Register Login
  • more
    • SaaS Solutions
      • Vulnerability Intelligence
      • Vulnerability Management
    • Pricing
    • Vulnerabilities
    • Reports
    • Blog
    • Contact Us
  1. Main
  2. Vulnerability Database
  3. Fedoraproject
  4. 3mux

Known Vulnerabilities in 3mux

1.1.0-6.fc36
1.1.0-5.fc37
1.1.0-5.fc36
1.1.0-5.fc35



Fedora 35 update for 3mux, act, aerc, age, apache-cloudstack-cloudmonkey, aquatone, aron, asciigraph, asnip, assetfinder, bettercap, butane, caddy, cadvisor, chisel, clash, commit-stream, containerd, direnv, dnscrypt-proxy, dnsx, douceur, duf, exercism, f10 Jul, 2022
Medium Patched
Fedora 36 update for 3mux, act, aerc, age, apache-cloudstack-cloudmonkey, aquatone, aron, asnip, assetfinder, bettercap, cadvisor, chisel, clash, commit-stream, containerd, direnv, dnscrypt-proxy, dnsx, douceur, duf, ffuf, fzf, geoipupdate, gh, git-time-m21 Jun, 2022
Medium Patched
Fedora 37 update for 3mux, aerc, age, asciigraph, buildah, clash, deepin-gir-generator, dnscrypt-proxy, dnsx, doctl, duf, fzf, gitjacker, gmailctl, godotenv, gojq, golang-ariga-atlas, golang-bug-serial-1, golang-entgo-ent, golang-etcd-bbolt, golang-github18 Jun, 2022
Medium Patched


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Russian-linked hackers exploit Google App passwords in email espionage campaign
  • FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US
  • Russian crypto executive sentenced to prison in US for market manipulation scheme
  • ClickFix technique widely used to deliver multi-stage malware campaigns
  • Viasat reportedly affected in China-linked Salt Typhoon cyberespionage campaign
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.