FEATURE: Informix Database Connection Config#26072
FEATURE: Informix Database Connection Config#26072ulixius9 merged 13 commits intoopen-metadata:mainfrom
Conversation
|
Hi there 👋 Thanks for your contribution! The OpenMetadata team will review the PR shortly! Once it has been labeled as Let us know if you need any help! |
.../src/main/resources/json/schema/entity/services/connections/database/informixConnection.json
Show resolved
Hide resolved
…into feature/informix-database-connector
|
Hi there 👋 Thanks for your contribution! The OpenMetadata team will review the PR shortly! Once it has been labeled as Let us know if you need any help! |
|
Hi there 👋 Thanks for your contribution! The OpenMetadata team will review the PR shortly! Once it has been labeled as Let us know if you need any help! |
ingestion/src/metadata/profiler/orm/functions/table_metric_computer.py
Outdated
Show resolved
Hide resolved
|
Hi there 👋 Thanks for your contribution! The OpenMetadata team will review the PR shortly! Once it has been labeled as Let us know if you need any help! |
ingestion/src/metadata/profiler/orm/functions/table_metric_computer.py
Outdated
Show resolved
Hide resolved
|
Hi there 👋 Thanks for your contribution! The OpenMetadata team will review the PR shortly! Once it has been labeled as Let us know if you need any help! |
|
The Python checkstyle failed. Please run You can install the pre-commit hooks with |
🛡️ TRIVY SCAN RESULT 🛡️ Target:
|
| Package | Vulnerability ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
imagemagick |
CVE-2026-25897 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick |
CVE-2026-25898 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick |
CVE-2026-25968 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick |
CVE-2026-25983 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick |
CVE-2026-25986 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick |
CVE-2026-25987 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick |
CVE-2026-24481 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick |
CVE-2026-24485 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick |
CVE-2026-25795 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick |
CVE-2026-25796 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick |
CVE-2026-25798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick |
CVE-2026-25799 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick |
CVE-2026-25965 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick |
CVE-2026-25970 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick |
CVE-2026-25988 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick |
CVE-2026-25989 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick |
CVE-2026-26066 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick |
CVE-2026-26283 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick |
CVE-2026-27798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6-common |
CVE-2026-25897 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6-common |
CVE-2026-25898 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6-common |
CVE-2026-25968 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6-common |
CVE-2026-25983 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6-common |
CVE-2026-25986 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6-common |
CVE-2026-25987 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6-common |
CVE-2026-24481 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6-common |
CVE-2026-24485 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6-common |
CVE-2026-25795 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6-common |
CVE-2026-25796 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6-common |
CVE-2026-25798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6-common |
CVE-2026-25799 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6-common |
CVE-2026-25965 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6-common |
CVE-2026-25970 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6-common |
CVE-2026-25988 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6-common |
CVE-2026-25989 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6-common |
CVE-2026-26066 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6-common |
CVE-2026-26283 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6-common |
CVE-2026-27798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6.q16 |
CVE-2026-25897 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6.q16 |
CVE-2026-25898 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6.q16 |
