12.2.arch1-1",
    "fixed": "5.12.3.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3543",
      "CVE-2021-3506"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1942",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.35-1",
    "fixed": "5.10.36-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3543",
      "CVE-2021-3506"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2001",
    "packages": [
      "pam-u2f"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "authentication bypass",
    "affected": "1.1.0-1",
    "fixed": "1.1.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-31924"
    ],
    "advisories": [
      "ASA-202106-16"
    ]
  },
  {
    "name": "AVG-1966",
    "packages": [
      "rabbitmq"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "3.8.14-1",
    "fixed": "3.8.16-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22116"
    ],
    "advisories": [
      "ASA-202106-17"
    ]
  },
  {
    "name": "AVG-1895",
    "packages": [
      "md4c"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "0.4.7-1",
    "fixed": "0.4.8-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30027"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1985",
    "packages": [
      "gupnp"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.2.4-1",
    "fixed": "1.2.6-1",
    "ticket": null,
    "issues": [
      "CVE-2021-33516"
    ],
    "advisories": [
      "ASA-202105-26"
    ]
  },
  {
    "name": "AVG-1913",
    "packages": [
      "python"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "3.9.4-1",
    "fixed": "3.9.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29921"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1901",
    "packages": [
      "ruby-rdoc"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary command execution",
    "affected": "6.3.0-3",
    "fixed": "6.3.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-31799"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1984",
    "packages": [
      "glibc"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "open redirect",
    "affected": "2.28-6",
    "fixed": "2.29-1",
    "ticket": null,
    "issues": [
      "CVE-2016-10739"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1982",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.65.3-1",
    "fixed": "7.66.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5482",
      "CVE-2019-5481"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1339",
    "packages": [
      "openjpeg2"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2.3.1-2",
    "fixed": "2.4.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-8112",
      "CVE-2020-6851",
      "CVE-2020-27845",
      "CVE-2020-27843",
      "CVE-2020-27842",
      "CVE-2020-27841",
      "CVE-2020-27824",
      "CVE-2020-27814",
      "CVE-2020-15389",
      "CVE-2019-12973"
    ],
    "advisories": [
      "ASA-202012-21"
    ]
  },
  {
    "name": "AVG-1980",
    "packages": [
      "openjpeg2"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.3.1-2",
    "fixed": "2.4.0-1",
    "ticket": "68906",
    "issues": [
      "CVE-2020-27823"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1930",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.12.1.zen2-1",
    "fixed": "5.12.2.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-31829"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1929",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.12.1.arch1-1",
    "fixed": "5.12.2.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-31829"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1932",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.10.34-1",
    "fixed": "5.10.35-1",
    "ticket": null,
    "issues": [
      "CVE-2021-31829"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1931",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.11.18.hardened1-1",
    "fixed": "5.11.19.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-31829"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1928",
    "packages": [
      "python-eventlet"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.30.2-1",
    "fixed": "0.31.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21419"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1376",
    "packages": [
      "flac"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.3.3-2",
    "fixed": "1.3.3-3",
    "ticket": "70063",
    "issues": [
      "CVE-2020-0499"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1979",
    "packages": [
      "keystone"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "private key recovery",
    "affected": "0.9.2-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3563"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1939",
    "packages": [
      "openapi-generator"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.1.0-1",
    "fixed": "5.1.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21430"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1924",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "url request injection",
    "affected": "3.2.1-1",
    "fixed": "3.2.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32052"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1940",
    "packages": [
      "thunar"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary command execution",
    "affected": "4.16.6-1",
    "fixed": "4.16.7-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32563"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1801",
    "packages": [
      "rust"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1:1.51.0-1",
    "fixed": "1:1.52.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-31162",
      "CVE-2021-28879",
      "CVE-2021-28878",
      "CVE-2021-28876",
      "CVE-2020-36323"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1971",
    "packages": [
      "prometheus"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "open redirect",
    "affected": "2.26.0-2",
    "fixed": "2.27.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29622"
    ],
    "advisories": [
      "ASA-202105-25"
    ]
  },
  {
    "name": "AVG-1922",
    "packages": [
      "mutt"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "2.0.6-1",
    "fixed": "2.0.7-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32055"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1967",
    "packages": [
      "rabbitmq"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "3.8.14-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-22117"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1908",
    "packages": [
      "hedgedoc"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.7.2-3",
    "fixed": "1.8.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21306"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1860",
    "packages": [
      "vault"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "certificate verification bypass",
    "affected": "1.7.0-1",
    "fixed": "1.7.1-2",
    "ticket": null,
    "issues": [
      "CVE-2021-29653",
      "CVE-2021-27400"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1951",
    "packages": [
      "python-pydantic"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.8.1-2",
    "fixed": "1.8.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29510"
    ],
    "advisories": [
      "ASA-202105-24"
    ]
  },
  {
    "name": "AVG-1899",
    "packages": [
      "djvulibre"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "3.5.28-2",
    "fixed": "3.5.28-3",
    "ticket": "70787",
    "issues": [
      "CVE-2021-3500",
      "CVE-2021-32493",
      "CVE-2021-32492",
      "CVE-2021-32491",
      "CVE-2021-32490"
    ],
    "advisories": [
      "ASA-202105-18"
    ]
  },
  {
    "name": "AVG-1956",
    "packages": [
      "postgresql"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "13.2-2",
    "fixed": "13.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32029",
      "CVE-2021-32028",
      "CVE-2021-32027"
    ],
    "advisories": [
      "ASA-202106-15"
    ]
  },
  {
    "name": "AVG-1944",
    "packages": [
      "dotnet-sdk",
      "dotnet-runtime"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.0.5.sdk202-1",
    "fixed": "5.0.6.sdk203-1",
    "ticket": null,
    "issues": [
      "CVE-2021-31204"
    ],
    "advisories": [
      "ASA-202105-21",
      "ASA-202105-20"
    ]
  },
  {
    "name": "AVG-1893",
    "packages": [
      "samba"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "4.14.3-1",
    "fixed": "4.14.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20254"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1448",
    "packages": [
      "live-media"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2019.11.06-2",
    "fixed": "2021.04.06-1",
    "ticket": "69316",
    "issues": [
      "CVE-2021-28899",
      "CVE-2020-24027"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1943",
    "packages": [
      "matrix-synapse"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.29.0-1",
    "fixed": "1.33.2-1",
    "ticket": "70801",
    "issues": [
      "CVE-2021-29471"
    ],
    "advisories": [
      "ASA-202105-19",
      "ASA-202105-19"
    ]
  },
  {
    "name": "AVG-1885",
    "packages": [
      "composer"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.0.12-1",
    "fixed": "2.0.13-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29472"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1825",
    "packages": [
      "kube-apiserver"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "authentication bypass",
    "affected": "1.20.5-1",
    "fixed": "1.21.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-25735"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1397",
    "packages": [
      "ffmpeg"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2:4.3.2-6",
    "fixed": "2:4.4-1",
    "ticket": null,
    "issues": [
      "CVE-2020-35965"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1622",
    "packages": [
      "openscad"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2019.05-9",
    "fixed": "2021.01-1",
    "ticket": "70052",
    "issues": [
      "CVE-2020-28600",
      "CVE-2020-28599"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1876",
    "packages": [
      "hedgedoc"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.7.2-2",
    "fixed": "1.7.2-3",
    "ticket": null,
    "issues": [
      "CVE-2021-29474"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1863",
    "packages": [
      "maven"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "3.6.3-1",
    "fixed": "3.8.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-26291",
      "CVE-2020-13956"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1861",
    "packages": [
      "openvpn"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "authentication bypass",
    "affected": "2.5.1-1",
    "fixed": "2.5.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-15078"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1852",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.11.15.hardened1-1",
    "fixed": "5.11.16.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3501",
      "CVE-2021-29155"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1375",
    "packages": [
      "opendmarc"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.4.0-2",
    "fixed": "1.4.1.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-12272",
      "CVE-2019-20790"
    ],
    "advisories": [
      "ASA-202105-13"
    ]
  },
  {
    "name": "AVG-1854",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.31-1",
    "fixed": "5.10.32-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3501",
      "CVE-2021-29155"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1853",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.11.15.zen1-2",
    "fixed": "5.11.16.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3501",
      "CVE-2021-29155"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1851",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.11.15.arch1-2",
    "fixed": "5.11.16.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3501",
      "CVE-2021-29155"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1894",
    "packages": [
      "python-babel"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.9.0-1",
    "fixed": "2.9.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20095"
    ],
    "advisories": [
      "ASA-202105-15"
    ]
  },
  {
    "name": "AVG-1869",
    "packages": [
      "perl-image-exiftool"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "12.16-1",
    "fixed": "12.25-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22204"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1849",
    "packages": [
      "jre8-openjdk-headless",
      "jdk8-openjdk"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "8.u282-1",
    "fixed": "8.u292-1",
    "ticket": null,
    "issues": [
      "CVE-2021-2163"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1848",
    "packages": [
      "jdk11-openjdk",
      "jre11-openjdk-headless"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "11.0.10.u9-1",
    "fixed": "11.0.11.u9-1",
    "ticket": null,
    "issues": [
      "CVE-2021-2163"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1882",
    "packages": [
      "mariadb"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "10.5.9-1",
    "fixed": "10.5.10-1",
    "ticket": null,
    "issues": [
      "CVE-2021-2166",
      "CVE-2021-2154"
    ],
    "advisories": [
      "ASA-202105-14"
    ]
  },
  {
    "name": "AVG-1805",
    "packages": [
      "java-commons-io"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "2.6-2",
    "fixed": "2.8.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29425"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1919",
    "packages": [
      "gitlab"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "open redirect",
    "affected": "13.10.4-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-22903"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1829",
    "packages": [
      "consul"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site scripting",
    "affected": "1.9.4-1",
    "fixed": "1.9.5-1",
    "ticket": null,
    "issues": [
      "CVE-2020-25864"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1914",
    "packages": [
      "thunderbird"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "78.10.0-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-29951"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1790",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "78.9.0-1",
    "fixed": "78.9.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29949",
      "CVE-2021-23993",
      "CVE-2021-23992",
      "CVE-2021-23991"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1838",
    "packages": [
      "nvidia-utils"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "460.67-1",
    "fixed": "465.24.02-1",
    "ticket": null,
    "issues": [
      "CVE-2021-1077",
      "CVE-2021-1076"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1831",
    "packages": [
      "wordpress"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.7-1",
    "fixed": "5.7.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29450",
      "CVE-2021-29447"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1859",
    "packages": [
      "dart"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site scripting",
    "affected": "2.12.2-1",
    "fixed": "2.12.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22540"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1839",
    "packages": [
      "cifs-utils"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "6.12-1",
    "fixed": "6.13-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20208"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1812",
    "packages": [
      "xorg-xwayland"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "21.1.0-1",
    "fixed": "21.1.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3472"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1811",
    "packages": [
      "xorg-server"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "1.20.10-3",
    "fixed": "1.20.11-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3472"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1808",
    "packages": [
      "solr"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "8.8.1-1",
    "fixed": "8.8.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29943",
      "CVE-2021-29262",
      "CVE-2021-27905"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1675",
    "packages": [
      "python"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "3.9.2-1",
    "fixed": "3.9.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3426"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1878",
    "packages": [
      "linux"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "certificate verification bypass",
    "affected": "5.12.arch1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-26541"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1797",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.11.11.hardened1-1",
    "fixed": "5.11.13.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3483",
      "CVE-2021-29657",
      "CVE-2021-29154"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1799",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.10.28-1",
    "fixed": "5.10.29-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29154"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1798",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.11.12.zen1-1",
    "fixed": "5.11.13.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29154"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1796",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.11.12.arch1-1",
    "fixed": "5.11.13.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29154"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1793",
    "packages": [
      "mosquitto"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.0.8-1",
    "fixed": "2.0.10-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28166"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1779",
    "packages": [
      "file-roller"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "3.38.0-2",
    "fixed": "3.38.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-36314"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1867",
    "packages": [
      "jdk8-openjdk"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "incorrect calculation",
    "affected": "8.u282-1",
    "fixed": "8.u292-1",
    "ticket": null,
    "issues": [
      "CVE-2021-2161"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1866",
    "packages": [
      "jdk11-openjdk"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "incorrect calculation",
    "affected": "11.0.10.u9-1",
    "fixed": "11.0.11.u9-1",
    "ticket": null,
    "issues": [
      "CVE-2021-2161"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1865",
    "packages": [
      "jdk-openjdk"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "incorrect calculation",
    "affected": "15.0.2.u7-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-2161"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1862",
    "packages": [
      "openexr"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.5.5-1",
    "fixed": null,
    "ticket": "70555",
    "issues": [
      "CVE-2021-23169"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1775",
    "packages": [
      "mediawiki"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.35.1-2",
    "fixed": "1.35.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30458",
      "CVE-2021-30159",
      "CVE-2021-30158",
      "CVE-2021-30157",
      "CVE-2021-30155",
      "CVE-2021-30154",
      "CVE-2021-30153",
      "CVE-2021-30152",
      "CVE-2021-27291",
      "CVE-2021-20270"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1766",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.11.11.zen1-1",
    "fixed": "5.11.12.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3483",
      "CVE-2021-29657"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1764",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.11.11.arch1-1",
    "fixed": "5.11.12.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3483",
      "CVE-2021-29657"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1767",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.27-1",
    "fixed": "5.10.28-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3483",
      "CVE-2021-29657"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1703",
    "packages": [
      "dnsmasq"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "content spoofing",
    "affected": "2.84-1",
    "fixed": "2.85-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3448"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1857",
    "packages": [
      "xscreensaver"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.44-3",
    "fixed": null,
    "ticket": "70531",
    "issues": [
      "CVE-2021-31523"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1781",
    "packages": [
      "jenkins"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "2.286-1",
    "fixed": "2.287-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21640",
      "CVE-2021-21639"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1845",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "private key recovery",
    "affected": "78.8.0-1",
    "fixed": "78.8.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29950"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1778",
    "packages": [
      "syncthing",
      "syncthing-relaysrv"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.14.0-1",
    "fixed": "1.15.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21404"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1682",
    "packages": [
      "libupnp"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.14.4-1",
    "fixed": "1.14.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28302"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1837",
    "packages": [
      "thunderbird"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "78.9.1-3",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-29945"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1835",
    "packages": [
      "firefox"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "87.0-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-29945",
      "CVE-2021-29944"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1821",
    "packages": [
      "mpv"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1:0.33.0-4",
    "fixed": "1:0.33.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30145"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1771",
    "packages": [
      "zabbix-frontend-php"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "authentication bypass",
    "affected": "5.2.5-1",
    "fixed": "5.2.6-1",
    "ticket": null,
    "issues": [
      "CVE-2021-27927"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1832",
    "packages": [
      "libtpms"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "private key recovery",
    "affected": "0.7.5-1",
    "fixed": "0.8.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3505"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1762",
    "packages": [
      "hostapd"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "signature forgery",
    "affected": "2.9-4",
    "fixed": "2.9-5",
    "ticket": "70260",
    "issues": [
      "CVE-2021-30004"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1830",
    "packages": [
      "consul"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "1.9.4-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-28156"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1758",
    "packages": [
      "lib32-libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "7.75.0-1",
    "fixed": "7.76.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22876"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1757",
    "packages": [
      "libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "7.75.0-1",
    "fixed": "7.76.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22876"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1734",
    "packages": [
      "ldb"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1:2.2.0-3",
    "fixed": "1:2.3.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20277",
      "CVE-2020-27840"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1769",
    "packages": [
      "qt5-svg"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.15.2-1",
    "fixed": "5.15.2-2",
    "ticket": "70262",
    "issues": [
      "CVE-2021-3481"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1768",
    "packages": [
      "qt6-svg"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "6.0.2-1",
    "fixed": "6.0.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3481"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1761",
    "packages": [
      "python-pikepdf"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "xml external entity injection",
    "affected": "2.9.2-1",
    "fixed": "2.10.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29421"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1750",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.26-1",
    "fixed": "5.10.27-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29650",
      "CVE-2021-29649",
      "CVE-2021-29647",
      "CVE-2021-29646",
      "CVE-2021-29264",
      "CVE-2021-28688"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1749",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.11.10.zen1-1",
    "fixed": "5.11.11.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29650",
      "CVE-2021-29649",
      "CVE-2021-29648",
      "CVE-2021-29647",
      "CVE-2021-29646",
      "CVE-2021-29264",
      "CVE-2021-28688"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1748",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.11.10.hardened1-1",
    "fixed": "5.11.11.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29650",
      "CVE-2021-29649",
      "CVE-2021-29648",
      "CVE-2021-29647",
      "CVE-2021-29646",
      "CVE-2021-29264",
      "CVE-2021-28688"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1747",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.11.10.arch1-1",
    "fixed": "5.11.11.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29650",
      "CVE-2021-29649",
      "CVE-2021-29648",
      "CVE-2021-29647",
      "CVE-2021-29646",
      "CVE-2021-29264",
      "CVE-2021-28688"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1814",
    "packages": [
      "lib32-fluidsynth"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.1.7-1",
    "fixed": "2.1.8-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28421"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1813",
    "packages": [
      "fluidsynth"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.1.7-1",
    "fixed": "2.1.8-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28421"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1810",
    "packages": [
      "nextcloud-client"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "3.1.2-1",
    "fixed": "3.1.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22879"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1804",
    "packages": [
      "rust"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1:1.48.0-1",
    "fixed": "1:1.49.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-36318",
