Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs/.vuepress/components/ELSTechnology.vue
Original file line number Diff line number Diff line change
Expand Up @@ -1084,7 +1084,7 @@ const techData = [
},
{
name: "cryptography",
versions: "3.4.8 | 41.0.7 | 42.0.0 | 42.0.8 | 43.0.1 | 43.0.3",
versions: "3.4.8 | 41.0.7 | 42.0.0 | 42.0.8 | 43.0.1 | 43.0.3 | 44.0.3 | 45.0.7",
link: "./python-libraries/",
},
{
Expand Down
4 changes: 2 additions & 2 deletions docs/els-for-libraries/celery/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -96,7 +96,7 @@ Fixes for the following vulnerabilities are available in ELS for Celery from Tux

| CVE ID | Severity | Library | Vulnerable Versions | Safe Version |
| :------------: | :------: | :-----: | :-----------------: | :------------------: |
| CVE-2021-23727 | High | celery | 4.4.7 | 4.4.7.post1+tuxcare |
| CVE-2021-23727 | High | celery | 5.1.2 | 5.1.2.post1+tuxcare |
| CVE-2021-23727 | High | celery | < 5.2.2 | 4.4.7.post1+tuxcare |
| CVE-2021-23727 | High | celery | < 5.2.2 | 5.1.2.post1+tuxcare |

If you are interested in the TuxCare Endless Lifecycle Support, contact [sales@tuxcare.com](mailto:sales@tuxcare.com).
70 changes: 35 additions & 35 deletions docs/els-for-libraries/django/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -96,41 +96,41 @@ Fixes for the following vulnerabilities are available in ELS for Django from Tux