CVE-2026-25968 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6.q16 |
CVE-2026-25983 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6.q16 |
CVE-2026-25986 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6.q16 |
CVE-2026-25987 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6.q16 |
CVE-2026-24481 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6.q16 |
CVE-2026-24485 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6.q16 |
CVE-2026-25795 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6.q16 |
CVE-2026-25796 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6.q16 |
CVE-2026-25798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6.q16 |
CVE-2026-25799 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6.q16 |
CVE-2026-25965 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6.q16 |
CVE-2026-25970 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6.q16 |
CVE-2026-25988 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6.q16 |
CVE-2026-25989 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6.q16 |
CVE-2026-26066 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6.q16 |
CVE-2026-26283 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
imagemagick-6.q16 |
CVE-2026-27798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-arch-config |
CVE-2026-25897 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-arch-config |
CVE-2026-25898 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-arch-config |
CVE-2026-25968 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-arch-config |
CVE-2026-25983 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-arch-config |
CVE-2026-25986 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-arch-config |
CVE-2026-25987 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-arch-config |
CVE-2026-24481 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-arch-config |
CVE-2026-24485 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-arch-config |
CVE-2026-25795 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-arch-config |
CVE-2026-25796 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-arch-config |
CVE-2026-25798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-arch-config |
CVE-2026-25799 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-arch-config |
CVE-2026-25965 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-arch-config |
CVE-2026-25970 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-arch-config |
CVE-2026-25988 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-arch-config |
CVE-2026-25989 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-arch-config |
CVE-2026-26066 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-arch-config |
CVE-2026-26283 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-arch-config |
CVE-2026-27798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-headers |
CVE-2026-25897 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-headers |
CVE-2026-25898 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-headers |
CVE-2026-25968 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-headers |
CVE-2026-25983 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-headers |
CVE-2026-25986 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-headers |
CVE-2026-25987 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-headers |
CVE-2026-24481 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-headers |
CVE-2026-24485 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-headers |
CVE-2026-25795 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-headers |
CVE-2026-25796 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-headers |
CVE-2026-25798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-headers |
CVE-2026-25799 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-headers |
CVE-2026-25965 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-headers |
CVE-2026-25970 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-headers |
CVE-2026-25988 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-headers |
CVE-2026-25989 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-headers |
CVE-2026-26066 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-headers |
CVE-2026-26283 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6-headers |
CVE-2026-27798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6 |
CVE-2026-25897 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6 |
CVE-2026-25898 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6 |
CVE-2026-25968 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6 |