      "CVE-2020-36317"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1803",
    "packages": [
      "rust"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1:1.49.0-1",
    "fixed": "1:1.50.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28875"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1802",
    "packages": [
      "rust"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "incorrect calculation",
    "affected": "1:1.50.0-2",
    "fixed": "1:1.51.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28877"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1720",
    "packages": [
      "python-lxml"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "4.6.2-2",
    "fixed": "4.6.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28957"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1690",
    "packages": [
      "libssh2"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.9.0-2",
    "fixed": "1.9.0-3",
    "ticket": "70009",
    "issues": [
      "CVE-2019-17498"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1635",
    "packages": [
      "python-pillow"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "8.1.0-1",
    "fixed": "8.1.2-1",
    "ticket": "70044",
    "issues": [
      "CVE-2021-27923",
      "CVE-2021-27922",
      "CVE-2021-27921",
      "CVE-2021-25293",
      "CVE-2021-25292",
      "CVE-2021-25291",
      "CVE-2021-25290",
      "CVE-2021-25289"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1385",
    "packages": [
      "binutils"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2.35.1-1",
    "fixed": "2.36-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3487",
      "CVE-2021-20294",
      "CVE-2020-35448"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1791",
    "packages": [
      "mediawiki"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.35.1-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-30156"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1732",
    "packages": [
      "samba"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "4.14.0-2",
    "fixed": "4.14.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20277",
      "CVE-2020-27840"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1719",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.25-1",
    "fixed": "5.10.26-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29266",
      "CVE-2021-28972",
      "CVE-2021-28971",
      "CVE-2021-28964",
      "CVE-2021-28952",
      "CVE-2021-28951"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1718",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.11.8.zen1-1",
    "fixed": "5.11.9.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29266",
      "CVE-2021-28972",
      "CVE-2021-28971",
      "CVE-2021-28964",
      "CVE-2021-28952",
      "CVE-2021-28951"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1717",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.11.8.hardened1-1",
    "fixed": "5.11.9.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29266",
      "CVE-2021-28972",
      "CVE-2021-28971",
      "CVE-2021-28964",
      "CVE-2021-28952",
      "CVE-2021-28951"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1716",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.11.8.arch1-1",
    "fixed": "5.11.9.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29266",
      "CVE-2021-28972",
      "CVE-2021-28971",
      "CVE-2021-28964",
      "CVE-2021-28952",
      "CVE-2021-28951"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1786",
    "packages": [
      "ffmpeg"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2:4.3.2-6",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-30123"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1780",
    "packages": [
      "file-roller"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "3.36.1-1",
    "fixed": "3.36.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-11736"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1714",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.24-1",
    "fixed": "5.10.25-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28950",
      "CVE-2020-27171",
      "CVE-2020-27170"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1713",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.11.7.zen1-1",
    "fixed": "5.11.8.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28950",
      "CVE-2020-27171",
      "CVE-2020-27170"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1711",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.11.7.arch1-1",
    "fixed": "5.11.8.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28950",
      "CVE-2020-27171",
      "CVE-2020-27170"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1712",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.11.7.hardened1-1",
    "fixed": "5.11.8.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28950",
      "CVE-2020-27171",
      "CVE-2020-27170"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1737",
    "packages": [
      "sqlcipher"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "4.4.2-1",
    "fixed": "4.4.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3119"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1706",
    "packages": [
      "libmediainfo"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "20.09-1",
    "fixed": "20.09-2",
    "ticket": "70074",
    "issues": [
      "CVE-2020-26797"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1709",
    "packages": [
      "ruby-kramdown"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "2.3.0-1",
    "fixed": "2.3.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28834"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1705",
    "packages": [
      "zathura-pdf-mupdf"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "0.3.6-4",
    "fixed": "0.3.6-5",
    "ticket": "70054",
    "issues": [
      "CVE-2021-3407"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1618",
    "packages": [
      "java-xmlgraphics-commons"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "url request injection",
    "affected": "2.4-2",
    "fixed": "2.6-1",
    "ticket": null,
    "issues": [
      "CVE-2020-11988"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1616",
    "packages": [
      "lib32-libcaca"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "0.99.beta19-2",
    "fixed": "0.99.beta19-4",
    "ticket": "70053",
    "issues": [
      "CVE-2021-3410"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1603",
    "packages": [
      "libcaca"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "0.99.beta19-3",
    "fixed": "0.99.beta19-4",
    "ticket": "70053",
    "issues": [
      "CVE-2021-3410"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1602",
    "packages": [
      "mupdf"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.18.0-1",
    "fixed": "1.18.0-2",
    "ticket": "70054",
    "issues": [
      "CVE-2021-3407"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1552",
    "packages": [
      "libytnef"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.9.3+7+g24fe30e-2",
    "fixed": "1:1.9.3-1",
    "ticket": "70056",
    "issues": [
      "CVE-2021-3404",
      "CVE-2021-3403"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1702",
    "packages": [
      "ansible"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "3.1.0-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3447"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1459",
    "packages": [
      "python-yaml"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.3.1-4",
    "fixed": "5.4.1.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-14343"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1391",
    "packages": [
      "cairo"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.17.4-4",
    "fixed": "1.17.4-5",
    "ticket": "70017",
    "issues": [
      "CVE-2020-35492"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1392",
    "packages": [
      "lib32-cairo"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.17.4-4",
    "fixed": "1.17.4-5",
    "ticket": "70017",
    "issues": [
      "CVE-2020-35492"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1367",
    "packages": [
      "osquery"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary filesystem access",
    "affected": "4.5.1-8",
    "fixed": "4.6.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26273"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1303",
    "packages": [
      "spice-vdagent"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "0.20.0+6+g8adf50d-1",
    "fixed": "0.21.0-1",
    "ticket": "68531",
    "issues": [
      "CVE-2020-25653",
      "CVE-2020-25652",
      "CVE-2020-25651",
      "CVE-2020-25650"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1681",
    "packages": [
      "diesel-cli"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.4.5-1",
    "fixed": "1.4.6-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28305"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1617",
    "packages": [
      "java-batik"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "url request injection",
    "affected": "1.13-1",
    "fixed": "1.14-1",
    "ticket": null,
    "issues": [
      "CVE-2020-11987"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1537",
    "packages": [
      "gnome-autoar"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "0.2.4-2",
    "fixed": "0.3.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28650",
      "CVE-2020-36241"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1620",
    "packages": [
      "opendmarc"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "signature forgery",
    "affected": "1.3.3-2",
    "fixed": "1.4.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-16378"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1727",
    "packages": [
      "linux-lts"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.10.25-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-20292"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1726",
    "packages": [
      "linux-zen"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.11.8.zen1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-20292"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1725",
    "packages": [
      "linux-hardened"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.11.8.hardened1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-20292"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1724",
    "packages": [
      "linux"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.11.8.arch1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-20292"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1645",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.19.hardened1-1",
    "fixed": "5.10.21.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28038",
      "CVE-2021-27365",
      "CVE-2021-27364",
      "CVE-2021-27363",
      "CVE-2020-25639"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1655",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.20-1",
    "fixed": "5.10.21-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28038",
      "CVE-2021-27365",
      "CVE-2021-27364",
      "CVE-2021-27363"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1653",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.11.3.zen1-1",
    "fixed": "5.11.4.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28038",
      "CVE-2021-27365",
      "CVE-2021-27364",
      "CVE-2021-27363"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1651",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.11.3.arch1-1",
    "fixed": "5.11.4.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28038",
      "CVE-2021-27365",
      "CVE-2021-27364",
      "CVE-2021-27363"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1627",
    "packages": [
      "zstd"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "1.4.8-1",
    "fixed": "1.4.9-1",
    "ticket": null,
    "issues": [
      "CVE-2021-24032"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1650",
    "packages": [
      "containerd"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.4.3-1",
    "fixed": "1.4.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21334"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1648",
    "packages": [
      "gitlab"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "13.9.1-1",
    "fixed": "13.9.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22186",
      "CVE-2021-22185"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1553",
    "packages": [
      "screen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "4.8.0-2",
    "fixed": "4.8.0-3",
    "ticket": "69876",
    "issues": [
      "CVE-2021-26937"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1544",
    "packages": [
      "godot"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "3.2.3-1",
    "fixed": "3.2.3-2",
    "ticket": "70057",
    "issues": [
      "CVE-2021-26826",
      "CVE-2021-26825"
    ],
    "advisories": [
      "ASA-202103-26"
    ]
  },
  {
    "name": "AVG-1696",
    "packages": [
      "linux-lts"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "5.10.23-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3428"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1695",
    "packages": [
      "linux-zen"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "5.11.6.zen1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3428"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1694",
    "packages": [
      "linux-hardened"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "5.11.6.hardened1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3428"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1693",
    "packages": [
      "linux"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "5.11.6.arch1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3428"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1656",
    "packages": [
      "privoxy"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "3.0.31-1",
    "fixed": "3.0.32-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20276",
      "CVE-2021-20275",
      "CVE-2021-20274",
      "CVE-2021-20273",
      "CVE-2021-20272"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1697",
    "packages": [
      "edk2-shell"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "202008-1",
    "fixed": "202011-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28211",
      "CVE-2021-28210"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1613",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.17.hardened1-1",
    "fixed": "5.10.18.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-26932",
      "CVE-2021-26931",
      "CVE-2021-26930"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1629",
    "packages": [
      "grub"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2:2.04-10",
    "fixed": "2:2.06-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20233",
      "CVE-2021-20225",
      "CVE-2020-27779",
      "CVE-2020-27749",
      "CVE-2020-25647",
      "CVE-2020-25632",
      "CVE-2020-14372"
    ],
    "advisories": [
      "ASA-202106-43"
    ]
  },
  {
    "name": "AVG-1678",
    "packages": [
      "flatpak"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "sandbox escape",
    "affected": "1.10.1-1",
    "fixed": "1.10.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21381"
    ],
    "advisories": [
      "ASA-202103-4"
    ]
  },
  {
    "name": "AVG-1615",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.17-1",
    "fixed": "5.10.18-1",
    "ticket": null,
    "issues": [
      "CVE-2021-26932",
      "CVE-2021-26931",
      "CVE-2021-26930"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1563",
    "packages": [
      "subversion"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.14.0-4",
    "fixed": "1.14.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-17525"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1548",
    "packages": [
      "marked"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.2.9-1",
    "fixed": "2.0.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21306"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1669",
    "packages": [
      "wireshark-qt"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "3.4.3-2",
    "fixed": "3.4.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22191"
    ],
    "advisories": [
      "ASA-202103-2"
    ]
  },
  {
    "name": "AVG-1604",
    "packages": [
      "nodejs"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "15.9.0-1",
    "fixed": "15.10.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22884",
      "CVE-2021-22883"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1614",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.11.zen2-2",
    "fixed": "5.11.1.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-26932",
      "CVE-2021-26931",
      "CVE-2021-26930"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1580",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.11.arch2-1",
    "fixed": "5.11.1.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-26932",
      "CVE-2021-26931",
      "CVE-2021-26930"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1666",
    "packages": [
      "linux"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.11.5.arch1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-20268"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1657",
    "packages": [
      "openssh"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "8.4p1-2",
    "fixed": "8.5p1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28041"
    ],
    "advisories": [
      "ASA-202103-6"
    ]
  },
  {
    "name": "AVG-1649",
    "packages": [
      "ffmpeg"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2:4.3.1-4",
    "fixed": "2:4.3.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-35964"
    ],
    "advisories": [
      "ASA-202103-7"
    ]
  },
  {
    "name": "AVG-1630",
    "packages": [
      "grub"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "2:2.04-10",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3418"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1572",
    "packages": [
      "wpewebkit"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.30.4-2",
    "fixed": "2.30.5-1",
    "ticket": null,
    "issues": [
      "CVE-2020-13558"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1497",
    "packages": [
      "jasper"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2.0.24-1",
    "fixed": "2.0.25-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3272",
      "CVE-2021-26927",
      "CVE-2021-26926"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1575",
    "packages": [
      "glib2"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "incorrect calculation",
    "affected": "2.66.6-1",
    "fixed": "2.66.7-1",
    "ticket": null,
    "issues": [
      "CVE-2021-27218"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1565",
    "packages": [
      "xterm"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "365-1",
    "fixed": "366-1",
    "ticket": null,
    "issues": [
      "CVE-2021-27135"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1550",
    "packages": [
      "lib32-libsndfile"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.0.28-3",
    "fixed": "1.0.31-1",
    "ticket": "57434",
    "issues": [
      "CVE-2019-3832",
      "CVE-2018-19758",
      "CVE-2018-19662",
      "CVE-2018-19661",
      "CVE-2018-19432",
      "CVE-2018-13139",
      "CVE-2017-8365",
      "CVE-2017-8363",
      "CVE-2017-8362",
      "CVE-2017-8361",
      "CVE-2017-6892",
      "CVE-2017-14634",
      "CVE-2017-14246",
      "CVE-2017-14245",
      "CVE-2017-12562"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1549",
    "packages": [
      "libsndfile"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.0.28-3",
    "fixed": "1.0.31-1",
    "ticket": "57434",
    "issues": [
      "CVE-2019-3832",
      "CVE-2018-19758",
      "CVE-2018-19662",
      "CVE-2018-19661",
      "CVE-2018-19432",
      "CVE-2018-13139",
      "CVE-2017-8365",
      "CVE-2017-8363",
      "CVE-2017-8362",
      "CVE-2017-8361",
      "CVE-2017-6892",
      "CVE-2017-14634",
      "CVE-2017-14246",
      "CVE-2017-14245",
      "CVE-2017-12562"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1517",
    "packages": [
      "podman"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "2.2.1-2",
    "fixed": "3.0.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20199"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1368",
    "packages": [
      "vault"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.5.5-1",
    "fixed": "1.5.7-1",
    "ticket": "69015",
    "issues": [
      "CVE-2021-3024",
      "CVE-2020-35177",
      "CVE-2020-25594"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1564",
    "packages": [
      "openvswitch"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "incorrect calculation",
    "affected": "2.14.1-1",
    "fixed": "2.14.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-35498"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1600",
    "packages": [
      "firefox"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "85.0.2-1",
    "fixed": "86.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-23977",
      "CVE-2021-23976"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1579",
    "packages": [
      "imagemagick"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "7.0.10.61-1",
    "fixed": "7.0.10.62-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20246",
      "CVE-2021-20245",
      "CVE-2021-20244",
      "CVE-2021-20243",
      "CVE-2021-20242",
      "CVE-2021-20241"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1465",
    "packages": [
      "python"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "3.9.1-2",
    "fixed": "3.9.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3177",
      "CVE-2021-23336"
    ],
    "advisories": [
      "ASA-202102-37",
      "ASA-202102-37"
    ]
  },
  {
    "name": "AVG-1574",
    "packages": [
      "glib2"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.66.5-1",
    "fixed": "2.66.6-1",
    "ticket": null,
    "issues": [
      "CVE-2021-27219"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1593",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "url request injection",
    "affected": "3.1.6-1",
    "fixed": "3.1.7-1",
    "ticket": null,
    "issues": [
      "CVE-2021-23336"
    ],
    "advisories": [
      "ASA-202102-28"
    ]
  },
  {
    "name": "AVG-1515",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.4.94-1",
    "fixed": "5.4.95-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3348"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1514",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.12.zen1-1",
    "fixed": "5.10.13.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3348",
      "CVE-2021-26708"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1513",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.12.hardened1-1",
    "fixed": "5.10.13.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3348",
      "CVE-2021-26708"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1512",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.12.arch1-1",
    "fixed": "5.10.13.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3348",
      "CVE-2021-26708"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1509",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.4.93-2",
    "fixed": "5.4.94-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3347"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1508",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.10.11.zen2-1",
    "fixed": "5.10.12.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3347"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1507",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.10.11.hardened1-1",
    "fixed": "5.10.12.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3347"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1581",
    "packages": [
      "openssl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.1.1.i-2",
    "fixed": "1.1.1.j-1",
    "ticket": null,
    "issues": [
      "CVE-2021-23841",
      "CVE-2021-23840"
    ],
    "advisories": [
      "ASA-202102-42"
    ]
  },
  {
    "name": "AVG-1588",
    "packages": [
      "intel-ucode"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "20201118-1",
    "fixed": "20210216-1",
    "ticket": null,
    "issues": [
      "CVE-2020-8698",
      "CVE-2020-8696"
    ],
    "advisories": [
      "ASA-202102-34"
    ]
  },
  {
    "name": "AVG-1587",
    "packages": [
      "linux"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.11.arch1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-26933"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1541",
    "packages": [
      "python-cryptography"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "incorrect calculation",
    "affected": "3.3.1-1",
    "fixed": "3.4-1",
    "ticket": null,
    "issues": [
      "CVE-2020-36242"
    ],
    "advisories": [
      "ASA-202102-36"
    ]
  },
  {
    "name": "AVG-1577",
    "packages": [
      "keycloak"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site request forgery",
    "affected": "12.0.1-1",
    "fixed": "12.0.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-10770"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1576",
    "packages": [
      "mumble"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.3.3-5",
    "fixed": "1.3.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-27229"
    ],
    "advisories": [
      "ASA-202102-32"
    ]
  },
  {
    "name": "AVG-1573",
    "packages": [
      "dbus"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.12.18-1",
    "fixed": "1.12.20-1",
    "ticket": null,
    "issues": [
      "CVE-2020-35512"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1567",
    "packages": [
      "postgresql"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "13.1-3",
    "fixed": "13.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3393",
      "CVE-2021-20229"
    ],
    "advisories": [
      "ASA-202102-31"
    ]
  },
  {
    "name": "AVG-1568",
    "packages": [
      "thrift"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.13.0-1",
    "fixed": "0.14.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-13949"
    ],
    "advisories": [
      "ASA-202102-43"
    ]
  },
  {
    "name": "AVG-1547",
    "packages": [
      "libmysofa"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.1-2",
    "fixed": "1.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-36152",
      "CVE-2020-36151",
      "CVE-2020-36150",
      "CVE-2020-36149",
      "CVE-2020-36148"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1566",
    "packages": [
      "prusa-slicer"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.2.0-11",
    "fixed": "2.3.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28596",
      "CVE-2020-28595"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1437",
    "packages": [
      "ansible"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "2.10.5-1",
    "fixed": "2.10.7-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20191",
      "CVE-2021-20180",
      "CVE-2021-20178"
    ],
    "advisories": [
      "ASA-202102-9"
    ]
  },
  {
    "name": "AVG-1561",
    "packages": [
      "linux-lts"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.4.96-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-20194"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1560",
