diff --git a/stable/jackett/9.0.32/sec-scan.md b/stable/jackett/9.0.32/sec-scan.md
deleted file mode 100644
index 79b22e1f84b..00000000000
--- a/stable/jackett/9.0.32/sec-scan.md
+++ /dev/null
@@ -1,600 +0,0 @@
-# Security Scan
-
-## Helm-Chart
-
-##### Scan Results
-
-```
-2021-12-03T18:33:16.449Z [34mINFO[0m Need to update the built-in policies
-2021-12-03T18:33:16.449Z [34mINFO[0m Downloading the built-in policies...
-2021-12-03T18:33:17.259Z [34mINFO[0m Detected config files: 1
-
-jackett/templates/common.yaml (kubernetes)
-==========================================
-Tests: 40 (SUCCESSES: 28, FAILURES: 12, EXCEPTIONS: 0)
-Failures: 12 (UNKNOWN: 0, LOW: 5, MEDIUM: 7, HIGH: 0, CRITICAL: 0)
-
-+---------------------------+------------+-----------------------------------+----------+------------------------------------------+
-| TYPE | MISCONF ID | CHECK | SEVERITY | MESSAGE |
-+---------------------------+------------+-----------------------------------+----------+------------------------------------------+
-| Kubernetes Security Check | KSV003 | Default capabilities not dropped | LOW | Container 'RELEASE-NAME-jackett' of |
-| | | | | Deployment 'RELEASE-NAME-jackett' |
-| | | | | should add 'ALL' to |
-| | | | | 'securityContext.capabilities.drop' |
-| | | | | -->avd.aquasec.com/appshield/ksv003 |
-+ +------------+-----------------------------------+----------+------------------------------------------+
-| | KSV012 | Runs as root user | MEDIUM | Container 'autopermissions' of |
-| | | | | Deployment 'RELEASE-NAME-jackett' should |
-| | | | | set 'securityContext.runAsNonRoot' to |
-| | | | | true -->avd.aquasec.com/appshield/ksv012 |
-+ +------------+-----------------------------------+----------+------------------------------------------+
-| | KSV013 | Image tag ':latest' used | LOW | Container 'RELEASE-NAME-jackett' of |
-| | | | | Deployment 'RELEASE-NAME-jackett' |
-| | | | | should specify an image tag |
-| | | | | -->avd.aquasec.com/appshield/ksv013 |
-+ + + + +------------------------------------------+
-| | | | | Container 'autopermissions' of |
-| | | | | Deployment 'RELEASE-NAME-jackett' |
-| | | | | should specify an image tag |
-| | | | | -->avd.aquasec.com/appshield/ksv013 |
-+ +------------+-----------------------------------+ +------------------------------------------+
-| | KSV014 | Root file system is not read-only | | Container 'RELEASE-NAME-jackett' |
-| | | | | of Deployment |
-| | | | | 'RELEASE-NAME-jackett' should set |
-| | | | | 'securityContext.readOnlyRootFilesystem' |
-| | | | | to true |
-| | | | | -->avd.aquasec.com/appshield/ksv014 |
-+ + + + +------------------------------------------+
-| | | | | Container 'autopermissions' |
-| | | | | of Deployment |
-| | | | | 'RELEASE-NAME-jackett' should set |
-| | | | | 'securityContext.readOnlyRootFilesystem' |
-| | | | | to true |
-| | | | | -->avd.aquasec.com/appshield/ksv014 |
-+ +------------+-----------------------------------+----------+------------------------------------------+
-| | KSV019 | Seccomp policies disabled | MEDIUM | Container 'RELEASE-NAME-jackett' of |
-| | | | | Deployment 'RELEASE-NAME-jackett' |
-| | | | | should specify a seccomp profile |
-| | | | | -->avd.aquasec.com/appshield/ksv019 |
-+ + + + +------------------------------------------+
-| | | | | Container 'autopermissions' of |
-| | | | | Deployment 'RELEASE-NAME-jackett' |
-| | | | | should specify a seccomp profile |
-| | | | | -->avd.aquasec.com/appshield/ksv019 |
-+ +------------+-----------------------------------+ +------------------------------------------+
-| | KSV020 | Runs with low user ID | | Container 'RELEASE-NAME-jackett' of |
-| | | | | Deployment 'RELEASE-NAME-jackett' should |
-| | | | | set 'securityContext.runAsUser' > 10000 |
-| | | | | -->avd.aquasec.com/appshield/ksv020 |
-+ + + + +------------------------------------------+
-| | | | | Container 'autopermissions' of |
-| | | | | Deployment 'RELEASE-NAME-jackett' should |
-| | | | | set 'securityContext.runAsUser' > 10000 |