CVE-2026-25983 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6 |
CVE-2026-25986 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6 |
CVE-2026-25987 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6 |
CVE-2026-24481 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6 |
CVE-2026-24485 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6 |
CVE-2026-25795 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6 |
CVE-2026-25796 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6 |
CVE-2026-25798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6 |
CVE-2026-25799 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6 |
CVE-2026-25965 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6 |
CVE-2026-25970 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6 |
CVE-2026-25988 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6 |
CVE-2026-25989 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6 |
CVE-2026-26066 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6 |
CVE-2026-26283 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6 |
CVE-2026-27798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6-extra |
CVE-2026-25897 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6-extra |
CVE-2026-25898 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6-extra |
CVE-2026-25968 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6-extra |
CVE-2026-25983 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6-extra |
CVE-2026-25986 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6-extra |
CVE-2026-25987 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6-extra |
CVE-2026-24481 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6-extra |
CVE-2026-24485 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6-extra |
CVE-2026-25795 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6-extra |
CVE-2026-25796 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6-extra |
CVE-2026-25798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6-extra |
CVE-2026-25799 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6-extra |
CVE-2026-25965 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6-extra |
CVE-2026-25970 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6-extra |
CVE-2026-25988 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6-extra |
CVE-2026-25989 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6-extra |
CVE-2026-26066 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6-extra |
CVE-2026-26283 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-6-extra |
CVE-2026-27798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-dev |
CVE-2026-25897 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-dev |
CVE-2026-25898 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-dev |
CVE-2026-25968 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-dev |
CVE-2026-25983 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-dev |
CVE-2026-25986 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-dev |
CVE-2026-25987 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-dev |
CVE-2026-24481 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-dev |
CVE-2026-24485 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-dev |
CVE-2026-25795 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-dev |
CVE-2026-25796 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-dev |
CVE-2026-25798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-dev |
CVE-2026-25799 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-dev |
CVE-2026-25965 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-dev |
CVE-2026-25970 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-dev |
CVE-2026-25988 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-dev |
CVE-2026-25989 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-dev |
CVE-2026-26066 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-dev |
CVE-2026-26283 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-6.q16-dev |
CVE-2026-27798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-dev |
CVE-2026-25897 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-dev |
CVE-2026-25898 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-dev |
CVE-2026-25968 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-dev |
CVE-2026-25983 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-dev |
CVE-2026-25986 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-dev |
CVE-2026-25987 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-dev |
CVE-2026-24481 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-dev |