    "packages": [
      "linux-zen"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.10.14.zen1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-20194"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1559",
    "packages": [
      "linux-hardened"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.10.14.hardened1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-20194"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1558",
    "packages": [
      "linux"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.10.14.arch1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-20194"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1556",
    "packages": [
      "linux-zen"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.9.14.zen1-1",
    "fixed": "5.10.1.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20226"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1557",
    "packages": [
      "linux-hardened"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.9.16.a-1",
    "fixed": "5.10.a-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20226"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1555",
    "packages": [
      "linux"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.9.14.a-1",
    "fixed": "5.10.1.a-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20226"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1546",
    "packages": [
      "python-httplib2"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.18.1-4",
    "fixed": "0.19.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21240"
    ],
    "advisories": [
      "ASA-202102-35"
    ]
  },
  {
    "name": "AVG-1538",
    "packages": [
      "gitea"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.13.1-1",
    "fixed": "1.13.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3382"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1489",
    "packages": [
      "openldap"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.4.56-1",
    "fixed": "2.4.57-1",
    "ticket": null,
    "issues": [
      "CVE-2020-36230",
      "CVE-2020-36229",
      "CVE-2020-36228",
      "CVE-2020-36227",
      "CVE-2020-36226",
      "CVE-2020-36225",
      "CVE-2020-36224",
      "CVE-2020-36223",
      "CVE-2020-36222",
      "CVE-2020-36221"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1482",
    "packages": [
      "389-ds-base"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.4.4.4-5",
    "fixed": "2.0.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-35518"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1491",
    "packages": [
      "jenkins"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "2.275-1",
    "fixed": "2.276-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21615"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1331",
    "packages": [
      "jasper"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.0.19-1",
    "fixed": "2.0.24-1",
    "ticket": "68889",
    "issues": [
      "CVE-2020-27828"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1536",
    "packages": [
      "sqlite"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "3.34.0-1",
    "fixed": "3.34.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20227"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1531",
    "packages": [
      "php"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "8.0.1-1",
    "fixed": "8.0.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21702"
    ],
    "advisories": [
      "ASA-202102-15"
    ]
  },
  {
    "name": "AVG-1324",
    "packages": [
      "glibc",
      "lib32-glibc"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.32-5",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-29573"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1529",
    "packages": [
      "cups"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1:2.3.3op1-1",
    "fixed": "1:2.3.3op2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-10001"
    ],
    "advisories": [
      "ASA-202102-13"
    ]
  },
  {
    "name": "AVG-1528",
    "packages": [
      "docker"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1:20.10.2-4",
    "fixed": "1:20.10.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21285",
      "CVE-2021-21284"
    ],
    "advisories": [
      "ASA-202102-12"
    ]
  },
  {
    "name": "AVG-1521",
    "packages": [
      "gitlab"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "13.8.1-1",
    "fixed": "13.8.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22172"
    ],
    "advisories": [
      "ASA-202102-11"
    ]
  },
  {
    "name": "AVG-1522",
    "packages": [
      "gitlab"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "13.8.1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-22169"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1519",
    "packages": [
      "vault"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "authentication bypass",
    "affected": "1.5.4-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-3282"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1506",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.10.11.arch1-1",
    "fixed": "5.10.12.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3347"
    ],
    "advisories": [
      "ASA-202102-23"
    ]
  },
  {
    "name": "AVG-1503",
    "packages": [
      "electron"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "incorrect calculation",
    "affected": "11.0.4-1",
    "fixed": "11.1.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26272"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1464",
    "packages": [
      "nextcloud"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "20.0.5-2",
    "fixed": "20.0.6-1",
    "ticket": null,
    "issues": [
      "CVE-2020-36193"
    ],
    "advisories": [
      "ASA-202102-7"
    ]
  },
  {
    "name": "AVG-1493",
    "packages": [
      "firefox"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "84.0.2-1",
    "fixed": "85.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-23959",
      "CVE-2021-23957"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1485",
    "packages": [
      "python-bottle"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "incorrect calculation",
    "affected": "0.12.18-3",
    "fixed": "0.12.19-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28473"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1423",
    "packages": [
      "vlc"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "3.0.11.1-6",
    "fixed": "3.0.12-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26664"
    ],
    "advisories": [
      "ASA-202101-35"
    ]
  },
  {
    "name": "AVG-1484",
    "packages": [
      "gst-plugins-bad"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.18.0-2",
    "fixed": "1.18.0+54+gbd3532008-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3185"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1481",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2:1.15.6-1",
    "fixed": "2:1.15.7-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3115",
      "CVE-2021-3114"
    ],
    "advisories": [
      "ASA-202101-27"
    ]
  },
  {
    "name": "AVG-1471",
    "packages": [
      "keycloak"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "11.0.3-1",
    "fixed": "12.0.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-14366"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1456",
    "packages": [
      "openvswitch"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2.14.0-1",
    "fixed": "2.14.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-27827",
      "CVE-2015-8011"
    ],
    "advisories": [
      "ASA-202101-28"
    ]
  },
  {
    "name": "AVG-1435",
    "packages": [
      "gptfdisk"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.0.5-1",
    "fixed": "1.0.6-1",
    "ticket": null,
    "issues": [
      "CVE-2021-0308"
    ],
    "advisories": [
      "ASA-202101-34"
    ]
  },
  {
    "name": "AVG-1451",
    "packages": [
      "lldpd"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.0.7-1",
    "fixed": "1.0.8-1",
    "ticket": null,
    "issues": [
      "CVE-2020-27827"
    ],
    "advisories": [
      "ASA-202101-29"
    ]
  },
  {
    "name": "AVG-1394",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.10.3.arch1-1",
    "fixed": "5.10.4.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-35499",
      "CVE-2020-27815"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1444",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "5.10.6.zen1-1",
    "fixed": "5.10.7.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28374"
    ],
    "advisories": [
      "ASA-202101-31"
    ]
  },
  {
    "name": "AVG-1442",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "5.10.6.arch1-1",
    "fixed": "5.10.7.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28374"
    ],
    "advisories": [
      "ASA-202101-33"
    ]
  },
  {
    "name": "AVG-1445",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "5.4.88-1",
    "fixed": "5.4.89-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28374"
    ],
    "advisories": [
      "ASA-202101-30"
    ]
  },
  {
    "name": "AVG-1443",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "directory traversal",
    "affected": "5.10.6.a-1",
    "fixed": "5.10.7.a-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28374"
    ],
    "advisories": [
      "ASA-202101-32"
    ]
  },
  {
    "name": "AVG-867",
    "packages": [
      "podofo"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "0.9.6-3",
    "fixed": "0.9.7-1",
    "ticket": "61651",
    "issues": [
      "CVE-2019-9687",
      "CVE-2019-9199",
      "CVE-2018-5783",
      "CVE-2018-20751",
      "CVE-2018-19532",
      "CVE-2018-14320",
      "CVE-2018-12982",
      "CVE-2018-11256",
      "CVE-2018-11255",
      "CVE-2018-11254",
      "CVE-2017-8054"
    ],
    "advisories": [
      "ASA-202101-36"
    ]
  },
  {
    "name": "AVG-1438",
    "packages": [
      "python-pillow"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "8.0.1-3",
    "fixed": "8.1.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-35655",
      "CVE-2020-35654",
      "CVE-2020-35653"
    ],
    "advisories": [
      "ASA-202101-11"
    ]
  },
  {
    "name": "AVG-1436",
    "packages": [
      "r"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "4.0.2-1",
    "fixed": "4.0.3-1",
    "ticket": null,
    "issues": [
      "CVE-2020-27637"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1387",
    "packages": [
      "wavpack"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "5.3.0-1",
    "fixed": "5.3.0-2",
    "ticket": "69234",
    "issues": [
      "CVE-2020-35738"
    ],
    "advisories": [
      "ASA-202101-23"
    ]
  },
  {
    "name": "AVG-1378",
    "packages": [
      "kitty"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary command execution",
    "affected": "0.19.2-2",
    "fixed": "0.19.3-1",
    "ticket": null,
    "issues": [
      "CVE-2020-35605"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1384",
    "packages": [
      "python-autobahn"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "url request injection",
    "affected": "20.12.2-1",
    "fixed": "20.12.3-1",
    "ticket": null,
    "issues": [
      "CVE-2020-35678"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1426",
    "packages": [
      "podofo"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "0.9.5-2",
    "fixed": "0.9.6-1",
    "ticket": null,
    "issues": [
      "CVE-2018-8001",
      "CVE-2018-8000",
      "CVE-2018-6352",
      "CVE-2018-5309",
      "CVE-2018-5308",
      "CVE-2018-5296",
      "CVE-2018-5295",
      "CVE-2017-8053",
      "CVE-2017-6849",
      "CVE-2017-6846",
      "CVE-2017-6845",
      "CVE-2017-5886"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1415",
    "packages": [
      "php"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "7.4.13-2",
    "fixed": "7.4.14-1",
    "ticket": "69242",
    "issues": [
      "CVE-2020-7071"
    ],
    "advisories": [
      "ASA-202101-9"
    ]
  },
  {
    "name": "AVG-1330",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.9.13.arch1-1",
    "fixed": "5.9.14.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-29661",
      "CVE-2020-29660",
      "CVE-2020-27830"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1399",
    "packages": [
      "mdbook"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site scripting",
    "affected": "0.4.4-2",
    "fixed": "0.4.5-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26297"
    ],
    "advisories": [
      "ASA-202101-8"
    ]
  },
  {
    "name": "AVG-1377",
    "packages": [
      "wireshark-cli"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "3.4.1-1",
    "fixed": "3.4.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26422"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1373",
    "packages": [
      "keycloak"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "11.0.3-1",
    "fixed": "12.0.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-27826"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1359",
    "packages": [
      "edk2-shell"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "202008-1",
    "fixed": "202011-1",
    "ticket": null,
    "issues": [
      "CVE-2019-14584"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1355",
    "packages": [
      "p11-kit"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "0.23.21-1",
    "fixed": "0.23.22-1",
    "ticket": null,
    "issues": [
      "CVE-2020-29363",
      "CVE-2020-29362",
      "CVE-2020-29361"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1352",
    "packages": [
      "wireshark-cli"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "3.4.0-1",
    "fixed": "3.4.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26421",
      "CVE-2020-26420",
      "CVE-2020-26419",
      "CVE-2020-26418"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1351",
    "packages": [
      "go-ethereum"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.9.24-2",
    "fixed": "1.9.25-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26264"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1350",
    "packages": [
      "tensorflow"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.3.1-7",
    "fixed": "2.4.0rc4-1",
    "ticket": null,
    "issues": [
      "CVE-2020-15266",
      "CVE-2020-15265"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1345",
    "packages": [
      "x11vnc"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "authentication bypass",
    "affected": "1:0.9.16-3",
    "fixed": "1:0.9.16-4",
    "ticket": "68930",
    "issues": [
      "CVE-2020-29074"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1341",
    "packages": [
      "matrix-synapse"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.23.0-1",
    "fixed": "1.24.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26257"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1337",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.73.0-1",
    "fixed": "7.74.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-8286",
      "CVE-2020-8285",
      "CVE-2020-8284"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1333",
    "packages": [
      "gitlab"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "13.6.1-1",
    "fixed": "13.6.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26417",
      "CVE-2020-26415",
      "CVE-2020-26413",
      "CVE-2020-26411",
      "CVE-2020-26409",
      "CVE-2020-26408",
      "CVE-2020-26407",
      "CVE-2020-13357"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1294",
    "packages": [
      "consul"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "1.7.4-1",
    "fixed": "1.9.1-1",
    "ticket": "68723",
    "issues": [
      "CVE-2020-28053"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1395",
    "packages": [
      "atftp"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.7.2-2",
    "fixed": "0.7.2-3",
    "ticket": "69175",
    "issues": [
      "CVE-2020-6097"
    ],
    "advisories": [
      "ASA-202101-24"
    ]
  },
  {
    "name": "AVG-1371",
    "packages": [
      "mediawiki"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.35.0-1",
    "fixed": "1.35.1-1",
    "ticket": "69132",
    "issues": [
      "CVE-2020-35480",
      "CVE-2020-35479",
      "CVE-2020-35478",
      "CVE-2020-35477",
      "CVE-2020-35475",
      "CVE-2020-35474"
    ],
    "advisories": [
      "ASA-202101-22"
    ]
  },
  {
    "name": "AVG-1389",
    "packages": [
      "opendkim"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "2.10.3-7",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-35766"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1379",
    "packages": [
      "hugo"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "arbitrary command execution",
    "affected": "0.79.0-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-26284"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1369",
    "packages": [
      "vault"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "1.5.4-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-35453"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1363",
    "packages": [
      "firefox"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "83.0-2",
    "fixed": "84.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26977",
      "CVE-2020-26975"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1361",
    "packages": [
      "openjpeg2"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.3.1-3",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-27844"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1358",
    "packages": [
      "mattermost"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "incorrect calculation",
    "affected": "5.26.1-1",
    "fixed": "5.26.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-29511",
      "CVE-2020-29510",
      "CVE-2020-29509"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1347",
    "packages": [
      "gitlab"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "13.6.1-1",
    "fixed": "13.6.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26416",
      "CVE-2020-26412"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1314",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.9.9.arch1-1",
    "fixed": "5.9.10.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-25669"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1313",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.9.6.arch1-1",
    "fixed": "5.9.7.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28974"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1301",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "private key recovery",
    "affected": "5.9.8.arch1-1",
    "fixed": "5.9.9.arch1-1",
    "ticket": "68618",
    "issues": [
      "CVE-2020-12912"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1284",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "5.9.10.arch1-1",
    "fixed": "5.9.11.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28941"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1271",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "5.4.75-1",
    "fixed": "5.4.76-1",
    "ticket": null,
    "issues": [
      "CVE-2020-25704"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1270",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "5.9.6.zen1-1",
    "fixed": "5.9.7.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-25704"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1268",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "5.9.6.arch1-1",
    "fixed": "5.9.7.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-25704"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1275",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.4.76-1",
    "fixed": "5.4.77-1",
    "ticket": null,
    "issues": [
      "CVE-2020-8694"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1274",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.9.7.arch1-1",
    "fixed": "5.9.8.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-8694"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1273",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.9.7.zen1-1",
    "fixed": "5.9.8.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-8694"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1329",
    "packages": [
      "lib32-gdk-pixbuf2"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.42.0-2",
    "fixed": "2.42.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-29385"
    ],
    "advisories": [
      "ASA-202012-20"
    ]
  },
  {
    "name": "AVG-1328",
    "packages": [
      "gdk-pixbuf2"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.42.0-2",
    "fixed": "2.42.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-29385"
    ],
    "advisories": [
      "ASA-202012-19"
    ]
  },
  {
    "name": "AVG-1322",
    "packages": [
      "hostapd"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "proxy injection",
    "affected": "2.9-3",
    "fixed": "2.9-4",
    "ticket": "68861",
    "issues": [
      "CVE-2020-12695"
    ],
    "advisories": [
      "ASA-202012-16"
    ]
  },
  {
    "name": "AVG-1318",
    "packages": [
      "cimg"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.9.2-1",
    "fixed": "2.9.4-1",
    "ticket": null,
    "issues": [
      "CVE-2020-25693"
    ],
    "advisories": [
      "ASA-202012-2"
    ]
  },
  {
    "name": "AVG-1319",
    "packages": [
      "python-lxml"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site scripting",
    "affected": "4.6.1-3",
    "fixed": "4.6.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-27783"
    ],
    "advisories": [
      "ASA-202012-1"
    ]
  },
  {
    "name": "AVG-1305",
    "packages": [
      "libslirp"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "4.3.1-1",
    "fixed": "4.4.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-29130",
      "CVE-2020-29129"
    ],
    "advisories": [
      "ASA-202012-7"
    ]
  },
  {
    "name": "AVG-1317",
    "packages": [
      "tomcat9"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "9.0.39-2",
    "fixed": "9.0.40-1",
    "ticket": null,
    "issues": [
      "CVE-2020-17527"
    ],
    "advisories": [
      "ASA-202012-3"
    ]
  },
  {
    "name": "AVG-1310",
    "packages": [
      "xorg-server"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.20.9.r21.g5c400cae1-2",
    "fixed": "1.20.10-1",
    "ticket": null,
    "issues": [
      "CVE-2020-25712",
      "CVE-2020-14360"
    ],
    "advisories": [
      "ASA-202012-6"
    ]
  },
  {
    "name": "AVG-1312",
    "packages": [
      "ant"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.10.8-1",
    "fixed": "1.10.9-1",
    "ticket": null,
    "issues": [
      "CVE-2020-11979"
    ],
    "advisories": [
      "ASA-202012-5"
    ]
  },
  {
    "name": "AVG-1298",
    "packages": [
      "opensc"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "0.20.0-3",
    "fixed": "0.21.0-1",
    "ticket": "68195",
    "issues": [
      "CVE-2020-26572",
      "CVE-2020-26571",
      "CVE-2020-26570"
    ],
    "advisories": [
      "ASA-202011-27"
    ]
  },
  {
    "name": "AVG-1299",
    "packages": [
      "gitea"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "1.12.5-1",
    "fixed": "1.12.6-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28991"
    ],
    "advisories": [
      "ASA-202011-26"
    ]
  },
  {
    "name": "AVG-1295",
    "packages": [
      "consul"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.7.0-1",
    "fixed": "1.8.4-1",
    "ticket": null,
    "issues": [
      "CVE-2020-25201"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1287",
    "packages": [
      "musl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "1.2.1-1",
    "fixed": "1.2.1-2",
    "ticket": "68685",
    "issues": [
      "CVE-2020-28928"
    ],
    "advisories": [
      "ASA-202011-29"
    ]
  },
  {
    "name": "AVG-1286",
    "packages": [
      "rclone"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "private key recovery",
    "affected": "1.53.2-1",
    "fixed": "1.53.3-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28924"
    ],
    "advisories": [
      "ASA-202011-17"
    ]
  },
  {
    "name": "AVG-1280",
    "packages": [
      "c-ares"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.16.1-2",
    "fixed": "1.17.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-8277"
    ],
    "advisories": [
      "ASA-202011-18"
    ]
  },
  {
    "name": "AVG-1285",
    "packages": [
      "libass"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "0.14.0-2",
    "fixed": "0.15.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-26682"
    ],
    "advisories": [
      "ASA-202011-19"
    ]
  },
  {
    "name": "AVG-1283",
    "packages": [
      "raptor"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.0.15-13",
    "fixed": "2.0.15-14",
    "ticket": "68613",
    "issues": [
      "CVE-2020-25713",
      "CVE-2017-18926"
    ],
    "advisories": [
      "ASA-202011-20"
    ]
  },
  {
    "name": "AVG-1282",
    "packages": [
      "swtpm"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "0.5.0-2",
    "fixed": "0.5.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28407"
    ],
    "advisories": [
      "ASA-202011-21"
    ]
  },
  {
    "name": "AVG-1263",
    "packages": [
      "libxml2"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2.9.10-5",
    "fixed": "2.9.10-6",
    "ticket": "68510",
    "issues": [
      "CVE-2020-7595",
      "CVE-2020-24977",
      "CVE-2019-20388"
    ],
    "advisories": [
      "ASA-202011-15"
    ]
  },
  {
    "name": "AVG-1269",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "5.9.7.a-1",
    "fixed": "5.9.8.a-1",
    "ticket": null,
    "issues": [
      "CVE-2020-8694",
      "CVE-2020-25704"
    ],
    "advisories": [
      "ASA-202011-10"
    ]
  },
  {
    "name": "AVG-1266",
    "packages": [
      "sddm"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "0.18.1-3",
    "fixed": "0.19.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28049"
    ],
    "advisories": [
      "ASA-202011-8"
    ]
  },
  {
    "name": "AVG-1242",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "5.7.12.arch1-1",
    "fixed": "5.8.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-16120"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1175",
    "packages": [
      "libupnp"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.6.25-2",
    "fixed": "1.14.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-13848"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1236",
    "packages": [
      "samba"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "4.12.6-1",
    "fixed": "4.13.0-1",
    "ticket": "67983",
    "issues": [
      "CVE-2020-1472"
    ],
    "advisories": [
      "ASA-202009-17"
    ]
  },
  {
    "name": "AVG-1231",
    "packages": [
      "lib32-brotli"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.0.7-3",
    "fixed": "1.0.9-1",
    "ticket": null,
    "issues": [
      "CVE-2020-8927"
    ],
    "advisories": [
      "ASA-202009-12"
    ]
  },
  {
    "name": "AVG-1230",
    "packages": [
      "brotli"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.0.7-1",
    "fixed": "1.0.9-1",
    "ticket": null,
    "issues": [
      "CVE-2020-8927"
    ],
    "advisories": [
      "ASA-202009-13"
    ]
  },
  {
    "name": "AVG-1217",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "3.1-1",
    "fixed": "3.1.1-1",
    "ticket": "67794",
    "issues": [
      "CVE-2020-24584",
      "CVE-2020-24583"
    ],
    "advisories": [
      "ASA-202009-4"
    ]
  },
  {