| CVE ID | Severity | Library | Vulnerable Versions | Safe Version |
| :------------: | :------: | :-----: | :-----------------: | :------------------: |
| CVE-2025-57833 | High | django | 3.2.25 | 3.2.25.post1+tuxcare |
| CVE-2025-64458 | High | django | 3.2.25 | 3.2.25.post2+tuxcare |
| CVE-2025-64459 | Critical | django | 3.2.25 | 3.2.25.post2+tuxcare |
| CVE-2025-48432 | Medium | django | 4.2 | 4.2.post1+tuxcare |
| CVE-2025-48432 | Medium | django | 5.1.9 | 5.1.9.post1+tuxcare |
| CVE-2025-27556 | High | django | 5.1 | 5.1.post2+tuxcare |
| CVE-2024-56374 | Medium | django | 5.1.4 | 5.1.4.post1+tuxcare |
| CVE-2024-53908 | N/A | django | 5.1 | 5.1.post3+tuxcare |
| CVE-2024-53907 | N/A | django | 5.1 | 5.1.post3+tuxcare |
| CVE-2024-45231 | N/A | django | 5.1 | 5.1.post2+tuxcare |
| CVE-2024-45230 | N/A | django | 5.1 | 5.1.post3+tuxcare |
| CVE-2024-42005 | High | django | 5.0 | 5.0.post5+tuxcare |
| CVE-2024-41991 | N/A | django | 5.0.1 | 5.0.1.post2+tuxcare |
| CVE-2024-41990 | High | django | 5.0 | 5.0.post5+tuxcare |
| CVE-2024-41989 | High | django | 5.0.1 | 5.0.1.post3+tuxcare |
| CVE-2024-39614 | N/A | django | 5.0 | 5.0.post2+tuxcare |
| CVE-2024-39330 | N/A | django | 5.0 | 5.0.post4+tuxcare |
| CVE-2024-39329 | N/A | django | 5.0.1 | 5.0.1.post2+tuxcare |
| CVE-2024-38875 | N/A | django | 5.0 | 5.0.post3+tuxcare |
| CVE-2024-27351 | Medium | django | 5.0.2 | 5.0.2.post1+tuxcare |
| CVE-2024-24680 | High | django | 5.0 | 5.0.post1+tuxcare |
| CVE-2024-24680 | High | django | 5.0.1 | 5.0.1.post1+tuxcare |
| CVE-2023-24580 | High | django | 4.0 | 4.0.post1+tuxcare |
| CVE-2023-23969 | High | django | 4.0 | 4.0.post1+tuxcare |
| CVE-2022-41323 | High | django | 4.0 | 4.0.post2+tuxcare |
| CVE-2022-41323 | High | django | 5.1 | 5.1.post1+tuxcare |
| CVE-2022-36359 | High | django | 4.0 | 4.0.post3+tuxcare |
| CVE-2022-34265 | Critical | django | 4.0 | 4.0.post3+tuxcare |
| CVE-2022-28347 | Critical | django | 4.0 | 4.0.post3+tuxcare |
| CVE-2022-28346 | Critical | django | 4.0 | 4.0.post4+tuxcare |
| CVE-2022-23833 | High | django | 4.0 | 4.0.post6+tuxcare |
| CVE-2022-22818 | Medium | django | 4.0 | 4.0.post5+tuxcare |
| CVE-2021-45452 | Medium | django | 4.0 | 4.0.post4+tuxcare |
| CVE-2021-45116 | High | django | 4.0 | 4.0.post2+tuxcare |
| CVE-2021-45115 | High | django | 4.0 | 4.0.post4+tuxcare |
| CVE-2025-57833 | High | django | >= 3.2, < 3.2.25 | 3.2.25.post1+tuxcare |
| CVE-2025-64458 | High | django | >= 3.2, < 3.2.26 | 3.2.25.post2+tuxcare |
| CVE-2025-64459 | Critical | django | >= 3.2, < 3.2.26 | 3.2.25.post2+tuxcare |
| CVE-2025-48432 | Medium | django | >= 4.2, < 4.2.23 | 4.2.post1+tuxcare |
| CVE-2025-48432 | Medium | django | >= 5.1, < 5.1.11 | 5.1.9.post1+tuxcare |
| CVE-2025-27556 | High | django | >= 5.1, < 5.1.8 | 5.1.post2+tuxcare |
| CVE-2024-56374 | Medium | django | >= 5.1, < 5.1.5 | 5.1.4.post1+tuxcare |
| CVE-2024-53908 | N/A | django | >= 5.1, < 5.1.4 | 5.1.post3+tuxcare |
| CVE-2024-53907 | N/A | django | >= 5.1, < 5.1.4 | 5.1.post3+tuxcare |
| CVE-2024-45231 | N/A | django | >= 5.1, < 5.1.1 | 5.1.post2+tuxcare |
| CVE-2024-45230 | N/A | django | >= 5.1, < 5.1.1 | 5.1.post3+tuxcare |
| CVE-2024-42005 | High | django | >= 5.0, < 5.0.8 | 5.0.post5+tuxcare |
| CVE-2024-41991 | N/A | django | >= 5.0, < 5.0.8 | 5.0.1.post2+tuxcare |
| CVE-2024-41990 | High | django | >= 5.0, < 5.0.8 | 5.0.post5+tuxcare |
| CVE-2024-41989 | High | django | >= 5.0, < 5.0.8 | 5.0.1.post3+tuxcare |
| CVE-2024-39614 | N/A | django | >= 5.0, < 5.0.7 | 5.0.post2+tuxcare |
| CVE-2024-39330 | N/A | django | >= 5.0, < 5.0.7 | 5.0.post4+tuxcare |
| CVE-2024-39329 | N/A | django | >= 5.0, < 5.0.7 | 5.0.1.post2+tuxcare |
| CVE-2024-38875 | N/A | django | >= 5.0, < 5.0.7 | 5.0.post3+tuxcare |
| CVE-2024-27351 | Medium | django | >= 5.0, < 5.0.3 | 5.0.2.post1+tuxcare |
| CVE-2024-24680 | High | django | >= 5.0, < 5.0.2 | 5.0.post1+tuxcare |
| CVE-2024-24680 | High | django | >= 5.0, < 5.0.2 | 5.0.1.post1+tuxcare |
| CVE-2023-24580 | High | django | >= 4.0, < 4.0.10 | 4.0.post1+tuxcare |
| CVE-2023-23969 | High | django | >= 4.0, < 4.0.9 | 4.0.post1+tuxcare |
| CVE-2022-41323 | High | django | >= 4.0, < 4.0.8 | 4.0.post2+tuxcare |
| CVE-2022-41323 | High | django | >= 5.1, < 5.1.2 | 5.1.post1+tuxcare |
| CVE-2022-36359 | High | django | >= 4.0, < 4.0.7 | 4.0.post3+tuxcare |
| CVE-2022-34265 | Critical | django | >= 4.0, < 4.0.6 | 4.0.post3+tuxcare |
| CVE-2022-28347 | Critical | django | >= 4.0, < 4.0.4 | 4.0.post3+tuxcare |
| CVE-2022-28346 | Critical | django | >= 4.0, < 4.0.4 | 4.0.post4+tuxcare |
| CVE-2022-23833 | High | django | >= 4.0, < 4.0.2 | 4.0.post6+tuxcare |
| CVE-2022-22818 | Medium | django | >= 4.0, < 4.0.2 | 4.0.post5+tuxcare |
| CVE-2021-45452 | Medium | django | >= 4.0, < 4.0.1 | 4.0.post4+tuxcare |
| CVE-2021-45116 | High | django | >= 4.0, < 4.0.1 | 4.0.post2+tuxcare |
| CVE-2021-45115 | High | django | >= 4.0, < 4.0.1 | 4.0.post4+tuxcare |