CVE-2026-24485 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-dev |
CVE-2026-25795 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-dev |
CVE-2026-25796 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-dev |
CVE-2026-25798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-dev |
CVE-2026-25799 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-dev |
CVE-2026-25965 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-dev |
CVE-2026-25970 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-dev |
CVE-2026-25988 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-dev |
CVE-2026-25989 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-dev |
CVE-2026-26066 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-dev |
CVE-2026-26283 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickcore-dev |
CVE-2026-27798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6-headers |
CVE-2026-25897 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6-headers |
CVE-2026-25898 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6-headers |
CVE-2026-25968 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6-headers |
CVE-2026-25983 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6-headers |
CVE-2026-25986 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6-headers |
CVE-2026-25987 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6-headers |
CVE-2026-24481 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6-headers |
CVE-2026-24485 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6-headers |
CVE-2026-25795 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6-headers |
CVE-2026-25796 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6-headers |
CVE-2026-25798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6-headers |
CVE-2026-25799 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6-headers |
CVE-2026-25965 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6-headers |
CVE-2026-25970 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6-headers |
CVE-2026-25988 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6-headers |
CVE-2026-25989 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6-headers |
CVE-2026-26066 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6-headers |
CVE-2026-26283 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6-headers |
CVE-2026-27798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-6 |
CVE-2026-25897 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-6 |
CVE-2026-25898 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-6 |
CVE-2026-25968 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-6 |
CVE-2026-25983 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-6 |
CVE-2026-25986 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-6 |
CVE-2026-25987 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-6 |
CVE-2026-24481 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-6 |
CVE-2026-24485 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-6 |
CVE-2026-25795 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-6 |
CVE-2026-25796 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-6 |
CVE-2026-25798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-6 |
CVE-2026-25799 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-6 |
CVE-2026-25965 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-6 |
CVE-2026-25970 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-6 |
CVE-2026-25988 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-6 |
CVE-2026-25989 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-6 |
CVE-2026-26066 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-6 |
CVE-2026-26283 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-6 |
CVE-2026-27798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-dev |
CVE-2026-25897 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-dev |
CVE-2026-25898 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-dev |
CVE-2026-25968 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-dev |
CVE-2026-25983 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-dev |
CVE-2026-25986 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-dev |
CVE-2026-25987 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-dev |
CVE-2026-24481 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-dev |
CVE-2026-24485 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-dev |
CVE-2026-25795 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-dev |
CVE-2026-25796 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-dev |
CVE-2026-25798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-dev |