    "name": "AVG-1215",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site scripting",
    "affected": "1.15.0-1",
    "fixed": "1.15.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-24553"
    ],
    "advisories": [
      "ASA-202009-3"
    ]
  },
  {
    "name": "AVG-1184",
    "packages": [
      "libreoffice-still"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "6.3.6-2",
    "fixed": "6.4.6-1",
    "ticket": null,
    "issues": [
      "CVE-2020-12803",
      "CVE-2020-12802"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1208",
    "packages": [
      "opendmarc"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.3.2-6",
    "fixed": "1.3.3-1",
    "ticket": null,
    "issues": [
      "CVE-2020-12460"
    ],
    "advisories": [
      "ASA-202009-1"
    ]
  },
  {
    "name": "AVG-1196",
    "packages": [
      "tomcat9"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "9.0.35-1",
    "fixed": "9.0.37-1",
    "ticket": null,
    "issues": [
      "CVE-2020-11996"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1209",
    "packages": [
      "freerdp"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2:2.1.2-1",
    "fixed": "2:2.2.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-15103"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1141",
    "packages": [
      "mbedtls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "private key recovery",
    "affected": "2.16.5-1",
    "fixed": "2.16.7-1",
    "ticket": null,
    "issues": [
      "CVE-2020-10932"
    ],
    "advisories": [
      "ASA-202007-5"
    ]
  },
  {
    "name": "AVG-1154",
    "packages": [
      "tcpreplay"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "4.3.2-2",
    "fixed": "4.3.3-1",
    "ticket": null,
    "issues": [
      "CVE-2020-12740"
    ],
    "advisories": [
      "ASA-202007-3"
    ]
  },
  {
    "name": "AVG-1181",
    "packages": [
      "imagemagick"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "7.0.10.18-1",
    "fixed": "7.0.10.20-1",
    "ticket": null,
    "issues": [
      "CVE-2020-13902"
    ],
    "advisories": [
      "ASA-202006-14"
    ]
  },
  {
    "name": "AVG-1191",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "9.16.3-1",
    "fixed": "9.16.4-1",
    "ticket": null,
    "issues": [
      "CVE-2020-8619",
      "CVE-2020-8618"
    ],
    "advisories": [
      "ASA-202006-13"
    ]
  },
  {
    "name": "AVG-1176",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "3.0.6-2",
    "fixed": "3.0.7-1",
    "ticket": null,
    "issues": [
      "CVE-2020-13596",
      "CVE-2020-13254"
    ],
    "advisories": [
      "ASA-202006-8"
    ]
  },
  {
    "name": "AVG-1159",
    "packages": [
      "ant"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary command execution",
    "affected": "1.10.7-1",
    "fixed": "1.10.8-1",
    "ticket": null,
    "issues": [
      "CVE-2020-1945"
    ],
    "advisories": [
      "ASA-202005-15"
    ]
  },
  {
    "name": "AVG-1163",
    "packages": [
      "powerdns-recursor"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "4.2.1-2",
    "fixed": "4.2.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-12244",
      "CVE-2020-10995"
    ],
    "advisories": [
      "ASA-202005-10"
    ]
  },
  {
    "name": "AVG-1117",
    "packages": [
      "uboot-tools"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "2020.01-1",
    "fixed": "2020.04-1",
    "ticket": null,
    "issues": [
      "CVE-2020-10648"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1145",
    "packages": [
      "vlc"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "3.0.7-1",
    "fixed": "3.0.8-1",
    "ticket": null,
    "issues": [
      "CVE-2019-19721"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1135",
    "packages": [
      "openvpn"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.4.8-4",
    "fixed": "2.4.9-1",
    "ticket": null,
    "issues": [
      "CVE-2020-11810"
    ],
    "advisories": [
      "ASA-202004-16"
    ]
  },
  {
    "name": "AVG-1130",
    "packages": [
      "libssh"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.9.3-1",
    "fixed": "0.9.4-1",
    "ticket": null,
    "issues": [
      "CVE-2020-1730"
    ],
    "advisories": [
      "ASA-202004-11"
    ]
  },
  {
    "name": "AVG-1119",
    "packages": [
      "pam-krb5"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "4.8-1",
    "fixed": "4.9-1",
    "ticket": null,
    "issues": [
      "CVE-2020-10595"
    ],
    "advisories": [
      "ASA-202004-5"
    ]
  },
  {
    "name": "AVG-1111",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "sql injection",
    "affected": "3.0.3-1",
    "fixed": "3.0.4-1",
    "ticket": null,
    "issues": [
      "CVE-2020-9402"
    ],
    "advisories": [
      "ASA-202003-5"
    ]
  },
  {
    "name": "AVG-1106",
    "packages": [
      "opensc"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.19.0-2",
    "fixed": "0.20.0-1",
    "ticket": "65082",
    "issues": [
      "CVE-2019-6502",
      "CVE-2019-19481",
      "CVE-2019-19480",
      "CVE-2019-19479",
      "CVE-2019-15946",
      "CVE-2019-15945"
    ],
    "advisories": [
      "ASA-202003-2"
    ]
  },
  {
    "name": "AVG-1101",
    "packages": [
      "ppp"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.4.7-6",
    "fixed": "2.4.7-7",
    "ticket": null,
    "issues": [
      "CVE-2020-8597"
    ],
    "advisories": [
      "ASA-202003-3"
    ]
  },
  {
    "name": "AVG-1097",
    "packages": [
      "dovecot"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.3.9.2-1",
    "fixed": "2.3.9.3-1",
    "ticket": null,
    "issues": [
      "CVE-2020-7957",
      "CVE-2020-7046"
    ],
    "advisories": [
      "ASA-202002-6"
    ]
  },
  {
    "name": "AVG-1091",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "sql injection",
    "affected": "3.0.2-1",
    "fixed": "3.0.3-1",
    "ticket": null,
    "issues": [
      "CVE-2020-7471"
    ],
    "advisories": [
      "ASA-202002-1"
    ]
  },
  {
    "name": "AVG-1077",
    "packages": [
      "spamassassin"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "3.4.2-5",
    "fixed": "3.4.3-1",
    "ticket": null,
    "issues": [
      "CVE-2019-12420",
      "CVE-2018-11805"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1082",
    "packages": [
      "npm"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary file overwrite",
    "affected": "6.12.1-1",
    "fixed": "6.13.4-1",
    "ticket": null,
    "issues": [
      "CVE-2019-16777",
      "CVE-2019-16776",
      "CVE-2019-16775"
    ],
    "advisories": []
  },
  {
    "name": "AVG-886",
    "packages": [
      "libtiff"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "4.0.10-1",
    "fixed": "4.1.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-7663",
      "CVE-2019-6128"
    ],
    "advisories": [
      "ASA-201911-13"
    ]
  },
  {
    "name": "AVG-1057",
    "packages": [
      "samba"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "4.10.8-2",
    "fixed": "4.10.10-1",
    "ticket": null,
    "issues": [
      "CVE-2019-14847",
      "CVE-2019-14833",
      "CVE-2019-10218"
    ],
    "advisories": [
      "ASA-201911-6"
    ]
  },
  {
    "name": "AVG-1056",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "9.14.6-1",
    "fixed": "9.14.7-1",
    "ticket": null,
    "issues": [
      "CVE-2019-6476",
      "CVE-2019-6475"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1051",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2:1.13.1-1",
    "fixed": "2:1.13.3-1",
    "ticket": null,
    "issues": [
      "CVE-2019-17596"
    ],
    "advisories": [
      "ASA-201910-12"
    ]
  },
  {
    "name": "AVG-1048",
    "packages": [
      "xpdf"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "4.01.01-2",
    "fixed": "4.02-1",
    "ticket": "63980",
    "issues": [
      "CVE-2019-16927"
    ],
    "advisories": [
      "ASA-201910-10"
    ]
  },
  {
    "name": "AVG-1041",
    "packages": [
      "ruby-rdoc"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site scripting",
    "affected": "6.1.1-1",
    "fixed": "6.1.2-1",
    "ticket": "63978",
    "issues": [
      "CVE-2015-9251",
      "CVE-2012-6708"
    ],
    "advisories": [
      "ASA-201910-4"
    ]
  },
  {
    "name": "AVG-1039",
    "packages": [
      "ruby"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2.6.4-1",
    "fixed": "2.6.5-1",
    "ticket": "63977",
    "issues": [
      "CVE-2019-16255",
      "CVE-2019-16254",
      "CVE-2019-16201",
      "CVE-2019-15845"
    ],
    "advisories": [
      "ASA-201910-2"
    ]
  },
  {
    "name": "AVG-1035",
    "packages": [
      "systemd"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "242.84-2",
    "fixed": "243.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-15718"
    ],
    "advisories": [
      "ASA-201910-3"
    ]
  },
  {
    "name": "AVG-1034",
    "packages": [
      "grafana"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "6.3.3-1",
    "fixed": "6.3.4-1",
    "ticket": null,
    "issues": [
      "CVE-2019-15043"
    ],
    "advisories": [
      "ASA-201908-21"
    ]
  },
  {
    "name": "AVG-1030",
    "packages": [
      "jenkins"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2.189-1",
    "fixed": "2.192-1",
    "ticket": null,
    "issues": [
      "CVE-2019-10384",
      "CVE-2019-10383"
    ],
    "advisories": [
      "ASA-201908-22"
    ]
  },
  {
    "name": "AVG-1025",
    "packages": [
      "firefox"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "68.0.1-2",
    "fixed": "68.0.2-1",
    "ticket": null,
    "issues": [
      "CVE-2019-11733"
    ],
    "advisories": [
      "ASA-201908-11"
    ]
  },
  {
    "name": "AVG-1024",
    "packages": [
      "libnghttp2"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.39.1-1",
    "fixed": "1.39.2-1",
    "ticket": null,
    "issues": [
      "CVE-2019-9513",
      "CVE-2019-9511"
    ],
    "advisories": [
      "ASA-201908-17"
    ]
  },
  {
    "name": "AVG-1023",
    "packages": [
      "nginx"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.16.0-1",
    "fixed": "1.16.1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-9516",
      "CVE-2019-9513",
      "CVE-2019-9511"
    ],
    "advisories": [
      "ASA-201908-13"
    ]
  },
  {
    "name": "AVG-1022",
    "packages": [
      "nginx-mainline"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.17.2-1",
    "fixed": "1.17.3-1",
    "ticket": null,
    "issues": [
      "CVE-2019-9516",
      "CVE-2019-9513",
      "CVE-2019-9511"
    ],
    "advisories": [
      "ASA-201908-12"
    ]
  },
  {
    "name": "AVG-1021",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2:1.12.7-1",
    "fixed": "2:1.12.8-1",
    "ticket": null,
    "issues": [
      "CVE-2019-9514",
      "CVE-2019-9512",
      "CVE-2019-14809"
    ],
    "advisories": [
      "ASA-201908-15"
    ]
  },
  {
    "name": "AVG-1019",
    "packages": [
      "postgresql",
      "postgresql-libs"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "11.4-1",
    "fixed": "11.5-1",
    "ticket": null,
    "issues": [
      "CVE-2019-10209",
      "CVE-2019-10208"
    ],
    "advisories": [
      "ASA-201908-8",
      "ASA-201908-7"
    ]
  },
  {
    "name": "AVG-1015",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2.2.3-1",
    "fixed": "2.2.4-1",
    "ticket": null,
    "issues": [
      "CVE-2019-14235",
      "CVE-2019-14234",
      "CVE-2019-14233",
      "CVE-2019-14232"
    ],
    "advisories": [
      "ASA-201908-2"
    ]
  },
  {
    "name": "AVG-1008",
    "packages": [
      "vlc"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "3.0.7.1-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2019-13615"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1007",
    "packages": [
      "gvfs"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.40.1-1",
    "fixed": "1.40.2-1",
    "ticket": null,
    "issues": [
      "CVE-2019-12795",
      "CVE-2019-12449",
      "CVE-2019-12448",
      "CVE-2019-12447"
    ],
    "advisories": []
  },
  {
    "name": "AVG-992",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "4.9.76-1",
    "fixed": "4.9.77-1",
    "ticket": null,
    "issues": [
      "CVE-2017-17741"
    ],
    "advisories": []
  },
  {
    "name": "AVG-991",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "4.9.33-1",
    "fixed": "4.9.34-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000379"
    ],
    "advisories": []
  },
  {
    "name": "AVG-990",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "4.9.34-1",
    "fixed": "4.9.35-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000365"
    ],
    "advisories": []
  },
  {
    "name": "AVG-988",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.0.5.arch1-1",
    "fixed": "5.0.6.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2019-3460",
      "CVE-2019-3459"
    ],
    "advisories": []
  },
  {
    "name": "AVG-973",
    "packages": [
      "pam-u2f"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.0.7-2",
    "fixed": "1.0.8-2",
    "ticket": null,
    "issues": [
      "CVE-2019-12210",
      "CVE-2019-12209"
    ],
    "advisories": [
      "ASA-201906-5"
    ]
  },
  {
    "name": "AVG-969",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site scripting",
    "affected": "2.2.1-1",
    "fixed": "2.2.2-1",
    "ticket": null,
    "issues": [
      "CVE-2019-12308",
      "CVE-2019-11358"
    ],
    "advisories": [
      "ASA-201906-2"
    ]
  },
  {
    "name": "AVG-954",
    "packages": [
      "dovecot"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.3.5.2-1",
    "fixed": "2.3.6-1",
    "ticket": null,
    "issues": [
      "CVE-2019-11499",
      "CVE-2019-11494"
    ],
    "advisories": [
      "ASA-201905-6"
    ]
  },
  {
    "name": "AVG-950",
    "packages": [
      "dovecot"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.3.5.1-4",
    "fixed": "2.3.5.2-1",
    "ticket": null,
    "issues": [
      "CVE-2019-10691"
    ],
    "advisories": [
      "ASA-201904-9"
    ]
  },
  {
    "name": "AVG-948",
    "packages": [
      "jenkins"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2.171-1",
    "fixed": "2.172-1",
    "ticket": null,
    "issues": [
      "CVE-2019-1003050",
      "CVE-2019-1003049"
    ],
    "advisories": [
      "ASA-201904-7"
    ]
  },
  {
    "name": "AVG-937",
    "packages": [
      "binutils"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.27.0-1",
    "fixed": "2.28.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7227"
    ],
    "advisories": []
  },
  {
    "name": "AVG-933",
    "packages": [
      "nspr"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "4.11-1",
    "fixed": "4.12-1",
    "ticket": null,
    "issues": [
      "CVE-2016-1951"
    ],
    "advisories": []
  },
  {
    "name": "AVG-932",
    "packages": [
      "gnome-keyring"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "3.20.1-1",
    "fixed": "3.27.2-1",
    "ticket": null,
    "issues": [
      "CVE-2018-20781"
    ],
    "advisories": []
  },
  {
    "name": "AVG-904",
    "packages": [
      "python-jinja"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "content spoofing",
    "affected": "2.10-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2019-8341"
    ],
    "advisories": []
  },
  {
    "name": "AVG-901",
    "packages": [
      "hdf5"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.10.4-1",
    "fixed": "1.10.5-1",
    "ticket": null,
    "issues": [
      "CVE-2019-8398",
      "CVE-2019-8397",
      "CVE-2019-8396"
    ],
    "advisories": []
  },
  {
    "name": "AVG-888",
    "packages": [
      "aubio"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.4.8-1",
    "fixed": "0.4.9-1",
    "ticket": null,
    "issues": [
      "CVE-2018-19802",
      "CVE-2018-19801",
      "CVE-2018-19800"
    ],
    "advisories": [
      "ASA-201902-8"
    ]
  },
  {
    "name": "AVG-881",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.1.5-1",
    "fixed": "2.1.6-1",
    "ticket": null,
    "issues": [
      "CVE-2019-6975"
    ],
    "advisories": [
      "ASA-201902-14"
    ]
  },
  {
    "name": "AVG-863",
    "packages": [
      "libelf"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.175-1",
    "fixed": "0.176-1",
    "ticket": null,
    "issues": [
      "CVE-2019-7665",
      "CVE-2019-7664",
      "CVE-2019-7150",
      "CVE-2019-7149",
      "CVE-2019-7148"
    ],
    "advisories": [
      "ASA-201903-9"
    ]
  },
  {
    "name": "AVG-859",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "private key recovery",
    "affected": "2:1.11.4-1",
    "fixed": "2:1.11.5-1",
    "ticket": null,
    "issues": [
      "CVE-2019-6486"
    ],
    "advisories": [
      "ASA-201901-11"
    ]
  },
  {
    "name": "AVG-856",
    "packages": [
      "powerdns-recursor"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "4.1.8-1",
    "fixed": "4.1.9-1",
    "ticket": null,
    "issues": [
      "CVE-2019-3807",
      "CVE-2019-3806"
    ],
    "advisories": [
      "ASA-201901-13"
    ]
  },
  {
    "name": "AVG-852",
    "packages": [
      "nasm"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.14-1",
    "fixed": "2.14.02-1",
    "ticket": null,
    "issues": [
      "CVE-2019-6291",
      "CVE-2019-6290"
    ],
    "advisories": [
      "ASA-201901-16"
    ]
  },
  {
    "name": "AVG-851",
    "packages": [
      "epiphany"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "content spoofing",
    "affected": "3.31.4-1",
    "fixed": "3.32.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-6251"
    ],
    "advisories": []
  },
  {
    "name": "AVG-844",
    "packages": [
      "wireshark-cli"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2.6.5-1",
    "fixed": "2.6.6-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5719",
      "CVE-2019-5718",
      "CVE-2019-5717",
      "CVE-2019-5716"
    ],
    "advisories": [
      "ASA-201901-5"
    ]
  },
  {
    "name": "AVG-839",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "content spoofing",
    "affected": "2.1.4-1",
    "fixed": "2.1.5-1",
    "ticket": null,
    "issues": [
      "CVE-2019-3498"
    ],
    "advisories": [
      "ASA-201901-6"
    ]
  },
  {
    "name": "AVG-836",
    "packages": [
      "haproxy"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.8.14-1",
    "fixed": "1.9.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-20103",
      "CVE-2018-20102"
    ],
    "advisories": [
      "ASA-201901-15"
    ]
  },
  {
    "name": "AVG-831",
    "packages": [
      "glibc"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.28-5",
    "fixed": "2.29-1",
    "ticket": null,
    "issues": [
      "CVE-2018-19591"
    ],
    "advisories": []
  },
  {
    "name": "AVG-830",
    "packages": [
      "lib32-glibc"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.28-5",
    "fixed": "2.29-1",
    "ticket": null,
    "issues": [
      "CVE-2018-19591"
    ],
    "advisories": []
  },
  {
    "name": "AVG-822",
    "packages": [
      "mathjax"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site scripting",
    "affected": "2.7.3-1",
    "fixed": "2.7.4-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1999024"
    ],
    "advisories": []
  },
  {
    "name": "AVG-821",
    "packages": [
      "powerdns-recursor"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "4.1.7-1",
    "fixed": "4.1.8-1",
    "ticket": null,
    "issues": [
      "CVE-2018-16855"
    ],
    "advisories": [
      "ASA-201811-21"
    ]
  },
  {
    "name": "AVG-820",
    "packages": [
      "jupyter-notebook"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site scripting",
    "affected": "5.5.0-1",
    "fixed": "5.7.2-1",
    "ticket": "60910",
    "issues": [
      "CVE-2018-19352",
      "CVE-2018-19351"
    ],
    "advisories": [
      "ASA-201812-1"
    ]
  },
  {
    "name": "AVG-817",
    "packages": [
      "lib32-libtiff"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "4.0.7-2",
    "fixed": "4.0.7-3",
    "ticket": null,
    "issues": [
      "CVE-2017-7602",
      "CVE-2017-7601",
      "CVE-2017-7600",
      "CVE-2017-7599",
      "CVE-2017-7598",
      "CVE-2017-7597",
      "CVE-2017-7596",
      "CVE-2017-7595",
      "CVE-2017-7594",
      "CVE-2017-7593",
      "CVE-2017-7592"
    ],
    "advisories": []
  },
  {
    "name": "AVG-816",
    "packages": [
      "libtiff"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "4.0.9-1",
    "fixed": "4.0.10-1",
    "ticket": "60599",
    "issues": [
      "CVE-2018-10779"
    ],
    "advisories": []
  },
  {
    "name": "AVG-815",
    "packages": [
      "lib32-libtiff"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "4.0.8-1",
    "fixed": "4.0.9-1",
    "ticket": null,
    "issues": [
      "CVE-2017-13726"
    ],
    "advisories": []
  },
  {
    "name": "AVG-814",
    "packages": [
      "libtiff"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "4.0.8-1",
    "fixed": "4.0.9-1",
    "ticket": null,
    "issues": [
      "CVE-2017-13726"
    ],
    "advisories": []
  },
  {
    "name": "AVG-812",
    "packages": [
      "chromium"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "70.0.3538.102-1",
    "fixed": "70.0.3538.110-1",
    "ticket": null,
    "issues": [
      "CVE-2018-17478"
    ],
    "advisories": [
      "ASA-201811-16",
      "ASA-201811-16"
    ]
  },
  {
    "name": "AVG-805",
    "packages": [
      "powerdns-recursor"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "4.1.4-3",
    "fixed": "4.1.5-1",
    "ticket": null,
    "issues": [
      "CVE-2018-14644",
      "CVE-2018-14626",
      "CVE-2018-10851"
    ],
    "advisories": [
      "ASA-201811-13"
    ]
  },
  {
    "name": "AVG-804",
    "packages": [
      "powerdns"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "4.1.4-4",
    "fixed": "4.1.5-1",
    "ticket": null,
    "issues": [
      "CVE-2018-14626",
      "CVE-2018-10851"
    ],
    "advisories": [
      "ASA-201811-12"
    ]
  },
  {
    "name": "AVG-785",
    "packages": [
      "elfutils"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.174-1",
    "fixed": "0.175-1",
    "ticket": null,
    "issues": [
      "CVE-2018-18521",
      "CVE-2018-18520",
      "CVE-2018-18310"
    ],
    "advisories": [
      "ASA-201901-3"
    ]
  },
  {
    "name": "AVG-778",
    "packages": [
      "jenkins"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "2.145-1",
    "fixed": "2.146-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1999043"
    ],
    "advisories": []
  },
  {
    "name": "AVG-773",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "2.1.1-1",
    "fixed": "2.1.2-1",
    "ticket": null,
    "issues": [
      "CVE-2018-16984"
    ],
    "advisories": [
      "ASA-201810-5"
    ]
  },
  {
    "name": "AVG-772",
    "packages": [
      "mosquitto"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.5.1-1",
    "fixed": "1.5.3-1",
    "ticket": null,
    "issues": [
      "CVE-2018-12543"
    ],
    "advisories": [
      "ASA-201810-1"
    ]
  },
  {
    "name": "AVG-768",
    "packages": [
      "bitcoin-tx"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.16.2-2",
    "fixed": "0.16.3-1",
    "ticket": null,
    "issues": [
      "CVE-2018-17144"
    ],
    "advisories": []
  },
  {
    "name": "AVG-766",
    "packages": [
      "bitcoin-daemon",
      "bitcoin-qt"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.16.2-2",
    "fixed": "0.16.3-1",
    "ticket": null,
    "issues": [
      "CVE-2018-17144"
    ],
    "advisories": [
      "ASA-201809-1",
      "ASA-201809-2"
    ]
  },
  {
    "name": "AVG-765",
    "packages": [
      "mediawiki"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.31.0-1",
    "fixed": "1.31.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-13258",
      "CVE-2018-0505",
      "CVE-2018-0503"
    ],
    "advisories": [
      "ASA-201809-5"
    ]
  },
  {
    "name": "AVG-763",
    "packages": [
      "openssh"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "7.7p1-2",
    "fixed": "7.8p1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-15473"
    ],
    "advisories": []
  },
  {
    "name": "AVG-744",
    "packages": [
      "drupal"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "8.5.5-1",
    "fixed": "8.5.6-1",
    "ticket": null,
    "issues": [
      "CVE-2018-14773"
    ],
    "advisories": []
  },
  {
    "name": "AVG-743",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "open redirect",
    "affected": "2.0.7-2",
    "fixed": "2.0.8-1",
    "ticket": null,
    "issues": [
      "CVE-2018-14574"
    ],
    "advisories": [
      "ASA-201808-1"
    ]
  },
  {
    "name": "AVG-736",
    "packages": [
      "apache"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.4.33-3",
    "fixed": "2.4.34-1",
    "ticket": null,
    "issues": [
      "CVE-2018-8011",
      "CVE-2018-1333"
    ],
    "advisories": [
      "ASA-201807-12"
    ]
  },
  {
    "name": "AVG-726",
    "packages": [
      "gitlab"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "11.0.0-1",
    "fixed": "11.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-3740",
      "CVE-2018-12607",
      "CVE-2018-12606"
    ],
    "advisories": [
      "ASA-201807-1"
    ]
  },
  {
    "name": "AVG-724",
    "packages": [
      "qutebrowser"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site scripting",
    "affected": "1.3.2-1",
    "fixed": "1.3.3-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000559"
    ],
    "advisories": [
      "ASA-201806-13"
    ]
  },
  {
    "name": "AVG-723",
    "packages": [
      "ntp"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "4.2.8.p11-2",
    "fixed": "4.2.8.p12-1",
    "ticket": null,
    "issues": [
      "CVE-2018-12327"
    ],
    "advisories": [
      "ASA-201810-2"
    ]
  },
  {
    "name": "AVG-718",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "9.13.0-2",
    "fixed": "9.13.2-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5738"
    ],
    "advisories": []
  },
  {
    "name": "AVG-706",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "9.12.1-1",
    "fixed": "9.12.1.P2-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5737",
      "CVE-2018-5736"
    ],
    "advisories": [
      "ASA-201805-20"
    ]
  },
  {
    "name": "AVG-705",
    "packages": [
      "procps-ng"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "3.3.14-1",
    "fixed": "3.3.15-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1126",
      "CVE-2018-1125",
      "CVE-2018-1124",
      "CVE-2018-1123",
      "CVE-2018-1122"
    ],
    "advisories": []
  },
  {
    "name": "AVG-673",
    "packages": [
      "lib32-libxml2"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.9.8-3",
    "fixed": "2.9.8-4",
    "ticket": null,
    "issues": [
      "CVE-2018-9251"
    ],
    "advisories": [
      "ASA-201810-4"
    ]
  },
  {
    "name": "AVG-672",
    "packages": [
      "libxml2"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.9.8-4",
    "fixed": "2.9.8-5",
    "ticket": null,
    "issues": [
      "CVE-2018-9251"
    ],
    "advisories": [
      "ASA-201810-3"
    ]
  },
  {
    "name": "AVG-671",
    "packages": [
      "libxml2"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.9.5+6+g07e227ed-1",
    "fixed": "2.9.6+3+g5af594d8-1",
    "ticket": null,
    "issues": [
      "CVE-2017-18258"
    ],
    "advisories": []
  },
  {
    "name": "AVG-667",
    "packages": [
      "zziplib"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.13.67-1",
    "fixed": "0.13.68-1",
    "ticket": null,
    "issues": [
      "CVE-2018-6869",
      "CVE-2018-6542",
      "CVE-2018-6541",
      "CVE-2018-6540",
      "CVE-2018-6484",
      "CVE-2018-6381"
    ],
    "advisories": []
  },
  {
    "name": "AVG-664",
    "packages": [