**N/A (Not Available)** means that the National Vulnerability Database (NVD) has registered this CVE, but an official CVSS severity score has not yet been assigned.

Expand Down
4 changes: 2 additions & 2 deletions docs/els-for-libraries/fastapi/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -96,8 +96,8 @@ Fixes for the following vulnerabilities are available in ELS for FastAPI from Tu

| CVE ID | Severity | Library | Vulnerable Versions | Safe Version |
| :------------: | :------: | :-----: | :-----------------: | :-------------------: |
| CVE-2024-24762 | High | fastapi | 0.63.0 | 0.63.0.post2+tuxcare |
| CVE-2024-24762 | High | fastapi | 0.104.1 | 0.104.1.post1+tuxcare |
| CVE-2024-24762 | High | fastapi | < 0.109.1 | 0.63.0.post2+tuxcare |
| CVE-2024-24762 | High | fastapi | < 0.109.1 | 0.104.1.post1+tuxcare |
| CVE-2021-32677 | High | fastapi | 0.63.0 | 0.63.0.post1+tuxcare |

If you are interested in the TuxCare Endless Lifecycle Support, contact [sales@tuxcare.com](mailto:sales@tuxcare.com).
8 changes: 4 additions & 4 deletions docs/els-for-libraries/flask/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -96,9 +96,9 @@ Fixes for the following vulnerabilities are available in ELS for Flask from TuxC

| CVE ID | Severity | Library | Vulnerable Versions | Safe Version |
| :--------------: | :------: | :-----: | :-----------------: | :------------------: |
| CVE-2023-30861 | High | flask | 1.1.2 | 1.1.2.post1+tuxcare |
| CVE-2023-30861 | High | flask | 1.1.4 | 1.1.4.post1+tuxcare |
| CVE-2023-30861 | High | flask | 2.2.1 | 2.2.1.post1+tuxcare |
| CVE-2019-1010083 | High | flask | 0.12.5 | 0.12.5.post1+tuxcare |
| CVE-2023-30861 | High | flask | < 2.2.5 | 1.1.2.post1+tuxcare |
| CVE-2023-30861 | High | flask | < 2.2.5 | 1.1.4.post1+tuxcare |
| CVE-2023-30861 | High | flask | < 2.2.5 | 2.2.1.post1+tuxcare |
| CVE-2019-1010083 | High | flask | < 1.0 | 0.12.5.post1+tuxcare |

If you are interested in the TuxCare Endless Lifecycle Support, contact [sales@tuxcare.com](mailto:sales@tuxcare.com).
8 changes: 4 additions & 4 deletions docs/els-for-libraries/numpy/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -96,9 +96,9 @@ Fixes for the following vulnerabilities are available in ELS for NumPy from TuxC

| CVE ID | Severity | Library | Vulnerable Versions | Safe Version |
| :------------: | :------: | :-----: | :-----------------: | :------------------: |
| CVE-2021-34141 | Medium | numpy | 1.15.4 | 1.15.4.post2+tuxcare |
| CVE-2019-6446 | Critical | numpy | 1.15.4 | 1.15.4.post1+tuxcare |
| CVE-2019-6446 | Critical | numpy | 1.16.0 | 1.16.0.post1+tuxcare |
| CVE-2021-41496 | Medium | numpy | 1.16.0 | 1.16.0.post2+tuxcare |
| CVE-2021-34141 | Medium | numpy | < 1.22.0 | 1.15.4.post2+tuxcare |
| CVE-2019-6446 | Critical | numpy | < 1.16.3 | 1.15.4.post1+tuxcare |
| CVE-2019-6446 | Critical | numpy | < 1.16.3 | 1.16.0.post1+tuxcare |
| CVE-2021-41496 | Medium | numpy | < 1.19.0 | 1.16.0.post2+tuxcare |

If you are interested in the TuxCare Endless Lifecycle Support, contact [sales@tuxcare.com](mailto:sales@tuxcare.com).
Loading