Scanner: Docker Scout
Critical vulnerabilities: 5
High vulnerabilities: 21
Critical
| CVE | Package | Installed | Fixed | Description |
|---|---|---|---|---|
| CVE-2026-33186 | grpc | 1.77.0 | 1.79.3 | CVE-2026-33186: Improper Authorization |
| CVE-2026-6100 | python3.11 | 3.11.2-6%2Bdeb12u6 | not fixed | CVE-2026-6100 |
| CVE-2026-35030 | litellm | 1.82.6 | 1.83.0 | CVE-2026-35030: Improper Authentication |
| CVE-2024-52338 | pyarrow | 14.0.2 | 17.0.0 | CVE-2024-52338 |
| CVE-2025-68121 | stdlib | 1.25.5 | 1.25.7 | CVE-2025-68121 |
High
| CVE | Package | Installed | Fixed | Description |
|---|---|---|---|---|
| CVE-2026-24051 | sdk | 1.38.0 | 1.40.0 | CVE-2026-24051: Untrusted Search Path |
| CVE-2026-4519 | python | 3.12.13 | 3.13.13 | CVE-2026-4519 |
| CVE-2025-55131 | nodejs | 22.21.0-1nodesource1 | not fixed | CVE-2025-55131 |
| CVE-2026-24049 | wheel | 0.45.1 | 0.46.2 | CVE-2026-24049: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
| CVE-2026-39883 | sdk | 1.38.0 | 1.43.0 | CVE-2026-39883: Untrusted Search Path |
| CVE-2024-23342 | ecdsa | 0.19.1 | not fixed | CVE-2024-23342: Observable Discrepancy |
| CVE-2025-59465 | nodejs | 22.21.0-1nodesource1 | not fixed | CVE-2025-59465 |
| CVE-2025-59466 | nodejs | 22.21.0-1nodesource1 | not fixed | CVE-2025-59466 |
| CVE-2025-61726 | stdlib | 1.25.5 | 1.25.6 | CVE-2025-61726 |
| CVE-2026-21637 | nodejs | 22.21.0-1nodesource1 | not fixed | CVE-2026-21637 |
| CVE-2026-21710 | nodejs | 22.21.0-1nodesource1 | not fixed | CVE-2026-21710 |
| CVE-2026-25679 | stdlib | 1.25.5 | 1.25.8 | CVE-2026-25679 |
| CVE-2026-27135 | nghttp2 | 1.52.0-1%2Bdeb12u2 | not fixed | CVE-2026-27135 |
| CVE-2026-32280 | stdlib | 1.25.5 | 1.25.9 | CVE-2026-32280 |
| CVE-2026-32281 | stdlib | 1.25.5 | 1.25.9 | CVE-2026-32281 |
| CVE-2026-32283 | stdlib | 1.25.5 | 1.25.9 | CVE-2026-32283 |
| CVE-2026-33231 | nltk | 3.9.3 | not fixed | CVE-2026-33231: Missing Authentication for Critical Function |
| CVE-2026-26007 | cryptography | 44.0.3 | 46.0.5 | CVE-2026-26007: Insufficient Verification of Data Authenticity |
| GHSA-69x8-hrgq-fjj8 | litellm | 1.82.6 | 1.83.0 | GHSA-69x8-hrgq-fjj8: Exposure of Sensitive Information to an Unauthorized Actor |
| CVE-2026-35029 | litellm | 1.82.6 | 1.83.0 | CVE-2026-35029: Incorrect Authorization |
| CVE-2026-40192 | pillow | 12.1.1 | 12.2.0 | CVE-2026-40192: Allocation of Resources Without Limits or Throttling |