      "apache"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "2.4.29-1",
    "fixed": "2.4.33-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1312",
      "CVE-2018-1303",
      "CVE-2018-1302",
      "CVE-2018-1301",
      "CVE-2018-1283",
      "CVE-2017-15715",
      "CVE-2017-15710"
    ],
    "advisories": [
      "ASA-201804-4"
    ]
  },
  {
    "name": "AVG-662",
    "packages": [
      "networkmanager"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.10.2-1",
    "fixed": "1.10.3dev+38+g78ef57197-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000135"
    ],
    "advisories": []
  },
  {
    "name": "AVG-661",
    "packages": [
      "libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.58.0-2",
    "fixed": "7.59.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000122",
      "CVE-2018-1000121",
      "CVE-2018-1000120"
    ],
    "advisories": [
      "ASA-201803-19"
    ]
  },
  {
    "name": "AVG-660",
    "packages": [
      "lib32-libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.58.0-2",
    "fixed": "7.59.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000122",
      "CVE-2018-1000121",
      "CVE-2018-1000120"
    ],
    "advisories": [
      "ASA-201803-18"
    ]
  },
  {
    "name": "AVG-656",
    "packages": [
      "lib32-libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.58.0-2",
    "fixed": "7.59.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000122",
      "CVE-2018-1000121",
      "CVE-2018-1000120"
    ],
    "advisories": [
      "ASA-201803-20"
    ]
  },
  {
    "name": "AVG-655",
    "packages": [
      "libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.58.0-2",
    "fixed": "7.59.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000122",
      "CVE-2018-1000121",
      "CVE-2018-1000120"
    ],
    "advisories": [
      "ASA-201803-17"
    ]
  },
  {
    "name": "AVG-654",
    "packages": [
      "lib32-curl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.58.0-2",
    "fixed": "7.59.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000122",
      "CVE-2018-1000121",
      "CVE-2018-1000120"
    ],
    "advisories": [
      "ASA-201803-16"
    ]
  },
  {
    "name": "AVG-653",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.58.0-2",
    "fixed": "7.59.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000122",
      "CVE-2018-1000121",
      "CVE-2018-1000120"
    ],
    "advisories": [
      "ASA-201803-15"
    ]
  },
  {
    "name": "AVG-649",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.11.10-1",
    "fixed": "1.11.11-1",
    "ticket": null,
    "issues": [
      "CVE-2018-7537",
      "CVE-2018-7536"
    ],
    "advisories": [
      "ASA-201803-5"
    ]
  },
  {
    "name": "AVG-642",
    "packages": [
      "zsh"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "5.4.2-2",
    "fixed": "5.5-1",
    "ticket": null,
    "issues": [
      "CVE-2018-7549",
      "CVE-2018-7548"
    ],
    "advisories": [
      "ASA-201804-7"
    ]
  },
  {
    "name": "AVG-638",
    "packages": [
      "libcdio"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.94-1",
    "fixed": "1.0.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-18199",
      "CVE-2017-18198"
    ],
    "advisories": []
  },
  {
    "name": "AVG-635",
    "packages": [
      "vim",
      "gvim"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "8.0.1530-1",
    "fixed": "8.0.1531-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000382"
    ],
    "advisories": []
  },
  {
    "name": "AVG-633",
    "packages": [
      "lib32-libid3tag"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.15.1a-1",
    "fixed": "0.15.1b-1",
    "ticket": "57601",
    "issues": [
      "CVE-2017-11551",
      "CVE-2017-11550",
      "CVE-2008-2109",
      "CVE-2004-2779"
    ],
    "advisories": []
  },
  {
    "name": "AVG-632",
    "packages": [
      "libid3tag"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.15.1b-5",
    "fixed": "0.15.1b-6",
    "ticket": "57601",
    "issues": [
      "CVE-2017-11551",
      "CVE-2017-11550",
      "CVE-2008-2109",
      "CVE-2004-2779"
    ],
    "advisories": []
  },
  {
    "name": "AVG-630",
    "packages": [
      "phpmyadmin"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site scripting",
    "affected": "4.7.7-1",
    "fixed": "4.7.8-1",
    "ticket": null,
    "issues": [
      "CVE-2018-7260"
    ],
    "advisories": [
      "ASA-201802-11"
    ]
  },
  {
    "name": "AVG-625",
    "packages": [
      "strongswan"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "5.6.1-1",
    "fixed": "5.6.2-1",
    "ticket": "57597",
    "issues": [
      "CVE-2018-6459"
    ],
    "advisories": [
      "ASA-201802-10"
    ]
  },
  {
    "name": "AVG-624",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.11.8-1",
    "fixed": "1.11.10-1",
    "ticket": null,
    "issues": [
      "CVE-2018-6188"
    ],
    "advisories": []
  },
  {
    "name": "AVG-622",
    "packages": [
      "php-fpm"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "7.2.7-2",
    "fixed": "7.2.8-1",
    "ticket": "57579",
    "issues": [
      "CVE-2015-9253"
    ],
    "advisories": []
  },
  {
    "name": "AVG-620",
    "packages": [
      "qpdf"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "6.0.0-1",
    "fixed": "7.0.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-18186",
      "CVE-2017-18185",
      "CVE-2017-18184",
      "CVE-2017-18183",
      "CVE-2015-9252"
    ],
    "advisories": []
  },
  {
    "name": "AVG-615",
    "packages": [
      "systemd"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "239.2-1",
    "fixed": "240.0-3",
    "ticket": null,
    "issues": [
      "CVE-2018-6954",
      "CVE-2018-16866"
    ],
    "advisories": [
      "ASA-201901-4"
    ]
  },
  {
    "name": "AVG-612",
    "packages": [
      "zziplib"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.13.68-1",
    "fixed": "0.13.69-1",
    "ticket": null,
    "issues": [
      "CVE-2018-7727",
      "CVE-2018-7726",
      "CVE-2018-7725"
    ],
    "advisories": [
      "ASA-201804-3"
    ]
  },
  {
    "name": "AVG-598",
    "packages": [
      "lib32-libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.57.0-1",
    "fixed": "7.58.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000007",
      "CVE-2018-1000005"
    ],
    "advisories": [
      "ASA-201801-26"
    ]
  },
  {
    "name": "AVG-597",
    "packages": [
      "lib32-libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.57.0-1",
    "fixed": "7.58.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000007",
      "CVE-2018-1000005"
    ],
    "advisories": [
      "ASA-201801-25"
    ]
  },
  {
    "name": "AVG-596",
    "packages": [
      "libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.57.0-1",
    "fixed": "7.58.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000007",
      "CVE-2018-1000005"
    ],
    "advisories": [
      "ASA-201801-24"
    ]
  },
  {
    "name": "AVG-595",
    "packages": [
      "libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.57.0-1",
    "fixed": "7.58.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000007",
      "CVE-2018-1000005"
    ],
    "advisories": [
      "ASA-201801-23"
    ]
  },
  {
    "name": "AVG-594",
    "packages": [
      "lib32-curl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.57.0-1",
    "fixed": "7.58.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000007",
      "CVE-2018-1000005"
    ],
    "advisories": [
      "ASA-201801-22"
    ]
  },
  {
    "name": "AVG-593",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.57.0-1",
    "fixed": "7.58.0-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1000007",
      "CVE-2018-1000005"
    ],
    "advisories": [
      "ASA-201801-20"
    ]
  },
  {
    "name": "AVG-592",
    "packages": [
      "dnsmasq"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "2.78-1",
    "fixed": "2.78-2",
    "ticket": null,
    "issues": [
      "CVE-2017-15107"
    ],
    "advisories": [
      "ASA-201801-32"
    ]
  },
  {
    "name": "AVG-591",
    "packages": [
      "zziplib"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.13.66-2",
    "fixed": "0.13.67-1",
    "ticket": "57147",
    "issues": [
      "CVE-2017-5980"
    ],
    "advisories": []
  },
  {
    "name": "AVG-586",
    "packages": [
      "krb5"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.16-1",
    "fixed": "1.16.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5730",
      "CVE-2018-5729",
      "CVE-2018-5709"
    ],
    "advisories": [
      "ASA-201806-3"
    ]
  },
  {
    "name": "AVG-575",
    "packages": [
      "irssi"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.0.5-1",
    "fixed": "1.0.6-1",
    "ticket": null,
    "issues": [
      "CVE-2018-5208",
      "CVE-2018-5207",
      "CVE-2018-5206",
      "CVE-2018-5205"
    ],
    "advisories": [
      "ASA-201801-12"
    ]
  },
  {
    "name": "AVG-573",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "4.14.11.a-1",
    "fixed": "4.16.5.a-1",
    "ticket": null,
    "issues": [
      "CVE-2017-16644"
    ],
    "advisories": []
  },
  {
    "name": "AVG-565",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "4.9.68-1",
    "fixed": "4.9.69-1",
    "ticket": null,
    "issues": [
      "CVE-2017-17807",
      "CVE-2017-1000407"
    ],
    "advisories": []
  },
  {
    "name": "AVG-564",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "4.14.5-1",
    "fixed": "4.14.6-1",
    "ticket": null,
    "issues": [
      "CVE-2017-17807",
      "CVE-2017-1000407"
    ],
    "advisories": []
  },
  {
    "name": "AVG-563",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "4.14.5-1",
    "fixed": "4.14.6-1",
    "ticket": null,
    "issues": [
      "CVE-2017-17807",
      "CVE-2017-1000407"
    ],
    "advisories": []
  },
  {
    "name": "AVG-562",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "4.14.5-1",
    "fixed": "4.14.6-1",
    "ticket": null,
    "issues": [
      "CVE-2017-17807",
      "CVE-2017-1000407"
    ],
    "advisories": []
  },
  {
    "name": "AVG-556",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "4.9.49-1",
    "fixed": "4.9.50-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9986",
      "CVE-2017-9985",
      "CVE-2017-9984"
    ],
    "advisories": []
  },
  {
    "name": "AVG-555",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "4.11.7-1",
    "fixed": "4.13-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9986",
      "CVE-2017-9985",
      "CVE-2017-9984"
    ],
    "advisories": []
  },
  {
    "name": "AVG-554",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "4.11.7-1",
    "fixed": "4.13-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9986",
      "CVE-2017-9985",
      "CVE-2017-9984"
    ],
    "advisories": []
  },
  {
    "name": "AVG-553",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "4.12-1",
    "fixed": "4.13.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-14497"
    ],
    "advisories": []
  },
  {
    "name": "AVG-551",
    "packages": [
      "lib32-openssl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "private key recovery",
    "affected": "1:1.1.0.g-1",
    "fixed": "1:1.1.0.h-1",
    "ticket": null,
    "issues": [
      "CVE-2017-3738"
    ],
    "advisories": [
      "ASA-201804-6"
    ]
  },
  {
    "name": "AVG-549",
    "packages": [
      "lib32-openssl"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.1.0.g-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2017-3737"
    ],
    "advisories": []
  },
  {
    "name": "AVG-548",
    "packages": [
      "openssl"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.1.0.g-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2017-3737"
    ],
    "advisories": []
  },
  {
    "name": "AVG-543",
    "packages": [
      "jenkins"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site scripting",
    "affected": "2.93-1",
    "fixed": "2.94-1",
    "ticket": null,
    "issues": [
      "CVE-2017-17383"
    ],
    "advisories": []
  },
  {
    "name": "AVG-541",
    "packages": [
      "libextractor"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.6-3",
    "fixed": "1.7-1",
    "ticket": null,
    "issues": [
      "CVE-2017-17440"
    ],
    "advisories": [
      "ASA-201807-16"
    ]
  },
  {
    "name": "AVG-540",
    "packages": [
      "openssl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.1.0.g-1",
    "fixed": "1.1.0.h-1",
    "ticket": null,
    "issues": [
      "CVE-2018-0739",
      "CVE-2017-3738"
    ],
    "advisories": [
      "ASA-201804-2"
    ]
  },
  {
    "name": "AVG-536",
    "packages": [
      "libofx"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.9.12-1",
    "fixed": "0.9.13-1",
    "ticket": "56544",
    "issues": [
      "CVE-2017-14731"
    ],
    "advisories": [
      "ASA-201805-19"
    ]
  },
  {
    "name": "AVG-534",
    "packages": [
      "libofx"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "0.9.11-1",
    "fixed": "0.9.12-1",
    "ticket": "56539",
    "issues": [
      "CVE-2017-2816"
    ],
    "advisories": [
      "ASA-201712-3"
    ]
  },
  {
    "name": "AVG-526",
    "packages": [
      "libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "7.56.1-1",
    "fixed": "7.57.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-8817"
    ],
    "advisories": [
      "ASA-201711-35"
    ]
  },
  {
    "name": "AVG-525",
    "packages": [
      "libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "7.56.1-1",
    "fixed": "7.57.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-8817"
    ],
    "advisories": [
      "ASA-201711-34"
    ]
  },
  {
    "name": "AVG-524",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "7.56.1-1",
    "fixed": "7.57.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-8817"
    ],
    "advisories": [
      "ASA-201711-33"
    ]
  },
  {
    "name": "AVG-520",
    "packages": [
      "powerdns-recursor"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "4.0.6-3",
    "fixed": "4.0.7-1",
    "ticket": null,
    "issues": [
      "CVE-2017-15094",
      "CVE-2017-15093",
      "CVE-2017-15092",
      "CVE-2017-15090"
    ],
    "advisories": [
      "ASA-201711-31"
    ]
  },
  {
    "name": "AVG-517",
    "packages": [
      "jbig2dec"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.13-1",
    "fixed": "0.14-1",
    "ticket": "56405",
    "issues": [
      "CVE-2017-9216"
    ],
    "advisories": [
      "ASA-201711-28"
    ]
  },
  {
    "name": "AVG-516",
    "packages": [
      "ffmpeg"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1:3.4-5",
    "fixed": "1:3.4.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-16840"
    ],
    "advisories": []
  },
  {
    "name": "AVG-502",
    "packages": [
      "varnish"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.1.3-1",
    "fixed": "5.2.1-1",
    "ticket": "56376",
    "issues": [
      "CVE-2017-8807"
    ],
    "advisories": [
      "ASA-201711-29"
    ]
  },
  {
    "name": "AVG-499",
    "packages": [
      "imagemagick"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "6.9.9.10-1",
    "fixed": "6.9.9.11-1",
    "ticket": null,
    "issues": [
      "CVE-2017-14505"
    ],
    "advisories": []
  },
  {
    "name": "AVG-497",
    "packages": [
      "imagemagick"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "6.9.9.3-1",
    "fixed": "6.9.9.7-1",
    "ticket": null,
    "issues": [
      "CVE-2017-13134"
    ],
    "advisories": []
  },
  {
    "name": "AVG-496",
    "packages": [
      "git-annex"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary command execution",
    "affected": "6.20170925-1",
    "fixed": "6.20171003-1",
    "ticket": null,
    "issues": [
      "CVE-2017-12976"
    ],
    "advisories": []
  },
  {
    "name": "AVG-489",
    "packages": [
      "konversation"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.7.2-1",
    "fixed": "1.7.3-1",
    "ticket": null,
    "issues": [
      "CVE-2017-15923"
    ],
    "advisories": [
      "ASA-201711-19"
    ]
  },
  {
    "name": "AVG-486",
    "packages": [
      "postgresql-old-upgrade"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "9.6.5-1",
    "fixed": "9.6.6-1",
    "ticket": null,
    "issues": [
      "CVE-2017-15099",
      "CVE-2017-15098"
    ],
    "advisories": [
      "ASA-201711-18"
    ]
  },
  {
    "name": "AVG-485",
    "packages": [
      "postgresql"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "10.0-1",
    "fixed": "10.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-15099",
      "CVE-2017-15098"
    ],
    "advisories": [
      "ASA-201711-17"
    ]
  },
  {
    "name": "AVG-478",
    "packages": [
      "lib32-openssl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1:1.1.0.f-1",
    "fixed": "1:1.1.0.g-1",
    "ticket": null,
    "issues": [
      "CVE-2017-3736",
      "CVE-2017-3735"
    ],
    "advisories": [
      "ASA-201711-15"
    ]
  },
  {
    "name": "AVG-477",
    "packages": [
      "openssl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.1.0.f-2",
    "fixed": "1.1.0.g-1",
    "ticket": null,
    "issues": [
      "CVE-2017-3736",
      "CVE-2017-3735"
    ],
    "advisories": [
      "ASA-201711-14"
    ]
  },
  {
    "name": "AVG-475",
    "packages": [
      "bchunk"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.2.0-4",
    "fixed": "1.2.2-4",
    "ticket": null,
    "issues": [
      "CVE-2017-15955",
      "CVE-2017-15954",
      "CVE-2017-15953"
    ],
    "advisories": [
      "ASA-201803-24"
    ]
  },
  {
    "name": "AVG-469",
    "packages": [
      "apr"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.6.2-1",
    "fixed": "1.6.3-1",
    "ticket": null,
    "issues": [
      "CVE-2017-12613"
    ],
    "advisories": [
      "ASA-201710-32"
    ]
  },
  {
    "name": "AVG-467",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "7.56.0-1",
    "fixed": "7.56.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000257"
    ],
    "advisories": [
      "ASA-201711-6"
    ]
  },
  {
    "name": "AVG-466",
    "packages": [
      "lib32-curl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "7.56.0-1",
    "fixed": "7.56.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000257"
    ],
    "advisories": [
      "ASA-201711-7"
    ]
  },
  {
    "name": "AVG-465",
    "packages": [
      "lib32-libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "7.56.0-1",
    "fixed": "7.56.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000257"
    ],
    "advisories": [
      "ASA-201711-8"
    ]
  },
  {
    "name": "AVG-464",
    "packages": [
      "lib32-libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "7.56.0-1",
    "fixed": "7.56.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000257"
    ],
    "advisories": [
      "ASA-201711-9"
    ]
  },
  {
    "name": "AVG-463",
    "packages": [
      "libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "7.56.0-1",
    "fixed": "7.56.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000257"
    ],
    "advisories": [
      "ASA-201711-10"
    ]
  },
  {
    "name": "AVG-462",
    "packages": [
      "libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "7.56.0-1",
    "fixed": "7.56.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000257"
    ],
    "advisories": [
      "ASA-201711-11"
    ]
  },
  {
    "name": "AVG-440",
    "packages": [
      "wireshark-cli"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.4.1-1",
    "fixed": "2.4.2-1",
    "ticket": null,
    "issues": [
      "CVE-2017-15193",
      "CVE-2017-15192",
      "CVE-2017-15191",
      "CVE-2017-15190",
      "CVE-2017-15189"
    ],
    "advisories": [
      "ASA-201710-14"
    ]
  },
  {
    "name": "AVG-437",
    "packages": [
      "lame"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "3.99.5-3",
    "fixed": "3.99.5-4",
    "ticket": "55889",
    "issues": [
      "CVE-2017-15018"
    ],
    "advisories": [
      "ASA-201710-11"
    ]
  },
  {
    "name": "AVG-436",
    "packages": [
      "lib32-krb5"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.15.1-1",
    "fixed": "1.15.2-1",
    "ticket": null,
    "issues": [
      "CVE-2017-11368"
    ],
    "advisories": []
  },
  {
    "name": "AVG-432",
    "packages": [
      "xorg-server"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.19.3-3",
    "fixed": "1.19.4-1",
    "ticket": null,
    "issues": [
      "CVE-2017-13723",
      "CVE-2017-13721"
    ],
    "advisories": [
      "ASA-201710-10"
    ]
  },
  {
    "name": "AVG-431",
    "packages": [
      "linux-lts"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "4.9.55-1",
    "fixed": "4.9.56-1",
    "ticket": null,
    "issues": [
      "CVE-2017-14954"
    ],
    "advisories": []
  },
  {
    "name": "AVG-430",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "4.13.4.a-1",
    "fixed": "4.13.5.a-1",
    "ticket": null,
    "issues": [
      "CVE-2017-14954"
    ],
    "advisories": []
  },
  {
    "name": "AVG-429",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "4.13.4-1",
    "fixed": "4.13.5-1",
    "ticket": null,
    "issues": [
      "CVE-2017-14954"
    ],
    "advisories": []
  },
  {
    "name": "AVG-428",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "4.13.4-1",
    "fixed": "4.13.5-1",
    "ticket": null,
    "issues": [
      "CVE-2017-14954"
    ],
    "advisories": []
  },
  {
    "name": "AVG-420",
    "packages": [
      "openvpn"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "2.4.3-3",
    "fixed": "2.4.4-1",
    "ticket": null,
    "issues": [
      "CVE-2017-12166"
    ],
    "advisories": [
      "ASA-201709-21"
    ]
  },
  {
    "name": "AVG-416",
    "packages": [
      "botan"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "2.2.0-1",
    "fixed": "2.3.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-14737"
    ],
    "advisories": [
      "ASA-201710-17"
    ]
  },
  {
    "name": "AVG-413",
    "packages": [
      "libplist"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.12-1",
    "fixed": "2.0.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7982"
    ],
    "advisories": []
  },
  {
    "name": "AVG-412",
    "packages": [
      "weechat"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.9-2",
    "fixed": "1.9.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-14727"
    ],
    "advisories": [
      "ASA-201709-20"
    ]
  },
  {
    "name": "AVG-403",
    "packages": [
      "lib32-libgcrypt"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "private key recovery",
    "affected": "1.8.0-1",
    "fixed": "1.8.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-0379"
    ],
    "advisories": [
      "ASA-201709-14"
    ]
  },
  {
    "name": "AVG-402",
    "packages": [
      "libgcrypt"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "private key recovery",
    "affected": "1.8.0-1",
    "fixed": "1.8.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-0379"
    ],
    "advisories": [
      "ASA-201709-13"
    ]
  },
  {
    "name": "AVG-400",
    "packages": [
      "ffmpeg"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1:3.3.3-2",
    "fixed": "1:3.3.4-1",
    "ticket": null,
    "issues": [
      "CVE-2017-14225",
      "CVE-2017-14223",
      "CVE-2017-14222",
      "CVE-2017-14171",
      "CVE-2017-14170",
      "CVE-2017-14169",
      "CVE-2017-14059",
      "CVE-2017-14058",
      "CVE-2017-14057",
      "CVE-2017-14056",
      "CVE-2017-14055",
      "CVE-2017-14054"
    ],
    "advisories": [
      "ASA-201709-10"
    ]
  },
  {
    "name": "AVG-397",
    "packages": [
      "tcpdump"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "4.9.1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2017-11545",
      "CVE-2017-11544"
    ],
    "advisories": []
  },
  {
    "name": "AVG-389",
    "packages": [
      "libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.54.1-1",
    "fixed": "7.56.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000254",
      "CVE-2017-1000100",
      "CVE-2017-1000099"
    ],
    "advisories": [
      "ASA-201710-7"
    ]
  },
  {
    "name": "AVG-388",
    "packages": [
      "lib32-libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.54.1-1",
    "fixed": "7.56.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000254",
      "CVE-2017-1000100",
      "CVE-2017-1000099"
    ],
    "advisories": [
      "ASA-201710-6"
    ]
  },
  {
    "name": "AVG-387",
    "packages": [
      "libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.54.1-1",
    "fixed": "7.56.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000254",
      "CVE-2017-1000100",
      "CVE-2017-1000099"
    ],
    "advisories": [
      "ASA-201710-5"
    ]
  },
  {
    "name": "AVG-386",
    "packages": [
      "lib32-libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.54.1-1",
    "fixed": "7.56.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000254",
      "CVE-2017-1000100",
      "CVE-2017-1000099"
    ],
    "advisories": [
      "ASA-201710-4"
    ]
  },
  {
    "name": "AVG-371",
    "packages": [
      "lib32-curl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.54.1-2",
    "fixed": "7.56.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000254",
      "CVE-2017-1000100",
      "CVE-2017-1000099"
    ],
    "advisories": [
      "ASA-201710-3"
    ]
  },
  {
    "name": "AVG-370",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "7.54.1-2",
    "fixed": "7.55-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000101",
      "CVE-2017-1000100",
      "CVE-2017-1000099"
    ],
    "advisories": [
      "ASA-201708-16"
    ]
  },
  {
    "name": "AVG-365",
    "packages": [
      "cacti"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site scripting",
    "affected": "1.1.13-1",
    "fixed": "1.1.14-1",
    "ticket": null,
    "issues": [
      "CVE-2017-11691"
    ],
    "advisories": [
      "ASA-201707-30"
    ]
  },
  {
    "name": "AVG-364",
    "packages": [
      "libjpeg-turbo"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.5.1-1",
    "fixed": "1.5.2-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9614"
    ],
    "advisories": []
  },
  {
    "name": "AVG-360",
    "packages": [
      "exiv2"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.26-2",
    "fixed": "0.27.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-11592",
      "CVE-2017-11591",
      "CVE-2017-11553"
    ],
    "advisories": []
  },
  {
    "name": "AVG-358",
    "packages": [
      "openldap"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.4.44-5",
    "fixed": "2.4.45-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9287"
    ],
    "advisories": []
  },
  {
    "name": "AVG-353",
    "packages": [
      "mosquitto"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.4.12-1",
    "fixed": "1.4.14-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9868"
    ],
    "advisories": [
      "ASA-201707-16"
    ]
  },
  {
    "name": "AVG-337",
    "packages": [
      "systemd"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "232-8",
    "fixed": "233-7",
    "ticket": null,
    "issues": [
      "CVE-2017-9217"
    ],
    "advisories": [
      "ASA-201707-5"
    ]
  },
  {
    "name": "AVG-336",
    "packages": [
      "tor"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "session hijacking",
    "affected": "0.3.0.8-3",
    "fixed": "0.3.0.9-1",
    "ticket": null,
    "issues": [
      "CVE-2017-0377"
    ],
    "advisories": [
      "ASA-201707-8"
    ]
  },
  {
    "name": "AVG-331",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "4.11.7-1",
    "fixed": "4.13-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9986",
      "CVE-2017-9985",
      "CVE-2017-9984"
    ],
    "advisories": []
