✗ High severity vulnerability found in systemd/libsystemd0 Description: Privilege Chaining Info: https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-345386 Introduced through: systemd/libsystemd0@241-7~deb10u5, util-linux/bsdutils@1:2.33.1-0.1, apt@1.8.2.2, util-linux/mount@2.33.1-0.1, systemd/libudev1@241-7~deb10u5 From: systemd/libsystemd0@241-7~deb10u5 From: util-linux/bsdutils@1:2.33.1-0.1 > systemd/libsystemd0@241-7~deb10u5 From: apt@1.8.2.2 > apt/libapt-pkg5.0@1.8.2.2 > systemd/libsystemd0@241-7~deb10u5 and 4 more... ✗ High severity vulnerability found in systemd/libsystemd0 Description: Incorrect Privilege Assignment Info: https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-345391 Introduced through: systemd/libsystemd0@241-7~deb10u5, util-linux/bsdutils@1:2.33.1-0.1, apt@1.8.2.2, util-linux/mount@2.33.1-0.1, systemd/libudev1@241-7~deb10u5 From: systemd/libsystemd0@241-7~deb10u5 From: util-linux/bsdutils@1:2.33.1-0.1 > systemd/libsystemd0@241-7~deb10u5 From: apt@1.8.2.2 > apt/libapt-pkg5.0@1.8.2.2 > systemd/libsystemd0@241-7~deb10u5 and 4 more... ✗ High severity vulnerability found in systemd/libsystemd0 Description: Information Exposure Info: https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-346788 Introduced through: systemd/libsystemd0@241-7~deb10u5, util-linux/bsdutils@1:2.33.1-0.1, apt@1.8.2.2, util-linux/mount@2.33.1-0.1, systemd/libudev1@241-7~deb10u5 From: systemd/libsystemd0@241-7~deb10u5 From: util-linux/bsdutils@1:2.33.1-0.1 > systemd/libsystemd0@241-7~deb10u5 From: apt@1.8.2.2 > apt/libapt-pkg5.0@1.8.2.2 > systemd/libsystemd0@241-7~deb10u5 and 4 more... ✗ High severity vulnerability found in libidn2/libidn2-0 Description: Improper Input Validation Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBIDN2-474100 Introduced through: libidn2/libidn2-0@2.0.5-1+deb10u1, apt@1.8.2.2 From: libidn2/libidn2-0@2.0.5-1+deb10u1 From: apt@1.8.2.2 > gnutls28/libgnutls30@3.6.7-4+deb10u5 > libidn2/libidn2-0@2.0.5-1+deb10u1 ✗ High severity vulnerability found in gnutls28/libgnutls30 Description: Out-of-bounds Write Info: https://snyk.io/vuln/SNYK-DEBIAN10-GNUTLS28-609778 Introduced through: gnutls28/libgnutls30@3.6.7-4+deb10u5, apt@1.8.2.2 From: gnutls28/libgnutls30@3.6.7-4+deb10u5 From: apt@1.8.2.2 > gnutls28/libgnutls30@3.6.7-4+deb10u5 ✗ High severity vulnerability found in glibc/libc-bin Description: Out-of-bounds Write Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-559488 Introduced through: glibc/libc-bin@2.28-10, meta-common-packages@meta From: glibc/libc-bin@2.28-10 From: meta-common-packages@meta > glibc/libc6@2.28-10 ✗ High severity vulnerability found in glibc/libc-bin Description: Use After Free Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-559493 Introduced through: glibc/libc-bin@2.28-10, meta-common-packages@meta From: glibc/libc-bin@2.28-10 From: meta-common-packages@meta > glibc/libc6@2.28-10 ✗ High severity vulnerability found in gcc-8/libstdc++6 Description: Information Exposure Info: https://snyk.io/vuln/SNYK-DEBIAN10-GCC8-347558 Introduced through: gcc-8/libstdc++6@8.3.0-6, apt@1.8.2.2, meta-common-packages@meta From: gcc-8/libstdc++6@8.3.0-6 From: apt@1.8.2.2 > gcc-8/libstdc++6@8.3.0-6 From: apt@1.8.2.2 > apt/libapt-pkg5.0@1.8.2.2 > gcc-8/libstdc++6@8.3.0-6 and 2 more... ✗ High severity vulnerability found in gcc-8/libstdc++6 Description: Insufficient Entropy Info: https://snyk.io/vuln/SNYK-DEBIAN10-GCC8-469413 Introduced through: gcc-8/libstdc++6@8.3.0-6, apt@1.8.2.2, meta-common-packages@meta From: gcc-8/libstdc++6@8.3.0-6 From: apt@1.8.2.2 > gcc-8/libstdc++6@8.3.0-6 From: apt@1.8.2.2 > apt/libapt-pkg5.0@1.8.2.2 > gcc-8/libstdc++6@8.3.0-6 and 2 more...