CVE-2026-25799 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-dev |
CVE-2026-25965 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-dev |
CVE-2026-25970 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-dev |
CVE-2026-25988 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-dev |
CVE-2026-25989 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-dev |
CVE-2026-26066 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-dev |
CVE-2026-26283 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-6.q16-dev |
CVE-2026-27798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-dev |
CVE-2026-25897 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-dev |
CVE-2026-25898 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-dev |
CVE-2026-25968 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-dev |
CVE-2026-25983 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-dev |
CVE-2026-25986 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-dev |
CVE-2026-25987 | 🔥 CRITICAL | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-dev |
CVE-2026-24481 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-dev |
CVE-2026-24485 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-dev |
CVE-2026-25795 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-dev |
CVE-2026-25796 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-dev |
CVE-2026-25798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-dev |
CVE-2026-25799 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-dev |
CVE-2026-25965 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-dev |
CVE-2026-25970 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-dev |
CVE-2026-25988 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-dev |
CVE-2026-25989 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-dev |
CVE-2026-26066 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-dev |
CVE-2026-26283 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
libmagickwand-dev |
CVE-2026-27798 | 🚨 HIGH | 8:6.9.11.60+dfsg-1.6+deb12u6 | 8:6.9.11.60+dfsg-1.6+deb12u7 |
🛡️ TRIVY SCAN RESULT 🛡️
Target: Java
Vulnerabilities (37)
| Package | Vulnerability ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
com.fasterxml.jackson.core:jackson-core |
CVE-2025-52999 | 🚨 HIGH | 2.12.7 | 2.15.0 |
com.fasterxml.jackson.core:jackson-core |
GHSA-72hv-8253-57qq | 🚨 HIGH | 2.12.7 | 2.18.6, 2.21.1, 3.1.0 |
com.fasterxml.jackson.core:jackson-core |
CVE-2025-52999 | 🚨 HIGH | 2.13.4 | 2.15.0 |
com.fasterxml.jackson.core:jackson-core |
GHSA-72hv-8253-57qq | 🚨 HIGH | 2.13.4 | 2.18.6, 2.21.1, 3.1.0 |
com.fasterxml.jackson.core:jackson-core |
GHSA-72hv-8253-57qq | 🚨 HIGH | 2.15.2 | 2.18.6, 2.21.1, 3.1.0 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | 🚨 HIGH | 2.12.7 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | 🚨 HIGH | 2.12.7 | 2.12.7.1, 2.13.4 |
com.google.code.gson:gson |
CVE-2022-25647 | 🚨 HIGH | 2.2.4 | 2.8.9 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | 🚨 HIGH | 3.3.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | 🚨 HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | 🚨 HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2024-7254 | 🚨 HIGH | 3.3.0 | 3.25.5, 4.27.5, 4.28.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | 🚨 HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | 🚨 HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | 🚨 HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2024-7254 | 🚨 HIGH | 3.7.1 | 3.25.5, 4.27.5, 4.28.2 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | 🚨 HIGH | 9.8.1 | 9.37.2 |
com.squareup.okhttp3:okhttp |
CVE-2021-0341 | 🚨 HIGH | 3.12.12 | 4.9.2 |
commons-beanutils:commons-beanutils |
CVE-2025-48734 | 🚨 HIGH | 1.9.4 | 1.11.0 |
commons-io:commons-io |
CVE-2024-47554 | 🚨 HIGH | 2.8.0 | 2.14.0 |
dnsjava:dnsjava |
CVE-2024-25638 | 🚨 HIGH | 2.1.7 | 3.6.0 |
io.airlift:aircompressor |
CVE-2025-67721 | 🚨 HIGH | 0.27 | 2.0.3 |
io.netty:netty-codec-http2 |
CVE-2025-55163 | 🚨 HIGH | 4.1.96.Final | 4.2.4.Final, 4.1.124.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | 🚨 HIGH | 4.1.96.Final | 4.1.100.Final |
io.netty:netty-handler |
CVE-2025-24970 | 🚨 HIGH | 4.1.96.Final | 4.1.118.Final |
net.minidev:json-smart |
CVE-2021-31684 | 🚨 HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2023-1370 | 🚨 HIGH | 1.3.2 | 2.4.9 |
org.apache.avro:avro |
CVE-2024-47561 | 🔥 CRITICAL | 1.7.7 | 1.11.4 |
org.apache.avro:avro |
CVE-2023-39410 | 🚨 HIGH | 1.7.7 | 1.11.3 |
org.apache.derby:derby |
CVE-2022-46337 | 🔥 CRITICAL | 10.14.2.0 | 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0 |
org.apache.ivy:ivy |