  },
  {
    "name": "AVG-327",
    "packages": [
      "miniupnpc"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.0-1",
    "fixed": "2.0.20170509-1",
    "ticket": null,
    "issues": [
      "CVE-2017-8798"
    ],
    "advisories": []
  },
  {
    "name": "AVG-323",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "4.11.6-3",
    "fixed": "4.12.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000379",
      "CVE-2017-1000365"
    ],
    "advisories": []
  },
  {
    "name": "AVG-322",
    "packages": [
      "rabbitmq"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "3.6.8-1",
    "fixed": "3.6.9-1",
    "ticket": null,
    "issues": [
      "CVE-2017-4967",
      "CVE-2017-4966",
      "CVE-2017-4965"
    ],
    "advisories": []
  },
  {
    "name": "AVG-321",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "4.11.6.d-1",
    "fixed": "4.15.15.a-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000365"
    ],
    "advisories": []
  },
  {
    "name": "AVG-320",
    "packages": [
      "linux-hardened"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "4.11.6.b-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2017-1000379",
      "CVE-2017-1000371",
      "CVE-2017-1000370"
    ],
    "advisories": []
  },
  {
    "name": "AVG-319",
    "packages": [
      "openvpn"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.4.2-1",
    "fixed": "2.4.3-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7522"
    ],
    "advisories": []
  },
  {
    "name": "AVG-315",
    "packages": [
      "c-ares"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "1.12.0-1",
    "fixed": "1.13.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000381"
    ],
    "advisories": [
      "ASA-201707-21"
    ]
  },
  {
    "name": "AVG-312",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "4.9.38-1",
    "fixed": "4.9.39-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000371",
      "CVE-2017-1000370"
    ],
    "advisories": []
  },
  {
    "name": "AVG-311",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "4.11.6-3",
    "fixed": "4.14-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000379",
      "CVE-2017-1000365"
    ],
    "advisories": []
  },
  {
    "name": "AVG-306",
    "packages": [
      "expat"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.2.0-1",
    "fixed": "2.2.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9233",
      "CVE-2016-9063"
    ],
    "advisories": [
      "ASA-201706-32"
    ]
  },
  {
    "name": "AVG-305",
    "packages": [
      "lib32-expat"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.2.0-1",
    "fixed": "2.2.2-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9233",
      "CVE-2016-9063"
    ],
    "advisories": [
      "ASA-201707-27"
    ]
  },
  {
    "name": "AVG-301",
    "packages": [
      "bind"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "9.11.1-1",
    "fixed": "9.11.1.P1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-3140"
    ],
    "advisories": [
      "ASA-201706-18"
    ]
  },
  {
    "name": "AVG-300",
    "packages": [
      "messagelib"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "17.04.1-1",
    "fixed": "17.04.2-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9604"
    ],
    "advisories": [
      "ASA-201706-17"
    ]
  },
  {
    "name": "AVG-299",
    "packages": [
      "kmail"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "17.04.1-1",
    "fixed": "17.04.2-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9604"
    ],
    "advisories": [
      "ASA-201706-16"
    ]
  },
  {
    "name": "AVG-296",
    "packages": [
      "tor"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.3.0.7-1",
    "fixed": "0.3.0.8-1",
    "ticket": "54439",
    "issues": [
      "CVE-2017-0376",
      "CVE-2017-0375"
    ],
    "advisories": [
      "ASA-201706-13"
    ]
  },
  {
    "name": "AVG-295",
    "packages": [
      "lib32-gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "3.4.15-1",
    "fixed": "3.5.13-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7507"
    ],
    "advisories": [
      "ASA-201707-6"
    ]
  },
  {
    "name": "AVG-294",
    "packages": [
      "gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "3.5.12-1",
    "fixed": "3.5.13-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7507"
    ],
    "advisories": [
      "ASA-201706-12"
    ]
  },
  {
    "name": "AVG-293",
    "packages": [
      "irssi"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.0.2-2",
    "fixed": "1.0.3-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9469",
      "CVE-2017-9468"
    ],
    "advisories": [
      "ASA-201706-11"
    ]
  },
  {
    "name": "AVG-292",
    "packages": [
      "libnl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "3.2.29-2",
    "fixed": "3.3.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-0553"
    ],
    "advisories": [
      "ASA-201706-35"
    ]
  },
  {
    "name": "AVG-288",
    "packages": [
      "crypto++"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "5.6.5-3",
    "fixed": "6.0.0-2",
    "ticket": null,
    "issues": [
      "CVE-2017-9434"
    ],
    "advisories": []
  },
  {
    "name": "AVG-282",
    "packages": [
      "sudo"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "1.8.20-1",
    "fixed": "1.8.20.p1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000367"
    ],
    "advisories": [
      "ASA-201705-25"
    ]
  },
  {
    "name": "AVG-274",
    "packages": [
      "pcmanfm"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "1.2.5-1",
    "fixed": "1.2.5-2",
    "ticket": null,
    "issues": [
      "CVE-2017-8934"
    ],
    "advisories": [
      "ASA-201706-26"
    ]
  },
  {
    "name": "AVG-273",
    "packages": [
      "zziplib"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.13.66-1",
    "fixed": "0.13.67-1",
    "ticket": "53133",
    "issues": [
      "CVE-2017-5978",
      "CVE-2017-5977"
    ],
    "advisories": [
      "ASA-201801-17"
    ]
  },
  {
    "name": "AVG-272",
    "packages": [
      "postgresql"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "9.6.2-1",
    "fixed": "9.6.3-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7486",
      "CVE-2017-7484"
    ],
    "advisories": [
      "ASA-201705-23"
    ]
  },
  {
    "name": "AVG-264",
    "packages": [
      "lxterminal"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "0.3.0-1",
    "fixed": "0.3.0-2",
    "ticket": null,
    "issues": [
      "CVE-2016-10369"
    ],
    "advisories": [
      "ASA-201706-25"
    ]
  },
  {
    "name": "AVG-263",
    "packages": [
      "lib32-libtirpc"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.0.1-1",
    "fixed": "1.0.1-2",
    "ticket": "53928",
    "issues": [
      "CVE-2017-8779"
    ],
    "advisories": [
      "ASA-201705-6"
    ]
  },
  {
    "name": "AVG-262",
    "packages": [
      "libtirpc"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.0.1-2",
    "fixed": "1.0.1-3",
    "ticket": "53928",
    "issues": [
      "CVE-2017-8779"
    ],
    "advisories": [
      "ASA-201705-5"
    ]
  },
  {
    "name": "AVG-261",
    "packages": [
      "rpcbind"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.2.4-2",
    "fixed": "0.2.4-3",
    "ticket": "53927",
    "issues": [
      "CVE-2017-8779"
    ],
    "advisories": [
      "ASA-201705-4"
    ]
  },
  {
    "name": "AVG-259",
    "packages": [
      "mediawiki"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site scripting",
    "affected": "1.28.1-1",
    "fixed": "1.28.2-1",
    "ticket": null,
    "issues": [
      "CVE-2017-0372"
    ],
    "advisories": []
  },
  {
    "name": "AVG-254",
    "packages": [
      "fop"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "xml external entity injection",
    "affected": "2.1-1",
    "fixed": "2.2-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5661"
    ],
    "advisories": [
      "ASA-201705-19"
    ]
  },
  {
    "name": "AVG-243",
    "packages": [
      "lib32-curl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "certificate verification bypass",
    "affected": "7.53.1-1",
    "fixed": "7.54.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7468"
    ],
    "advisories": []
  },
  {
    "name": "AVG-241",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "certificate verification bypass",
    "affected": "7.53.1-2",
    "fixed": "7.54.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7468"
    ],
    "advisories": [
      "ASA-201704-12"
    ]
  },
  {
    "name": "AVG-238",
    "packages": [
      "dovecot"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.2.28-3",
    "fixed": "2.2.29.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-2669"
    ],
    "advisories": [
      "ASA-201705-1"
    ]
  },
  {
    "name": "AVG-237",
    "packages": [
      "libtiff"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "4.0.7-2",
    "fixed": "4.0.7-3",
    "ticket": null,
    "issues": [
      "CVE-2017-7602",
      "CVE-2017-7601",
      "CVE-2017-7600",
      "CVE-2017-7599",
      "CVE-2017-7598",
      "CVE-2017-7597",
      "CVE-2017-7596",
      "CVE-2017-7595",
      "CVE-2017-7594",
      "CVE-2017-7593",
      "CVE-2017-7592"
    ],
    "advisories": [
      "ASA-201704-10"
    ]
  },
  {
    "name": "AVG-233",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.10.3-2",
    "fixed": "1.11-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7234",
      "CVE-2017-7233"
    ],
    "advisories": [
      "ASA-201704-2"
    ]
  },
  {
    "name": "AVG-230",
    "packages": [
      "linux-lts"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "4.9.18-1",
    "fixed": "4.9.20-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7184"
    ],
    "advisories": []
  },
  {
    "name": "AVG-229",
    "packages": [
      "linux-zen"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "4.10.6-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2017-7184"
    ],
    "advisories": []
  },
  {
    "name": "AVG-228",
    "packages": [
      "linux"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "4.10.6-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2017-7184"
    ],
    "advisories": []
  },
  {
    "name": "AVG-225",
    "packages": [
      "wireshark-cli"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.2.3-1",
    "fixed": "2.2.4-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5596"
    ],
    "advisories": []
  },
  {
    "name": "AVG-223",
    "packages": [
      "pcre2"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "10.23-1",
    "fixed": "10.30-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7186"
    ],
    "advisories": [
      "ASA-201710-18"
    ]
  },
  {
    "name": "AVG-222",
    "packages": [
      "pcre"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "8.40-1",
    "fixed": "8.41-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7246",
      "CVE-2017-7245",
      "CVE-2017-7244",
      "CVE-2017-7186"
    ],
    "advisories": [
      "ASA-201707-20"
    ]
  },
  {
    "name": "AVG-220",
    "packages": [
      "mupdf"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.9_a-5",
    "fixed": "1.10-1",
    "ticket": null,
    "issues": [
      "CVE-2016-10247",
      "CVE-2016-10246"
    ],
    "advisories": []
  },
  {
    "name": "AVG-217",
    "packages": [
      "jasper"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.0.10-1",
    "fixed": "2.0.12-1",
    "ticket": null,
    "issues": [
      "CVE-2017-6851"
    ],
    "advisories": []
  },
  {
    "name": "AVG-213",
    "packages": [
      "virglrenderer"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.5.0-1",
    "fixed": "0.6.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-6386",
      "CVE-2017-5580",
      "CVE-2016-10163"
    ],
    "advisories": []
  },
  {
    "name": "AVG-202",
    "packages": [
      "wordpress"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "4.7.2-1",
    "fixed": "4.7.3-1",
    "ticket": null,
    "issues": [
      "CVE-2017-6819",
      "CVE-2017-6818",
      "CVE-2017-6817",
      "CVE-2017-6816",
      "CVE-2017-6815",
      "CVE-2017-6814"
    ],
    "advisories": [
      "ASA-201703-14"
    ]
  },
  {
    "name": "AVG-199",
    "packages": [
      "roundcubemail"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site scripting",
    "affected": "1.2.3-1",
    "fixed": "1.2.4-1",
    "ticket": null,
    "issues": [
      "CVE-2017-6820"
    ],
    "advisories": [
      "ASA-201703-10"
    ]
  },
  {
    "name": "AVG-184",
    "packages": [
      "lib32-libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.52.1-2",
    "fixed": "7.53.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7468",
      "CVE-2017-2629"
    ],
    "advisories": []
  },
  {
    "name": "AVG-183",
    "packages": [
      "lib32-libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.52.1-2",
    "fixed": "7.53.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7468",
      "CVE-2017-2629"
    ],
    "advisories": []
  },
  {
    "name": "AVG-181",
    "packages": [
      "libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.52.1-1",
    "fixed": "7.53.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7468",
      "CVE-2017-2629"
    ],
    "advisories": []
  },
  {
    "name": "AVG-180",
    "packages": [
      "libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.52.1-1",
    "fixed": "7.53.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7468",
      "CVE-2017-2629"
    ],
    "advisories": []
  },
  {
    "name": "AVG-175",
    "packages": [
      "diffoscope"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary file overwrite",
    "affected": "67-1",
    "fixed": "77-1",
    "ticket": null,
    "issues": [
      "CVE-2017-0359"
    ],
    "advisories": [
      "ASA-201702-14"
    ]
  },
  {
    "name": "AVG-174",
    "packages": [
      "vim",
      "gvim"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "8.0.0321-1",
    "fixed": "8.0.0322-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5953"
    ],
    "advisories": [
      "ASA-201702-12",
      "ASA-201702-13"
    ]
  },
  {
    "name": "AVG-155",
    "packages": [
      "lib32-openssl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1:1.0.2.j-1",
    "fixed": "1:1.0.2.k-1",
    "ticket": null,
    "issues": [
      "CVE-2017-3732",
      "CVE-2017-3731",
      "CVE-2016-7055"
    ],
    "advisories": [
      "ASA-201701-36"
    ]
  },
  {
    "name": "AVG-154",
    "packages": [
      "openssl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "1.0.2.j-1",
    "fixed": "1.0.2.k-1",
    "ticket": null,
    "issues": [
      "CVE-2017-3732",
      "CVE-2017-3731",
      "CVE-2016-7055"
    ],
    "advisories": [
      "ASA-201701-37"
    ]
  },
  {
    "name": "AVG-153",
    "packages": [
      "exim"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "4.87-1",
    "fixed": "4.88-1",
    "ticket": "52221",
    "issues": [
      "CVE-2016-9963"
    ],
    "advisories": []
  },
  {
    "name": "AVG-151",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "4.9.4-1",
    "fixed": "4.9.5-1",
    "ticket": null,
    "issues": [
      "CVE-2017-2583"
    ],
    "advisories": [
      "ASA-201701-38"
    ]
  },
  {
    "name": "AVG-150",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "4.4.43-1",
    "fixed": "4.4.44-1",
    "ticket": null,
    "issues": [
      "CVE-2017-2583"
    ],
    "advisories": [
      "ASA-201701-35"
    ]
  },
  {
    "name": "AVG-149",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "4.9.4-1",
    "fixed": "4.9.5-1",
    "ticket": null,
    "issues": [
      "CVE-2017-2583"
    ],
    "advisories": [
      "ASA-201701-32"
    ]
  },
  {
    "name": "AVG-148",
    "packages": [
      "powerdns-recursor"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "4.0.3-7",
    "fixed": "4.0.4-1",
    "ticket": null,
    "issues": [
      "CVE-2016-7074",
      "CVE-2016-7073",
      "CVE-2016-7068"
    ],
    "advisories": [
      "ASA-201701-30"
    ]
  },
  {
    "name": "AVG-147",
    "packages": [
      "powerdns"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "4.0.1-7",
    "fixed": "4.0.2-1",
    "ticket": null,
    "issues": [
      "CVE-2016-7074",
      "CVE-2016-7073",
      "CVE-2016-7072",
      "CVE-2016-7068",
      "CVE-2016-2120"
    ],
    "advisories": [
      "ASA-201701-29"
    ]
  },
  {
    "name": "AVG-141",
    "packages": [
      "lib32-openssl"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "private key recovery",
    "affected": "1.0.2.j-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2016-7056"
    ],
    "advisories": []
  },
  {
    "name": "AVG-140",
    "packages": [
      "openssl"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "private key recovery",
    "affected": "1.0.2.j-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2016-7056"
    ],
    "advisories": []
  },
  {
    "name": "AVG-126",
    "packages": [
      "pcsclite"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "privilege escalation",
    "affected": "1.8.18-1",
    "fixed": "1.8.20-1",
    "ticket": null,
    "issues": [
      "CVE-2016-10109"
    ],
    "advisories": [
      "ASA-201701-12"
    ]
  },
  {
    "name": "AVG-117",
    "packages": [
      "lib32-libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.51.0-1",
    "fixed": "7.52.1-1",
    "ticket": "52247",
    "issues": [
      "CVE-2016-9594",
      "CVE-2016-9586"
    ],
    "advisories": [
      "ASA-201701-11"
    ]
  },
  {
    "name": "AVG-116",
    "packages": [
      "lib32-libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.51.0-1",
    "fixed": "7.52.1-1",
    "ticket": "52247",
    "issues": [
      "CVE-2016-9594",
      "CVE-2016-9586"
    ],
    "advisories": [
      "ASA-201701-10"
    ]
  },
  {
    "name": "AVG-115",
    "packages": [
      "lib32-curl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.51.0-1",
    "fixed": "7.52.1-1",
    "ticket": "52247",
    "issues": [
      "CVE-2016-9594",
      "CVE-2016-9586"
    ],
    "advisories": [
      "ASA-201701-9"
    ]
  },
  {
    "name": "AVG-114",
    "packages": [
      "libcurl-gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.51.0-1",
    "fixed": "7.52.1-1",
    "ticket": "52247",
    "issues": [
      "CVE-2016-9594",
      "CVE-2016-9586"
    ],
    "advisories": [
      "ASA-201701-8"
    ]
  },
  {
    "name": "AVG-113",
    "packages": [
      "libcurl-compat"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.51.0-1",
    "fixed": "7.52.1-1",
    "ticket": "52247",
    "issues": [
      "CVE-2016-9594",
      "CVE-2016-9586"
    ],
    "advisories": [
      "ASA-201701-7"
    ]
  },
  {
    "name": "AVG-112",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.51.0-1",
    "fixed": "7.52.1-1",
    "ticket": "52247",
    "issues": [
      "CVE-2016-9594",
      "CVE-2016-9586"
    ],
    "advisories": [
      "ASA-201612-22"
    ]
  },
  {
    "name": "AVG-110",
    "packages": [
      "openssh"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "7.3p1-2",
    "fixed": "7.4p1-1",
    "ticket": null,
    "issues": [
      "CVE-2016-10012",
      "CVE-2016-10011",
      "CVE-2016-10010",
      "CVE-2016-10009"
    ],
    "advisories": [
      "ASA-201612-20"
    ]
  },
  {
    "name": "AVG-94",
    "packages": [
      "dovecot"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "0.0-1",
    "fixed": "2.2.27-1",
    "ticket": null,
    "issues": [
      "CVE-2016-8652"
    ],
    "advisories": []
  },
  {
    "name": "AVG-92",
    "packages": [
      "libraw"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "incorrect calculation",
    "affected": "0.16.1-1",
    "fixed": "0.17.1-1",
    "ticket": null,
    "issues": [
      "CVE-2015-8367",
      "CVE-2015-8366"
    ],
    "advisories": []
  },
  {
    "name": "AVG-77",
    "packages": [
      "slock"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "1.3-1",
    "fixed": "1.4-2",
    "ticket": null,
    "issues": [
      "CVE-2016-6866"
    ],
    "advisories": [
      "ASA-201611-21"
    ]
  },
  {
    "name": "AVG-75",
    "packages": [
      "drupal"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "open redirect",
    "affected": "7.51-1",
    "fixed": "7.52-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9451"
    ],
    "advisories": []
  },
  {
    "name": "AVG-74",
    "packages": [
      "drupal"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "8.2.2-1",
    "fixed": "8.2.3-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9452",
      "CVE-2016-9450",
      "CVE-2016-9449"
    ],
    "advisories": [
      "ASA-201611-20"
    ]
  },
  {
    "name": "AVG-71",
    "packages": [
      "cryptsetup"
    ],
    "status": "Not affected",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "1.7.3-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2016-4484"
    ],
    "advisories": []
  },
  {
    "name": "AVG-70",
    "packages": [
      "shutter"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary code execution",
    "affected": "0.93.1-2",
    "fixed": "0.93.1-3",
    "ticket": "50735",
    "issues": [
      "CVE-2015-0854"
    ],
    "advisories": [
      "ASA-201611-13"
    ]
  },
  {
    "name": "AVG-64",
    "packages": [
      "tar"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "arbitrary file overwrite",
    "affected": "1.29-1",
    "fixed": "1.29-2",
    "ticket": "51563",
    "issues": [
      "CVE-2016-6321"
    ],
    "advisories": [
      "ASA-201611-11"
    ]
  },
  {
    "name": "AVG-44",
    "packages": [
      "messagelib"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "multiple issues",
    "affected": "16.08.1-1",
    "fixed": "16.08.1-2",
    "ticket": null,
    "issues": [
      "CVE-2016-7968",
      "CVE-2016-7967"
    ],
    "advisories": [
      "ASA-201610-5"
    ]
  },
  {
    "name": "AVG-43",
    "packages": [
      "kcoreaddons"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "insufficient validation",
    "affected": "5.26.0-1",
    "fixed": "5.26.0-2",
    "ticket": null,
    "issues": [
      "CVE-2016-7966"
    ],
    "advisories": [
      "ASA-201610-4"
    ]
  },
  {
    "name": "AVG-35",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "cross-site request forgery",
    "affected": "1.9.9-1",
    "fixed": "1.10.1-1",
    "ticket": null,
    "issues": [
      "CVE-2016-7401"
    ],
    "advisories": [
      "ASA-201610-13"
    ]
  },
  {
    "name": "AVG-34",
    "packages": [
      "lib32-openssl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1:1.0.2.i-1",
    "fixed": "1:1.0.2.j-1",
    "ticket": null,
    "issues": [
      "CVE-2016-7052"
    ],
    "advisories": [
      "ASA-201609-28"
    ]
  },
  {
    "name": "AVG-33",
    "packages": [
      "openssl"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "1.0.2.i-1",
    "fixed": "1.0.2.j-1",
    "ticket": null,
    "issues": [
      "CVE-2016-7052"
    ],
    "advisories": [
      "ASA-201609-30"
    ]
  },
  {
    "name": "AVG-26",
    "packages": [
      "gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "certificate verification bypass",
    "affected": "3.4.14-1",
    "fixed": "3.4.15-1",
    "ticket": null,
    "issues": [
      "CVE-2016-7444"
    ],
    "advisories": [
      "ASA-201609-25"
    ]
  },
  {
    "name": "AVG-19",
    "packages": [
      "jansson"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.7-1",
    "fixed": "2.8-1",
    "ticket": null,
    "issues": [
      "CVE-2016-4425"
    ],
    "advisories": [
      "ASA-201609-15"
    ]
  },
  {
    "name": "AVG-18",
    "packages": [
      "crypto++"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "5.6.4-2",
    "fixed": "5.6.5-1",
    "ticket": "51331",
    "issues": [
      "CVE-2016-7420"
    ],
    "advisories": [
      "ASA-201610-8"
    ]
  },
  {
    "name": "AVG-17",
    "packages": [
      "lib32-gnutls"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "certificate verification bypass",
    "affected": "3.4.14-1",
    "fixed": "3.4.15-1",
    "ticket": null,
    "issues": [
      "CVE-2016-7444"
    ],
    "advisories": [
      "ASA-201609-26"
    ]
  },
  {
    "name": "AVG-3",
    "packages": [
      "wireshark-cli"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.0.5-1",
    "fixed": "2.2.0-2",
    "ticket": null,
    "issues": [
      "CVE-2016-7180",
      "CVE-2016-7179",
      "CVE-2016-7178",
      "CVE-2016-7177",
      "CVE-2016-7176",
      "CVE-2016-7175"
    ],
    "advisories": [
      "ASA-201609-27"
    ]
  },
  {
    "name": "AVG-7",
    "packages": [
      "libusbmuxd"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "1.0.10-1",
    "fixed": "1.0.10-2",
    "ticket": null,
    "issues": [
      "CVE-2016-5104"
    ],
    "advisories": [
      "ASA-201706-5"
    ]
  },
  {
    "name": "AVG-8",
    "packages": [
      "libimobiledevice"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "access restriction bypass",
    "affected": "1.2.0-3",
    "fixed": "1.2.0-4",
    "ticket": null,
    "issues": [
      "CVE-2016-5104"
    ],
    "advisories": [
      "ASA-201701-34"
    ]
  },
  {
    "name": "AVG-12",
    "packages": [
      "lib32-jansson"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "denial of service",
    "affected": "2.7-2",
    "fixed": "2.8-1",
    "ticket": null,
    "issues": [
      "CVE-2016-4425"
    ],
    "advisories": [
      "ASA-201609-17"
    ]
  },
  {
    "name": "AVG-13",
    "packages": [
      "ocaml"
    ],
    "status": "Fixed",
    "severity": "Medium",
    "type": "information disclosure",
    "affected": "4.02.3-2",
    "fixed": "4.03.0-1",
    "ticket": null,
    "issues": [
      "CVE-2015-8869"
    ],
    "advisories": [
      "ASA-201610-17"
    ]
  },
  {
    "name": "AVG-2894",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "content spoofing",
    "affected": "5.1.9-1",
    "fixed": "5.1.11-1",
    "ticket": null,
    "issues": [
      "CVE-2025-48432"
    ],
    "advisories": [
      "ASA-202506-6"
    ]
  },
  {
    "name": "AVG-2892",
    "packages": [
      "samba"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "access restriction bypass",
    "affected": "4.22.1-1",
    "fixed": "4.22.2-1",
    "ticket": null,
    "issues": [
      "CVE-2025-0620"
    ],
    "advisories": [
      "ASA-202506-3"
    ]
  },
  {
    "name": "AVG-2895",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "8.14.0-2",
    "fixed": "8.14.1-1",
    "ticket": null,
    "issues": [
      "CVE-2025-5399"
    ],
    "advisories": [
      "ASA-202506-2"
    ]
  },
  {
    "name": "AVG-2883",
    "packages": [
      "ghostscript"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "information disclosure",
    "affected": "10.05.0-3",
    "fixed": "10.05.1-2",
    "ticket": null,
    "issues": [
      "CVE-2025-48708"
    ],
    "advisories": [
      "ASA-202505-15"
    ]
  },
  {
    "name": "AVG-2878",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "directory traversal",
    "affected": "2:1.24.2-1",
    "fixed": "2:1.24.3-1",
    "ticket": null,
    "issues": [
      "CVE-2025-22873"
    ],
    "advisories": [
      "ASA-202505-12"
    ]
  },
  {
    "name": "AVG-2544",
    "packages": [
      "speex"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.2.0-3",
    "fixed": "1.2.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-23903"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1742",
    "packages": [
      "avahi"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "0.8+22+gfd482a7-3",
    "fixed": "1:0.8+r127+g55d783d-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3468"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2104",
    "packages": [
      "imagemagick"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "denial of service",
    "affected": "7.1.0.17-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-34183"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2655",
    "packages": [
      "powerdns"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "4.6.0-1",
    "fixed": "4.6.1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-27227"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2656",
    "packages": [
      "powerdns-recursor"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "4.6.0-3",
    "fixed": "4.6.1-1",
    "ticket": null,
    "issues": [
      "CVE-2022-27227"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2707",
    "packages": [
      "runc"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "incorrect calculation",
    "affected": "1.1.1-1",
    "fixed": "1.1.2-1",
    "ticket": null,
    "issues": [
      "CVE-2022-29162"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2605",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "access restriction bypass",
    "affected": "3.2.9-3",
    "fixed": "3.2.10-1",
    "ticket": null,
    "issues": [
      "CVE-2021-44420"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2572",
    "packages": [
      "vim",
      "gvim"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "arbitrary code execution",
    "affected": "8.2.3582-3",
    "fixed": "8.2.3741-1",
    "ticket": null,
    "issues": [
      "CVE-2021-4069",
      "CVE-2021-4019",
      "CVE-2021-3984",
      "CVE-2021-3974",
      "CVE-2021-3973",
      "CVE-2021-3968"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2535",
    "packages": [
      "lua"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.4.3-1",
    "fixed": "5.4.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43519"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2002",
    "packages": [
      "binutils"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "arbitrary code execution",
    "affected": "2.36.1-3",
    "fixed": "2.37-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3549"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1965",
    "packages": [
      "python-flask-security-too"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "open redirect",
    "affected": "4.0.1-4",
    "fixed": "4.1.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32618"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2392",
    "packages": [
      "openssh"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "information disclosure",
    "affected": "8.8p1-1",
    "fixed": "8.9p1-1",
    "ticket": null,
    "issues": [
      "CVE-2016-20012"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2547",
    "packages": [
      "postgresql",
      "postgresql-libs"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "man-in-the-middle",
    "affected": "13.4-6",
    "fixed": "13.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-23222"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2583",
    "packages": [
      "radare2"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.4.2-1",
    "fixed": "5.5.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-4021"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2274",
    "packages": [
      "ksmtp"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "silent downgrade",
    "affected": "21.08.3-1",
    "fixed": "21.12.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-38373"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2319",
    "packages": [
      "lib32-sqlite"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "3.36.0-1",
    "fixed": "3.37.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-36690"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2599",
    "packages": [
      "runc"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "arbitrary code execution",
    "affected": "1.0.2-2",
    "fixed": "1.0.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43784"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2642",
    "packages": [
      "dotnet-runtime"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "privilege escalation",
    "affected": "6.0.0.sdk100-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-43877"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2566",
    "packages": [
      "php"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "insufficient validation",
    "affected": "8.0.12-2",
    "fixed": "8.0.13-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21707"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2564",
    "packages": [
      "wireshark-cli"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "3.4.9-1",
    "fixed": "3.4.10-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39929",
      "CVE-2021-39928",
      "CVE-2021-39926",
      "CVE-2021-39925",
      "CVE-2021-39924",
      "CVE-2021-39922",
      "CVE-2021-39921",
      "CVE-2021-39920"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2318",
    "packages": [
      "sqlite"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "3.36.0-1",
    "fixed": "3.37.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-36690"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2523",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.14.16.zen1-1",
    "fixed": "5.15.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-4023",
      "CVE-2021-3759"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2522",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.14.16.arch1-1",
    "fixed": "5.15.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-4023",
      "CVE-2021-3759"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2472",
    "packages": [
      "vim",
      "gvim"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "arbitrary code execution",
    "affected": "8.2.3441-1",
    "fixed": "8.2.3582-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3928",
      "CVE-2021-3927",
      "CVE-2021-3903",
      "CVE-2021-3875",
      "CVE-2021-3872"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2521",
    "packages": [
      "htmldoc"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.9.12-1",
    "fixed": "1.9.13-1",
    "ticket": null,
    "issues": [
      "CVE-2021-40985"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2527",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2:1.17.2-2",
    "fixed": "2:1.17.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41772",
      "CVE-2021-41771"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2558",
    "packages": [
      "gmp"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "denial of service",
    "affected": "6.2.1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-43618"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2551",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.10.70-1",
    "fixed": "5.10.71-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3764",
      "CVE-2021-3744"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2550",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.14.9.hardened1-1",
    "fixed": "5.14.11.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3764",
      "CVE-2021-3744"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2549",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.14.9.zen2-1",
    "fixed": "5.14.10.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3764",
      "CVE-2021-3744"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2548",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.14.9.arch2-1",
    "fixed": "5.14.10.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3764",
      "CVE-2021-3744"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2495",
    "packages": [
      "nextcloud-app-mail"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "information disclosure",
    "affected": "1.10.1-1",
    "fixed": "1.10.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39220"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2509",
    "packages": [
      "kodi"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "19.2-3",
    "fixed": "19.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-42917"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2265",
    "packages": [
      "exiv2"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "0.27.4-2",
    "fixed": "0.27.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37623",
      "CVE-2021-37622",
      "CVE-2021-37621",
      "CVE-2021-37620",
      "CVE-2021-37619",
      "CVE-2021-37618",
      "CVE-2021-37616",
      "CVE-2021-37615",
      "CVE-2021-34335",
      "CVE-2021-34334",
      "CVE-2021-32815"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2533",
    "packages": [
      "ffmpeg"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1:4.2.3-5",
    "fixed": "1:4.3-1",
    "ticket": null,
    "issues": [
      "CVE-2020-20448"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2135",
    "packages": [
      "tcl"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "arbitrary code execution",
    "affected": "8.6.11-1",
    "fixed": "8.6.12-1",
    "ticket": null,
    "issues": [
      "CVE-2021-35331"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2501",
    "packages": [
      "linux"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.14.14.arch1-1",
    "fixed": "5.14.15.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-43056"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2494",
    "packages": [
      "exiv2"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "denial of service",
    "affected": "0.27.5-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-18898",
      "CVE-2020-18774",
      "CVE-2020-18773"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2248",
    "packages": [
      "hivex"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.3.20-6",
    "fixed": "1.3.21-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3622"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2451",
    "packages": [
      "nomad"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.1.5-1",
    "fixed": "1.1.6-1",
    "ticket": null,
    "issues": [
      "CVE-2021-41865"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2423",
    "packages": [
      "python-nltk"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "3.6.3-1",
    "fixed": "3.6.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3828"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2418",
    "packages": [
      "samba"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "4.14.7-2",
    "fixed": "4.15.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3671"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2416",
    "packages": [
      "mattermost"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "cross-site scripting",
    "affected": "5.38.2-1",
    "fixed": "5.39.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-37860"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2366",
    "packages": [
      "python-pillow"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "8.3.1-1",
    "fixed": "8.3.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-23437"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2370",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2:1.17-2",
    "fixed": "2:1.17.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39293"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2173",
    "packages": [
      "krb5"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.19.1-1",
    "fixed": "1.19.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-36222"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2245",
    "packages": [
      "radare2"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.3.1-1",
    "fixed": "5.4.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3673"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2305",
    "packages": [
      "zint"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "information disclosure",
    "affected": "2.9.1-2",
    "fixed": "2.10.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-39247"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2341",
    "packages": [
      "avahi"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "0.8+20+gd1e71b3-1",
    "fixed": "0.8+22+gfd482a7-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3502"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1824",
    "packages": [
      "libexif"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "denial of service",
    "affected": "0.6.22-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-27815"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2231",
    "packages": [
      "bluez"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "information disclosure",
    "affected": "5.60-1",
    "fixed": "5.61-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3658"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2252",
    "packages": [
      "traefik"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "privilege escalation",
    "affected": "2.4.8-1",
    "fixed": "2.4.13-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32813"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2259",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2:1.16.6-1",
    "fixed": "2:1.16.7-1",
    "ticket": null,
    "issues": [
      "CVE-2021-36221"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2230",
    "packages": [
      "libvirt"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1:7.5.0-1",
    "fixed": "1:7.6.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3667"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2293",
    "packages": [
      "glibc"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2.33-5",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-38604"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2238",
    "packages": [
      "fetchmail"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "6.4.19-1",
    "fixed": "6.4.21-1",
    "ticket": null,
    "issues": [
      "CVE-2021-36386"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2170",
    "packages": [
      "telegram-desktop"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "content spoofing",
    "affected": "2.8.4-3",
    "fixed": "2.8.11-1",
    "ticket": null,
    "issues": [
      "CVE-2021-36769"
    ],
    "advisories": [
      "ASA-202107-45"
    ]
  },
  {
    "name": "AVG-2151",
    "packages": [
      "ant"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.10.10-1",
    "fixed": "1.10.11-1",
    "ticket": null,
    "issues": [
      "CVE-2021-36374",
      "CVE-2021-36373"
    ],
    "advisories": [
      "ASA-202107-43"
    ]
  },
  {
    "name": "AVG-2143",
    "packages": [
      "putty"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "content spoofing",
    "affected": "0.75-1",
    "fixed": "0.76-1",
    "ticket": null,
    "issues": [
      "CVE-2021-36367"
    ],
    "advisories": [
      "ASA-202107-37"
    ]
  },
  {
    "name": "AVG-2147",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2:1.16.5-1",
    "fixed": "2:1.16.6-1",
    "ticket": null,
    "issues": [
      "CVE-2021-34558"
    ],
    "advisories": [
      "ASA-202107-42"
    ]
  },
  {
    "name": "AVG-2145",
    "packages": [
      "nextcloud-app-mail"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "information disclosure",
    "affected": "1.9.5-2",
    "fixed": "1.10.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32707"
    ],
    "advisories": [
      "ASA-202107-41"
    ]
  },
  {
    "name": "AVG-2160",
    "packages": [
      "wireshark-cli"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "3.4.6-1",
    "fixed": "3.4.7-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22235"
    ],
    "advisories": [
      "ASA-202107-44"
    ]
  },
  {
    "name": "AVG-2109",
    "packages": [
      "rabbitmq"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "cross-site scripting",
    "affected": "3.8.16-1",
    "fixed": "3.8.19-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32719",
      "CVE-2021-32718"
    ],
    "advisories": [
      "ASA-202107-17"
    ]
  },
  {
    "name": "AVG-1935",
    "packages": [
      "systemd"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "248.3-2",
    "fixed": "249-2",
    "ticket": null,
    "issues": [
      "CVE-2020-13529"
    ],
    "advisories": [
      "ASA-202107-29"
    ]
  },
  {
    "name": "AVG-1986",
    "packages": [
      "tpm2-tools"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "man-in-the-middle",
    "affected": "5.1-1",
    "fixed": "5.1.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3565"
    ],
    "advisories": [
      "ASA-202106-55"
    ]
  },
  {
    "name": "AVG-1772",
    "packages": [
      "exiv2"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "multiple issues",
    "affected": "0.27.3-1",
    "fixed": "0.27.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3482",
      "CVE-2021-32617",
      "CVE-2021-29623",
      "CVE-2021-29473",
      "CVE-2021-29470",
      "CVE-2021-29464",
      "CVE-2021-29463",
      "CVE-2021-29458",
      "CVE-2021-29457"
    ],
    "advisories": [
      "ASA-202106-54"
    ]
  },
  {
    "name": "AVG-2077",
    "packages": [
      "libolm"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "3.2.2-1",
    "fixed": "3.2.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-34813"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1950",
    "packages": [
      "radare2"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.2.1-1",
    "fixed": "5.3.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-32613"
    ],
    "advisories": [
      "ASA-202106-40"
    ]
  },
  {
    "name": "AVG-1784",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.11.22.hardened1-1",
    "fixed": "5.12.6.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30178"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2037",
    "packages": [
      "wireshark-cli"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "3.4.5-1",
    "fixed": "3.4.6-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22222"
    ],
    "advisories": [
      "ASA-202106-30"
    ]
  },
  {
    "name": "AVG-1260",
    "packages": [
      "packagekit"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "information disclosure",
    "affected": "1.1.13-1",
    "fixed": "1.2.3-1",
    "ticket": null,
    "issues": [
      "CVE-2020-16121"
    ],
    "advisories": [
      "ASA-202106-18"
    ]
  },
  {
    "name": "AVG-2016",
    "packages": [
      "curl"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "incorrect calculation",
    "affected": "7.76.1-1",
    "fixed": "7.77.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22897"
    ],
    "advisories": []
  },
  {
    "name": "AVG-2005",
    "packages": [
      "ffmpeg"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2:4.4-3",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-22028",
      "CVE-2020-22026",
      "CVE-2020-22024"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1994",
    "packages": [
      "keycloak"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "incorrect calculation",
    "affected": "13.0.0-1",
    "fixed": "13.0.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3461"
    ],
    "advisories": [
      "ASA-202106-19"
    ]
  },
  {
    "name": "AVG-1964",
    "packages": [
      "thunderbird"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "multiple issues",
    "affected": "78.10.1-1",
    "fixed": "78.10.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-29957",
      "CVE-2021-29956"
    ],
    "advisories": [
      "ASA-202105-29"
    ]
  },
  {
    "name": "AVG-1978",
    "packages": [
      "putty"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "denial of service",
    "affected": "0.74-1",
    "fixed": "0.75-1",
    "ticket": null,
    "issues": [
      "CVE-2021-33500"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1889",
    "packages": [
      "lz4"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1:1.9.3-1",
    "fixed": "1:1.9.3-2",
    "ticket": "70970",
    "issues": [
      "CVE-2021-3520"
    ],
    "advisories": [
      "ASA-202105-27"
    ]
  },
  {
    "name": "AVG-1927",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2:1.16.3-1",
    "fixed": "2:1.16.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-31525"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1907",
    "packages": [
      "hivex"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.3.19-4",
    "fixed": "1.3.20-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3504"
    ],
    "advisories": [
      "ASA-202105-28"
    ]
  },
  {
    "name": "AVG-1785",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.11.16.zen1-1",
    "fixed": "5.12.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30178"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1783",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.11.16.arch1-1",
    "fixed": "5.12.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-30178"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1970",
    "packages": [
      "kube-apiserver"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "insufficient validation",
    "affected": "1.21.0-1",
    "fixed": "1.21.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-25737"
    ],
    "advisories": [
      "ASA-202106-29"
    ]
  },
  {
    "name": "AVG-1910",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "directory traversal",
    "affected": "3.2-1",
    "fixed": "3.2.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-31542"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1897",
    "packages": [
      "messagelib"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "information disclosure",
    "affected": "21.04.0-1",
    "fixed": "21.04.0-2",
    "ticket": null,
    "issues": [
      "CVE-2021-31855"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1864",
    "packages": [
      "wireshark-cli"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "3.4.4-1",
    "fixed": "3.4.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22207"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1787",
    "packages": [
      "clamav"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "0.103.1-1",
    "fixed": "0.103.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-1405",
      "CVE-2021-1404",
      "CVE-2021-1252"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1759",
    "packages": [
      "networkmanager"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.30.2-1",
    "fixed": "1.30.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20297"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1833",
    "packages": [
      "jasper"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2.0.27-1",
    "fixed": "2.0.28-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3443"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1591",
    "packages": [
      "traefik"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "insufficient validation",
    "affected": "2.4.2-1",
    "fixed": "2.4.8-1",
    "ticket": null,
    "issues": [
      "CVE-2021-27375"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1776",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "directory traversal",
    "affected": "3.1.7-1",
    "fixed": "3.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28658"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1692",
    "packages": [
      "jasper"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2.0.25-1",
    "fixed": "2.0.27-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3467"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1623",
    "packages": [
      "python-aiohttp"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "open redirect",
    "affected": "3.7.3-1",
    "fixed": "3.7.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21330"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1569",
    "packages": [
      "openldap"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2.4.57-1",
    "fixed": "2.4.58-1",
    "ticket": null,
    "issues": [
      "CVE-2021-27212"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1662",
    "packages": [
      "python-pygments"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2.7.3-1",
    "fixed": "2.7.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-27291",
      "CVE-2021-20270"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1637",
    "packages": [
      "python-markdown2"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2.3.10-1",
    "fixed": "2.4.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-26813"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1680",
    "packages": [
      "glib2"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "arbitrary file upload",
    "affected": "2.66.7-1",
    "fixed": "2.68.0-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28153"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1699",
    "packages": [
      "tor"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "0.4.5.6-1",
    "fixed": "0.4.5.7-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28090",
      "CVE-2021-28089"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1672",
    "packages": [
      "discover"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "arbitrary code execution",
    "affected": "5.21.2-1",
    "fixed": "5.21.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-28117"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1746",
    "packages": [
      "openexr"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2.5.3-6",
    "fixed": "2.5.4-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3479",
      "CVE-2021-3478",
      "CVE-2021-3477",
      "CVE-2021-3476",
      "CVE-2021-3475",
      "CVE-2021-3474",
      "CVE-2021-20296"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1668",
    "packages": [
      "go"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2:1.16-1",
    "fixed": "2:1.16.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-27919",
      "CVE-2021-27918"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1707",
    "packages": [
      "busybox"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.32.1-3",
    "fixed": "1.32.1-4",
    "ticket": "70075",
    "issues": [
      "CVE-2021-28831"
    ],
    "advisories": [
      "ASA-202103-12"
    ]
  },
  {
    "name": "AVG-1646",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.11.2.zen1-1",
    "fixed": "5.11.3.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-25639"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1644",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.11.2.arch1-1",
    "fixed": "5.11.3.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-25639"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1708",
    "packages": [
      "mkinitcpio-busybox"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.32.1-2",
    "fixed": "1.32.1-3",
    "ticket": "70075",
    "issues": [
      "CVE-2021-28831"
    ],
    "advisories": [
      "ASA-202103-11"
    ]
  },
  {
    "name": "AVG-1647",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.10.19-1",
    "fixed": "5.10.20-1",
    "ticket": null,
    "issues": [
      "CVE-2020-25639"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1674",
    "packages": [
      "gnutls"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "arbitrary code execution",
    "affected": "3.7.0-1",
    "fixed": "3.7.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20232",
      "CVE-2021-20231"
    ],
    "advisories": [
      "ASA-202103-1"
    ]
  },
  {
    "name": "AVG-1671",
    "packages": [
      "libjpeg-turbo"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2.0.6-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-20205"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1665",