CVE-2022-46751 | 🚨 HIGH | 2.5.1 | 2.5.2 |
org.apache.mesos:mesos |
CVE-2018-1330 | 🚨 HIGH | 1.4.3 | 1.6.0 |
org.apache.thrift:libthrift |
CVE-2019-0205 | 🚨 HIGH | 0.12.0 | 0.13.0 |
org.apache.thrift:libthrift |
CVE-2020-13949 | 🚨 HIGH | 0.12.0 | 0.14.0 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | 🔥 CRITICAL | 3.6.3 | 3.7.2, 3.8.3, 3.9.1 |
org.eclipse.jetty:jetty-server |
CVE-2024-13009 | 🚨 HIGH | 9.4.56.v20240826 | 9.4.57.v20241219 |
org.lz4:lz4-java |
CVE-2025-12183 | 🚨 HIGH | 1.8.0 | 1.8.1 |
🛡️ TRIVY SCAN RESULT 🛡️
Target: Node.js
No Vulnerabilities Found
🛡️ TRIVY SCAN RESULT 🛡️
Target: Python
Vulnerabilities (9)
| Package | Vulnerability ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
apache-airflow |
CVE-2025-68438 | 🚨 HIGH | 3.1.5 | 3.1.6 |
apache-airflow |
CVE-2025-68675 | 🚨 HIGH | 3.1.5 | 3.1.6, 2.11.1 |
cryptography |
CVE-2026-26007 | 🚨 HIGH | 42.0.8 | 46.0.5 |
jaraco.context |
CVE-2026-23949 | 🚨 HIGH | 6.0.1 | 6.1.0 |
starlette |
CVE-2025-62727 | 🚨 HIGH | 0.48.0 | 0.49.1 |
urllib3 |
CVE-2025-66418 | 🚨 HIGH | 1.26.20 | 2.6.0 |
urllib3 |
CVE-2025-66471 | 🚨 HIGH | 1.26.20 | 2.6.0 |
urllib3 |
CVE-2026-21441 | 🚨 HIGH | 1.26.20 | 2.6.3 |
wheel |
CVE-2026-24049 | 🚨 HIGH | 0.45.1 | 0.46.2 |
🛡️ TRIVY SCAN RESULT 🛡️
Target: /etc/ssl/private/ssl-cert-snakeoil.key
No Vulnerabilities Found
🛡️ TRIVY SCAN RESULT 🛡️
Target: /ingestion/pipelines/extended_sample_data.yaml
No Vulnerabilities Found
🛡️ TRIVY SCAN RESULT 🛡️
Target: /ingestion/pipelines/lineage.yaml
No Vulnerabilities Found
🛡️ TRIVY SCAN RESULT 🛡️
Target: /ingestion/pipelines/sample_data.json
No Vulnerabilities Found
🛡️ TRIVY SCAN RESULT 🛡️
Target: /ingestion/pipelines/sample_data.yaml
No Vulnerabilities Found
🛡️ TRIVY SCAN RESULT 🛡️
Target: /ingestion/pipelines/sample_data_aut.yaml
No Vulnerabilities Found
🛡️ TRIVY SCAN RESULT 🛡️
Target: /ingestion/pipelines/sample_usage.json
No Vulnerabilities Found
🛡️ TRIVY SCAN RESULT 🛡️
Target: /ingestion/pipelines/sample_usage.yaml
No Vulnerabilities Found
🛡️ TRIVY SCAN RESULT 🛡️
Target: /ingestion/pipelines/sample_usage_aut.yaml
No Vulnerabilities Found
🛡️ TRIVY SCAN RESULT 🛡️ Target:
|
| Package | Vulnerability ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
libpam-modules |
CVE-2025-6020 | 🚨 HIGH | 1.5.2-6+deb12u1 | 1.5.2-6+deb12u2 |
libpam-modules-bin |
CVE-2025-6020 | 🚨 HIGH | 1.5.2-6+deb12u1 | 1.5.2-6+deb12u2 |
libpam-runtime |
CVE-2025-6020 | 🚨 HIGH | 1.5.2-6+deb12u1 | 1.5.2-6+deb12u2 |
libpam0g |
CVE-2025-6020 | 🚨 HIGH | 1.5.2-6+deb12u1 | 1.5.2-6+deb12u2 |
🛡️ TRIVY SCAN RESULT 🛡️
Target: Java
Vulnerabilities (38)
| Package | Vulnerability ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
com.fasterxml.jackson.core:jackson-core |
CVE-2025-52999 | 🚨 HIGH | 2.12.7 | 2.15.0 |
com.fasterxml.jackson.core:jackson-core |
GHSA-72hv-8253-57qq | 🚨 HIGH | 2.12.7 | 2.18.6, 2.21.1, 3.1.0 |
com.fasterxml.jackson.core:jackson-core |
CVE-2025-52999 | 🚨 HIGH | 2.13.4 | 2.15.0 |
com.fasterxml.jackson.core:jackson-core |
GHSA-72hv-8253-57qq | 🚨 HIGH | 2.13.4 | 2.18.6, 2.21.1, 3.1.0 |
com.fasterxml.jackson.core:jackson-core |
GHSA-72hv-8253-57qq | 🚨 HIGH | 2.15.2 | 2.18.6, 2.21.1, 3.1.0 |
com.fasterxml.jackson.core:jackson-core |
GHSA-72hv-8253-57qq | 🚨 HIGH | 2.16.1 | 2.18.6, 2.21.1, 3.1.0 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | 🚨 HIGH | 2.12.7 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | 🚨 HIGH | 2.12.7 | 2.12.7.1, 2.13.4 |
com.google.code.gson:gson |
CVE-2022-25647 | 🚨 HIGH | 2.2.4 | 2.8.9 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | 🚨 HIGH | 3.3.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | 🚨 HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | 🚨 HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2024-7254 | 🚨 HIGH | 3.3.0 | 3.25.5, 4.27.5, 4.28.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | 🚨 HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | 🚨 HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | 🚨 HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2024-7254 | 🚨 HIGH | 3.7.1 | 3.25.5, 4.27.5, 4.28.2 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | 🚨 HIGH | 9.8.1 | 9.37.2 |
com.squareup.okhttp3:okhttp |
CVE-2021-0341 | 🚨 HIGH | 3.12.12 | 4.9.2 |
commons-beanutils:commons-beanutils |
CVE-2025-48734 | 🚨 HIGH | 1.9.4 | 1.11.0 |
commons-io:commons-io |
CVE-2024-47554 | 🚨 HIGH | 2.8.0 | 2.14.0 |
dnsjava:dnsjava |
CVE-2024-25638 | 🚨 HIGH | 2.1.7 | 3.6.0 |
io.airlift:aircompressor |
CVE-2025-67721 | 🚨 HIGH | 0.27 | 2.0.3 |
io.netty:netty-codec-http2 |
CVE-2025-55163 | 🚨 HIGH | 4.1.96.Final | 4.2.4.Final, 4.1.124.Final |