    "packages": [
      "git"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "arbitrary code execution",
    "affected": "2.30.1-1",
    "fixed": "2.30.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21300"
    ],
    "advisories": [
      "ASA-202103-3"
    ]
  },
  {
    "name": "AVG-1652",
    "packages": [
      "linux"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.11.3.arch1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-28039"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1612",
    "packages": [
      "linux"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "arbitrary code execution",
    "affected": "5.11.arch2-1",
    "fixed": "5.11.1.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-26934"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1605",
    "packages": [
      "nodejs"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "incorrect calculation",
    "affected": "15.9.0-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2021-23840"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1462",
    "packages": [
      "tar"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.33-1",
    "fixed": "1.34-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20193"
    ],
    "advisories": [
      "ASA-202102-41"
    ]
  },
  {
    "name": "AVG-1469",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "directory traversal",
    "affected": "5.4.91-1",
    "fixed": "5.4.92-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3178"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1468",
    "packages": [
      "linux-zen"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "directory traversal",
    "affected": "5.10.9.zen1-1",
    "fixed": "5.10.10.zen1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3178"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1467",
    "packages": [
      "linux-hardened"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "directory traversal",
    "affected": "5.10.9.a-1",
    "fixed": "5.10.10.hardened1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3178"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1466",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "directory traversal",
    "affected": "5.10.9.arch1-1",
    "fixed": "5.10.10.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3178"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1539",
    "packages": [
      "helm"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "insufficient validation",
    "affected": "3.5.1-1",
    "fixed": "3.5.2-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21303"
    ],
    "advisories": [
      "ASA-202102-22"
    ]
  },
  {
    "name": "AVG-1320",
    "packages": [
      "glibc",
      "lib32-glibc"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2.32-5",
    "fixed": "2.33-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3326",
      "CVE-2020-29562",
      "CVE-2020-27618",
      "CVE-2019-25013"
    ],
    "advisories": [
      "ASA-202102-17",
      "ASA-202102-16"
    ]
  },
  {
    "name": "AVG-1524",
    "packages": [
      "privoxy"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "3.0.30-1",
    "fixed": "3.0.31-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20217",
      "CVE-2021-20216"
    ],
    "advisories": [
      "ASA-202102-21"
    ]
  },
  {
    "name": "AVG-1523",
    "packages": [
      "python-jinja"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2.11.2-4",
    "fixed": "2.11.3-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28493"
    ],
    "advisories": [
      "ASA-202102-19"
    ]
  },
  {
    "name": "AVG-1518",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "directory traversal",
    "affected": "3.1.5-1",
    "fixed": "3.1.6-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3281"
    ],
    "advisories": [
      "ASA-202102-18"
    ]
  },
  {
    "name": "AVG-1510",
    "packages": [
      "wireshark-cli"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "3.4.2-1",
    "fixed": "3.4.3-1",
    "ticket": null,
    "issues": [
      "CVE-2021-22174",
      "CVE-2021-22173"
    ],
    "advisories": [
      "ASA-202102-3"
    ]
  },
  {
    "name": "AVG-1490",
    "packages": [
      "imagemagick"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "incorrect calculation",
    "affected": "7.0.10.56-1",
    "fixed": "7.0.10.57-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20189"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1476",
    "packages": [
      "mutt"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2.0.4-1",
    "fixed": "2.0.5-1",
    "ticket": null,
    "issues": [
      "CVE-2021-3181"
    ],
    "advisories": [
      "ASA-202101-43"
    ]
  },
  {
    "name": "AVG-1472",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.9.1.arch1-1",
    "fixed": "5.9.2.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-27675",
      "CVE-2020-27673"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1383",
    "packages": [
      "gobby"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1:0.5.0+112+gd16519e-1",
    "fixed": "1:0.5.0+116+g295e697-1",
    "ticket": "69118",
    "issues": [
      "CVE-2020-35450"
    ],
    "advisories": [
      "ASA-202101-26"
    ]
  },
  {
    "name": "AVG-1338",
    "packages": [
      "python-py"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.9.0-3",
    "fixed": "1.10.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-29651"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1380",
    "packages": [
      "gdm"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "authentication bypass",
    "affected": "3.38.2-1",
    "fixed": "3.38.2.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-27837"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1429",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.4.80-2",
    "fixed": "5.4.81-1",
    "ticket": null,
    "issues": [
      "CVE-2021-20177"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1412",
    "packages": [
      "python-cairosvg"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2.5.0-3",
    "fixed": "2.5.1-1",
    "ticket": null,
    "issues": [
      "CVE-2021-21236"
    ],
    "advisories": [
      "ASA-202101-12"
    ]
  },
  {
    "name": "AVG-1344",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.9.11.arch2-1",
    "fixed": "5.9.12.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-27835"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1227",
    "packages": [
      "lib32-libproxy"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "0.4.15-2",
    "fixed": "0.4.16-1",
    "ticket": null,
    "issues": [
      "CVE-2020-25219"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1153",
    "packages": [
      "python-pip"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "arbitrary code execution",
    "affected": "20.2.3-1",
    "fixed": "20.2.4-1",
    "ticket": null,
    "issues": [
      "CVE-2018-20225"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1366",
    "packages": [
      "thunderbird"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "arbitrary command execution",
    "affected": "78.5.1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2020-35112"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1364",
    "packages": [
      "firefox"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "arbitrary command execution",
    "affected": "83.0-2",
    "fixed": "84.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-35112"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1327",
    "packages": [
      "nsd"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "4.3.3-1",
    "fixed": "4.3.4-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28935"
    ],
    "advisories": [
      "ASA-202012-18"
    ]
  },
  {
    "name": "AVG-1326",
    "packages": [
      "unbound"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.12.0-1",
    "fixed": "1.13.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28935"
    ],
    "advisories": [
      "ASA-202012-17"
    ]
  },
  {
    "name": "AVG-1226",
    "packages": [
      "libproxy"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "0.4.15+33+g454a499-2",
    "fixed": "0.4.16-1",
    "ticket": null,
    "issues": [
      "CVE-2020-25219"
    ],
    "advisories": [
      "ASA-202012-10"
    ]
  },
  {
    "name": "AVG-1258",
    "packages": [
      "wireshark-cli"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "3.2.7-1",
    "fixed": "3.4.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-28030"
    ],
    "advisories": [
      "ASA-202011-13"
    ]
  },
  {
    "name": "AVG-1211",
    "packages": [
      "xorg-server"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "information disclosure",
    "affected": "1.20.8-2",
    "fixed": "1.20.8-3",
    "ticket": null,
    "issues": [
      "CVE-2020-14347"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1198",
    "packages": [
      "wireshark-cli"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "3.2.4-1",
    "fixed": "3.2.5-1",
    "ticket": null,
    "issues": [
      "CVE-2020-15466"
    ],
    "advisories": [
      "ASA-202007-2"
    ]
  },
  {
    "name": "AVG-1199",
    "packages": [
      "powerdns-recursor"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "access restriction bypass",
    "affected": "4.3.1-1",
    "fixed": "4.3.2-1",
    "ticket": null,
    "issues": [
      "CVE-2020-14196"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1183",
    "packages": [
      "dbus"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.12.16-5",
    "fixed": "1.12.18-1",
    "ticket": null,
    "issues": [
      "CVE-2020-12049"
    ],
    "advisories": [
      "ASA-202006-9"
    ]
  },
  {
    "name": "AVG-1157",
    "packages": [
      "openconnect"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "arbitrary code execution",
    "affected": "1:8.05-1",
    "fixed": "1:8.10-1",
    "ticket": null,
    "issues": [
      "CVE-2020-12823"
    ],
    "advisories": [
      "ASA-202005-11"
    ]
  },
  {
    "name": "AVG-1156",
    "packages": [
      "kio-extras"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "insufficient validation",
    "affected": "19.12.3-1",
    "fixed": "20.04.0-1",
    "ticket": null,
    "issues": [
      "CVE-2020-12755"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1152",
    "packages": [
      "qutebrowser"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "certificate verification bypass",
    "affected": "1.11.0-1",
    "fixed": "1.11.1-1",
    "ticket": null,
    "issues": [
      "CVE-2020-11054"
    ],
    "advisories": [
      "ASA-202005-5"
    ]
  },
  {
    "name": "AVG-1151",
    "packages": [
      "ntp"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "4.2.8.p13-2",
    "fixed": "4.2.8.p14-1",
    "ticket": null,
    "issues": [
      "CVE-2018-8956"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1126",
    "packages": [
      "apache"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "multiple issues",
    "affected": "2.4.41-1",
    "fixed": "2.4.43-1",
    "ticket": null,
    "issues": [
      "CVE-2020-1934",
      "CVE-2020-1927"
    ],
    "advisories": [
      "ASA-202004-14"
    ]
  },
  {
    "name": "AVG-1113",
    "packages": [
      "okular"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "arbitrary command execution",
    "affected": "19.12.3-2",
    "fixed": "19.12.3-3",
    "ticket": null,
    "issues": [
      "CVE-2020-9359"
    ],
    "advisories": [
      "ASA-202003-10"
    ]
  },
  {
    "name": "AVG-1070",
    "packages": [
      "python-django"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "privilege escalation",
    "affected": "2.2.6-2",
    "fixed": "2.2.9-1",
    "ticket": null,
    "issues": [
      "CVE-2019-19118"
    ],
    "advisories": []
  },
  {
    "name": "AVG-1060",
    "packages": [
      "jasper"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2.0.14-1",
    "fixed": "2.0.16-1",
    "ticket": "57987",
    "issues": [
      "CVE-2018-9055"
    ],
    "advisories": []
  },
  {
    "name": "AVG-943",
    "packages": [
      "gnupg"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "insufficient validation",
    "affected": "2.2.5-1",
    "fixed": "2.2.5-2",
    "ticket": null,
    "issues": [
      "CVE-2018-9234"
    ],
    "advisories": []
  },
  {
    "name": "AVG-920",
    "packages": [
      "lib32-openssl"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "information disclosure",
    "affected": "1:1.1.1.b-1",
    "fixed": "1:1.1.1.c-1",
    "ticket": null,
    "issues": [
      "CVE-2019-1543"
    ],
    "advisories": [
      "ASA-201906-6"
    ]
  },
  {
    "name": "AVG-919",
    "packages": [
      "openssl"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "information disclosure",
    "affected": "1.1.1.b-1",
    "fixed": "1.1.1.c-1",
    "ticket": null,
    "issues": [
      "CVE-2019-1543"
    ],
    "advisories": [
      "ASA-201906-7"
    ]
  },
  {
    "name": "AVG-894",
    "packages": [
      "python-rdflib"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "arbitrary code execution",
    "affected": "4.2.2-2",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2019-7653"
    ],
    "advisories": []
  },
  {
    "name": "AVG-869",
    "packages": [
      "poppler"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "0.73.0-1",
    "fixed": "0.74.0-1",
    "ticket": null,
    "issues": [
      "CVE-2019-7310"
    ],
    "advisories": []
  },
  {
    "name": "AVG-868",
    "packages": [
      "libpng"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.6.36-1",
    "fixed": "1.6.37-1",
    "ticket": null,
    "issues": [
      "CVE-2019-7317"
    ],
    "advisories": [
      "ASA-201904-10"
    ]
  },
  {
    "name": "AVG-847",
    "packages": [
      "irssi"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.1.1-2",
    "fixed": "1.1.2-1",
    "ticket": null,
    "issues": [
      "CVE-2019-5882"
    ],
    "advisories": [
      "ASA-201901-8"
    ]
  },
  {
    "name": "AVG-841",
    "packages": [
      "tar"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.30-2",
    "fixed": "1.31-1",
    "ticket": null,
    "issues": [
      "CVE-2018-20482"
    ],
    "advisories": [
      "ASA-201901-1"
    ]
  },
  {
    "name": "AVG-801",
    "packages": [
      "linux-lts"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "4.14.74-1",
    "fixed": "4.14.75-1",
    "ticket": null,
    "issues": [
      "CVE-2018-18445"
    ],
    "advisories": [
      "ASA-201811-2"
    ]
  },
  {
    "name": "AVG-793",
    "packages": [
      "lib32-openssl"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "private key recovery",
    "affected": "1:1.1.1-1",
    "fixed": "1:1.1.1.a-1",
    "ticket": null,
    "issues": [
      "CVE-2018-0735",
      "CVE-2018-0734"
    ],
    "advisories": [
      "ASA-201812-6"
    ]
  },
  {
    "name": "AVG-792",
    "packages": [
      "openssl"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "private key recovery",
    "affected": "1.1.1-1",
    "fixed": "1.1.1.a-1",
    "ticket": null,
    "issues": [
      "CVE-2018-0735",
      "CVE-2018-0734"
    ],
    "advisories": [
      "ASA-201812-5"
    ]
  },
  {
    "name": "AVG-784",
    "packages": [
      "linux"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "4.18.12.arch1-1",
    "fixed": "4.18.13.arch1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-18445"
    ],
    "advisories": [
      "ASA-201811-1"
    ]
  },
  {
    "name": "AVG-764",
    "packages": [
      "zsh"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "insufficient validation",
    "affected": "5.5.1-2",
    "fixed": "5.6-1",
    "ticket": null,
    "issues": [
      "CVE-2018-13259",
      "CVE-2018-0502"
    ],
    "advisories": [
      "ASA-201809-3"
    ]
  },
  {
    "name": "AVG-722",
    "packages": [
      "perl-email-address"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.909-1",
    "fixed": "1.912-1",
    "ticket": null,
    "issues": [
      "CVE-2018-12558"
    ],
    "advisories": [
      "ASA-201905-7"
    ]
  },
  {
    "name": "AVG-710",
    "packages": [
      "strongswan"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.6.2-1",
    "fixed": "5.6.2-2",
    "ticket": "58719",
    "issues": [
      "CVE-2018-5388"
    ],
    "advisories": [
      "ASA-201805-26"
    ]
  },
  {
    "name": "AVG-675",
    "packages": [
      "lib32-openssl"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "multiple issues",
    "affected": "1:1.1.0.h-1",
    "fixed": "1:1.1.0.i-1",
    "ticket": null,
    "issues": [
      "CVE-2018-0737",
      "CVE-2018-0732"
    ],
    "advisories": []
  },
  {
    "name": "AVG-674",
    "packages": [
      "openssl"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "multiple issues",
    "affected": "1.1.0.h-1",
    "fixed": "1.1.0.i-1",
    "ticket": null,
    "issues": [
      "CVE-2018-0737",
      "CVE-2018-0732"
    ],
    "advisories": []
  },
  {
    "name": "AVG-652",
    "packages": [
      "zsh"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.4.2-1",
    "fixed": "5.5-1",
    "ticket": null,
    "issues": [
      "CVE-2018-1071"
    ],
    "advisories": []
  },
  {
    "name": "AVG-640",
    "packages": [
      "xpdf"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "4.00-2",
    "fixed": "4.01.01-1",
    "ticket": "57528",
    "issues": [
      "CVE-2018-7455",
      "CVE-2018-7454",
      "CVE-2018-7453",
      "CVE-2018-7452",
      "CVE-2018-7175",
      "CVE-2018-7174",
      "CVE-2018-7173"
    ],
    "advisories": []
  },
  {
    "name": "AVG-637",
    "packages": [
      "emacs-nox"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "information disclosure",
    "affected": "26.1-1",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2017-1000383"
    ],
    "advisories": []
  },
  {
    "name": "AVG-636",
    "packages": [
      "emacs"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "information disclosure",
    "affected": "26.1-3",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2017-1000383"
    ],
    "advisories": []
  },
  {
    "name": "AVG-618",
    "packages": [
      "patch"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2.7.5-1",
    "fixed": "2.7.6-1",
    "ticket": null,
    "issues": [
      "CVE-2016-10713"
    ],
    "advisories": []
  },
  {
    "name": "AVG-613",
    "packages": [
      "freetype2"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2.9-2",
    "fixed": "2.9.1-1",
    "ticket": null,
    "issues": [
      "CVE-2018-6942"
    ],
    "advisories": [
      "ASA-201805-3"
    ]
  },
  {
    "name": "AVG-610",
    "packages": [
      "sox"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "multiple issues",
    "affected": "14.4.2-1",
    "fixed": "14.4.2-3",
    "ticket": "57485",
    "issues": [
      "CVE-2017-18189",
      "CVE-2017-15642",
      "CVE-2017-15372",
      "CVE-2017-15371",
      "CVE-2017-15370",
      "CVE-2017-11359",
      "CVE-2017-11358",
      "CVE-2017-11332"
    ],
    "advisories": []
  },
  {
    "name": "AVG-519",
    "packages": [
      "powerdns"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "access restriction bypass",
    "affected": "4.0.4-4",
    "fixed": "4.0.5-1",
    "ticket": null,
    "issues": [
      "CVE-2017-15091"
    ],
    "advisories": [
      "ASA-201711-30"
    ]
  },
  {
    "name": "AVG-471",
    "packages": [
      "libextractor"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.5-1",
    "fixed": "1.6-1",
    "ticket": null,
    "issues": [
      "CVE-2017-15922"
    ],
    "advisories": [
      "ASA-201711-16"
    ]
  },
  {
    "name": "AVG-468",
    "packages": [
      "apr-util"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.6.0-1",
    "fixed": "1.6.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-12618"
    ],
    "advisories": [
      "ASA-201710-33"
    ]
  },
  {
    "name": "AVG-422",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "7.55.1-1",
    "fixed": "7.56.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-1000254"
    ],
    "advisories": [
      "ASA-201710-2"
    ]
  },
  {
    "name": "AVG-382",
    "packages": [
      "strongswan"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "5.5.3-3",
    "fixed": "5.5.3-4",
    "ticket": null,
    "issues": [
      "CVE-2017-11185"
    ],
    "advisories": [
      "ASA-201708-13"
    ]
  },
  {
    "name": "AVG-356",
    "packages": [
      "wireshark-cli"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2.2.7-1",
    "fixed": "2.2.8-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7702",
      "CVE-2017-11411",
      "CVE-2017-11410",
      "CVE-2017-11408",
      "CVE-2017-11407",
      "CVE-2017-11406"
    ],
    "advisories": [
      "ASA-201707-28"
    ]
  },
  {
    "name": "AVG-354",
    "packages": [
      "imagemagick"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "6.9.8.8-2",
    "fixed": "6.9.8.9-1",
    "ticket": null,
    "issues": [
      "CVE-2017-11352"
    ],
    "advisories": []
  },
  {
    "name": "AVG-351",
    "packages": [
      "pcre"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "8.42-2",
    "fixed": "8.43-1",
    "ticket": null,
    "issues": [
      "CVE-2017-11164"
    ],
    "advisories": [
      "ASA-201903-4"
    ]
  },
  {
    "name": "AVG-332",
    "packages": [
      "libdwarf"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "20170416-1",
    "fixed": "20170709-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9998"
    ],
    "advisories": [
      "ASA-201707-7"
    ]
  },
  {
    "name": "AVG-287",
    "packages": [
      "wireshark-cli"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2.2.6-1",
    "fixed": "2.2.7-1",
    "ticket": null,
    "issues": [
      "CVE-2017-9354",
      "CVE-2017-9353",
      "CVE-2017-9352",
      "CVE-2017-9351",
      "CVE-2017-9350",
      "CVE-2017-9349",
      "CVE-2017-9348",
      "CVE-2017-9347",
      "CVE-2017-9346",
      "CVE-2017-9345",
      "CVE-2017-9344",
      "CVE-2017-9343"
    ],
    "advisories": [
      "ASA-201706-9"
    ]
  },
  {
    "name": "AVG-277",
    "packages": [
      "cairo"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.14.10-1",
    "fixed": "1.15.8-1",
    "ticket": null,
    "issues": [
      "CVE-2017-7475"
    ],
    "advisories": []
  },
  {
    "name": "AVG-214",
    "packages": [
      "libevent"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "2.0.22-2",
    "fixed": "2.0.22-3",
    "ticket": null,
    "issues": [
      "CVE-2016-10197"
    ],
    "advisories": []
  },
  {
    "name": "AVG-210",
    "packages": [
      "imagemagick"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "denial of service",
    "affected": "6.9.2.0-1",
    "fixed": "6.9.2.4-1",
    "ticket": null,
    "issues": [
      "CVE-2016-10252"
    ],
    "advisories": []
  },
  {
    "name": "AVG-204",
    "packages": [
      "lxc"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "insufficient validation",
    "affected": "1:2.0.7-1",
    "fixed": "1:2.0.8-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5985"
    ],
    "advisories": [
      "ASA-201705-17"
    ]
  },
  {
    "name": "AVG-182",
    "packages": [
      "lib32-curl"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "insufficient validation",
    "affected": "7.52.1-1",
    "fixed": "7.53.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-2629"
    ],
    "advisories": []
  },
  {
    "name": "AVG-179",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "insufficient validation",
    "affected": "7.52.1-2",
    "fixed": "7.53.0-1",
    "ticket": null,
    "issues": [
      "CVE-2017-2629"
    ],
    "advisories": [
      "ASA-201703-1"
    ]
  },
  {
    "name": "AVG-167",
    "packages": [
      "gstreamer"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.10.2-1",
    "fixed": "1.10.3-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5838"
    ],
    "advisories": [
      "ASA-201702-7"
    ]
  },
  {
    "name": "AVG-166",
    "packages": [
      "gst-plugins-ugly"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.10.2-1",
    "fixed": "1.10.3-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5847",
      "CVE-2017-5846"
    ],
    "advisories": [
      "ASA-201702-6"
    ]
  },
  {
    "name": "AVG-163",
    "packages": [
      "gst-plugins-good"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.10.2-1",
    "fixed": "1.10.3-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5845",
      "CVE-2017-5841",
      "CVE-2017-5840",
      "CVE-2016-10199",
      "CVE-2016-10198"
    ],
    "advisories": [
      "ASA-201702-3"
    ]
  },
  {
    "name": "AVG-145",
    "packages": [
      "ed"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.14-1",
    "fixed": "1.14.1-1",
    "ticket": null,
    "issues": [
      "CVE-2017-5357"
    ],
    "advisories": [
      "ASA-201701-31"
    ]
  },
  {
    "name": "AVG-120",
    "packages": [
      "lib32-libpng"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.6.26-1",
    "fixed": "1.6.27-1",
    "ticket": null,
    "issues": [
      "CVE-2016-10087"
    ],
    "advisories": [
      "ASA-201701-5"
    ]
  },
  {
    "name": "AVG-119",
    "packages": [
      "libpng"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.6.26-2",
    "fixed": "1.6.27-1",
    "ticket": null,
    "issues": [
      "CVE-2016-10087"
    ],
    "advisories": [
      "ASA-201701-2"
    ]
  },
  {
    "name": "AVG-100",
    "packages": [
      "python-html5lib"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "cross-site scripting",
    "affected": "0.9999999-2",
    "fixed": "0.999999999-1",
    "ticket": null,
    "issues": [
      "CVE-2016-9910",
      "CVE-2016-9909"
    ],
    "advisories": [
      "ASA-201612-13"
    ]
  },
  {
    "name": "AVG-68",
    "packages": [
      "lib32-openssl"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "incorrect calculation",
    "affected": "1:1.0.2.j-1",
    "fixed": "1:1.0.2.k-1",
    "ticket": null,
    "issues": [
      "CVE-2016-7055"
    ],
    "advisories": []
  },
  {
    "name": "AVG-67",
    "packages": [
      "openssl"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "incorrect calculation",
    "affected": "1.0.2.j-1",
    "fixed": "1.0.2.k-1",
    "ticket": null,
    "issues": [
      "CVE-2016-7055"
    ],
    "advisories": []
  },
  {
    "name": "AVG-45",
    "packages": [
      "libgit2"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1:0.24.2-1",
    "fixed": "1:0.24.3-1",
    "ticket": null,
    "issues": [
      "CVE-2016-8569",
      "CVE-2016-8568"
    ],
    "advisories": [
      "ASA-201611-17"
    ]
  },
  {
    "name": "AVG-41",
    "packages": [
      "ffmpeg"
    ],
    "status": "Not affected",
    "severity": "Low",
    "type": "arbitrary code execution",
    "affected": "1:3.1.3-3",
    "fixed": null,
    "ticket": null,
    "issues": [
      "CVE-2016-7554"
    ],
    "advisories": []
  },
  {
    "name": "AVG-21",
    "packages": [
      "lib32-curl"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "7.50.2-1",
    "fixed": "7.50.3-1",
    "ticket": null,
    "issues": [
      "CVE-2016-7167"
    ],
    "advisories": [
      "ASA-201609-18"
    ]
  },
  {
    "name": "AVG-20",
    "packages": [
      "curl"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "7.50.2-1",
    "fixed": "7.50.3-1",
    "ticket": null,
    "issues": [
      "CVE-2016-7167"
    ],
    "advisories": [
      "ASA-201609-19"
    ]
  },
  {
    "name": "AVG-4",
    "packages": [
      "bzip2"
    ],
    "status": "Fixed",
    "severity": "Low",
    "type": "denial of service",
    "affected": "1.0.6-5",
    "fixed": "1.0.6-6",
    "ticket": null,
    "issues": [
      "CVE-2016-3189"
    ],
    "advisories": [
      "ASA-201702-19"
    ]
  }
]