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p | 🚨 HIGH | 4.1.96.Final | 4.1.100.Final |
io.netty:netty-handler |
CVE-2025-24970 | 🚨 HIGH | 4.1.96.Final | 4.1.118.Final |
net.minidev:json-smart |
CVE-2021-31684 | 🚨 HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2023-1370 | 🚨 HIGH | 1.3.2 | 2.4.9 |
org.apache.avro:avro |
CVE-2024-47561 | 🔥 CRITICAL | 1.7.7 | 1.11.4 |
org.apache.avro:avro |
CVE-2023-39410 | 🚨 HIGH | 1.7.7 | 1.11.3 |
org.apache.derby:derby |
CVE-2022-46337 | 🔥 CRITICAL | 10.14.2.0 | 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0 |
org.apache.ivy:ivy |
CVE-2022-46751 | 🚨 HIGH | 2.5.1 | 2.5.2 |
org.apache.mesos:mesos |
CVE-2018-1330 | 🚨 HIGH | 1.4.3 | 1.6.0 |
org.apache.thrift:libthrift |
CVE-2019-0205 | 🚨 HIGH | 0.12.0 | 0.13.0 |
org.apache.thrift:libthrift |
CVE-2020-13949 | 🚨 HIGH | 0.12.0 | 0.14.0 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | 🔥 CRITICAL | 3.6.3 | 3.7.2, 3.8.3, 3.9.1 |
org.eclipse.jetty:jetty-server |
CVE-2024-13009 | 🚨 HIGH | 9.4.56.v20240826 | 9.4.57.v20241219 |
org.lz4:lz4-java |
CVE-2025-12183 | 🚨 HIGH | 1.8.0 | 1.8.1 |
🛡️ TRIVY SCAN RESULT 🛡️
Target: Node.js
No Vulnerabilities Found
🛡️ TRIVY SCAN RESULT 🛡️
Target: Python
Vulnerabilities (23)
| Package | Vulnerability ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
Authlib |
CVE-2026-28802 | 🚨 HIGH | 1.6.6 | 1.6.7 |
Werkzeug |
CVE-2024-34069 | 🚨 HIGH | 2.2.3 | 3.0.3 |
aiohttp |
CVE-2025-69223 | 🚨 HIGH | 3.12.12 | 3.13.3 |
aiohttp |
CVE-2025-69223 | 🚨 HIGH | 3.13.2 | 3.13.3 |
apache-airflow |
CVE-2025-68438 | 🚨 HIGH | 3.1.5 | 3.1.6 |
apache-airflow |
CVE-2025-68675 | 🚨 HIGH | 3.1.5 | 3.1.6, 2.11.1 |
apache-airflow-providers-http |
CVE-2025-69219 | 🚨 HIGH | 5.6.0 | 6.0.0 |
azure-core |
CVE-2026-21226 | 🚨 HIGH | 1.37.0 | 1.38.0 |
cryptography |
CVE-2026-26007 | 🚨 HIGH | 42.0.8 | 46.0.5 |
google-cloud-aiplatform |
CVE-2026-2472 | 🚨 HIGH | 1.130.0 | 1.131.0 |
google-cloud-aiplatform |
CVE-2026-2473 | 🚨 HIGH | 1.130.0 | 1.133.0 |
jaraco.context |
CVE-2026-23949 | 🚨 HIGH | 5.3.0 | 6.1.0 |
jaraco.context |
CVE-2026-23949 | 🚨 HIGH | 6.0.1 | 6.1.0 |
protobuf |
CVE-2026-0994 | 🚨 HIGH | 4.25.8 | 6.33.5, 5.29.6 |
pyasn1 |
CVE-2026-23490 | 🚨 HIGH | 0.6.1 | 0.6.2 |
python-multipart |
CVE-2026-24486 | 🚨 HIGH | 0.0.20 | 0.0.22 |
ray |
CVE-2025-62593 | 🔥 CRITICAL | 2.47.1 | 2.52.0 |
starlette |
CVE-2025-62727 | 🚨 HIGH | 0.48.0 | 0.49.1 |
urllib3 |
CVE-2025-66418 | 🚨 HIGH | 1.26.20 | 2.6.0 |
urllib3 |
CVE-2025-66471 | 🚨 HIGH | 1.26.20 | 2.6.0 |
urllib3 |
CVE-2026-21441 | 🚨 HIGH | 1.26.20 | 2.6.3 |
wheel |
CVE-2026-24049 | 🚨 HIGH | 0.45.1 | 0.46.2 |
wheel |
CVE-2026-24049 | 🚨 HIGH | 0.45.1 | 0.46.2 |
🛡️ TRIVY SCAN RESULT 🛡️
Target: usr/bin/docker
Vulnerabilities (3)
| Package | Vulnerability ID | Severity | Installed Version | Fixed Version |
|---|---|---|---|---|
stdlib |
CVE-2025-68121 | 🔥 CRITICAL | v1.25.5 | 1.24.13, 1.25.7, 1.26.0-rc.3 |
stdlib |
CVE-2025-61726 | 🚨 HIGH | v1.25.5 | 1.24.12, 1.25.6 |
stdlib |
CVE-2025-61728 | 🚨 HIGH | v1.25.5 | 1.24.12, 1.25.6 |
🛡️ TRIVY SCAN RESULT 🛡️
Target: /etc/ssl/private/ssl-cert-snakeoil.key
No Vulnerabilities Found
🛡️ TRIVY SCAN RESULT 🛡️
Target: /home/airflow/openmetadata-airflow-apis/openmetadata_managed_apis.egg-info/PKG-INFO
No Vulnerabilities Found
Code Review ✅ Approved 10 resolved / 10 findingsAdds Informix database connection configuration with comprehensive schema and connection handling. All nine issues were resolved including debug statements, query qualifiers, required field handling, password masking, and capability flags. ✅ 10 resolved✅ Quality: Debug/development log statement left in production code
✅ Edge Case: Fallback to super().compute() will always fail on Informix
✅ Edge Case: systables query lacks owner/schema qualifier
✅ Edge Case: Informix
|
| Auto-apply | Compact |
|
|
Was this helpful? React with 👍 / 👎 | Gitar
|
|





Describe your changes:
Fixes
I worked on ... because ...
Type of change:
Checklist:
Fixes <issue-number>: <short explanation>Summary by Gitar
InformixConnectionschema with SSL configuration and server name settingsInformixTableMetricComputerto read metrics fromsystablescatalogDialects.Informixenum value for database dialect identificationMedianFncompiler for Informix using ROW_NUMBER window functionsSumFncompiler handling DECIMAL precision and DATETIME type edge casesLenFn,ModuloFn, and column count functions with literal binds to avoid JDBC bind parametersInformixto beta services list and generated TypeScript connection typesis_blob()helper for detecting binary/text columns unsuitable for profilingThis will update automatically on new commits.