-| | | | | -->avd.aquasec.com/appshield/ksv020 |
-+ +------------+-----------------------------------+ +------------------------------------------+
-| | KSV021 | Runs with low group ID | | Container 'RELEASE-NAME-jackett' of |
-| | | | | Deployment 'RELEASE-NAME-jackett' should |
-| | | | | set 'securityContext.runAsGroup' > 10000 |
-| | | | | -->avd.aquasec.com/appshield/ksv021 |
-+ + + + +------------------------------------------+
-| | | | | Container 'autopermissions' of |
-| | | | | Deployment 'RELEASE-NAME-jackett' should |
-| | | | | set 'securityContext.runAsGroup' > 10000 |
-| | | | | -->avd.aquasec.com/appshield/ksv021 |
-+---------------------------+------------+-----------------------------------+----------+------------------------------------------+
-```
-
-## Containers
-
-##### Detected Containers
-
- ghcr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c
- tccr.io/truecharts/jackett:v0.20.83@sha256:b24ade69bfc1b9725c42043c0b4aab341aed7c2cb462fdc21bb5287aaa574d79
-
-##### Scan Results
-
-**Container: ghcr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c**
-
-```
-2021-12-03T18:33:17.339Z [34mINFO[0m Need to update DB
-2021-12-03T18:33:17.340Z [34mINFO[0m Downloading DB...
-2021-12-03T18:33:19.939Z [34mINFO[0m Detected OS: alpine
-2021-12-03T18:33:19.939Z [34mINFO[0m Detecting Alpine vulnerabilities...
-2021-12-03T18:33:19.941Z [34mINFO[0m Number of language-specific files: 0
-
-ghcr.io/truecharts/alpine:v3.14.2@sha256:4095394abbae907e94b1f2fd2e2de6c4f201a5b9704573243ca8eb16db8cdb7c (alpine 3.14.2)
-=========================================================================================================================
-Total: 22 (UNKNOWN: 0, LOW: 0, MEDIUM: 4, HIGH: 18, CRITICAL: 0)
-
-+------------+------------------+----------+-------------------+---------------+---------------------------------------+
-| LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE |
-+------------+------------------+----------+-------------------+---------------+---------------------------------------+
-| busybox | CVE-2021-42378 | HIGH | 1.33.1-r3 | 1.33.1-r6 | busybox: use-after-free in |
-| | | | | | awk applet leads to denial |
-| | | | | | of service and possibly... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42378 |
-+ +------------------+ + + +---------------------------------------+
-| | CVE-2021-42379 | | | | busybox: use-after-free in |
-| | | | | | awk applet leads to denial |
-| | | | | | of service and possibly... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42379 |
-+ +------------------+ + + +---------------------------------------+
-| | CVE-2021-42380 | | | | busybox: use-after-free in |
-| | | | | | awk applet leads to denial |
-| | | | | | of service and possibly... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42380 |
-+ +------------------+ + + +---------------------------------------+
-| | CVE-2021-42381 | | | | busybox: use-after-free in |
-| | | | | | awk applet leads to denial |
-| | | | | | of service and possibly... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42381 |
-+ +------------------+ + + +---------------------------------------+
-| | CVE-2021-42382 | | | | busybox: use-after-free in |
-| | | | | | awk applet leads to denial |
-| | | | | | of service and possibly... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42382 |
-+ +------------------+ + + +---------------------------------------+
-| | CVE-2021-42383 | | | | busybox: use-after-free in |
-| | | | | | awk applet leads to denial |
-| | | | | | of service and possibly... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42383 |
-+ +------------------+ + + +---------------------------------------+
-| | CVE-2021-42384 | | | | busybox: use-after-free in |
-| | | | | | awk applet leads to denial |
-| | | | | | of service and possibly... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42384 |
-+ +------------------+ + + +---------------------------------------+
-| | CVE-2021-42385 | | | | busybox: use-after-free in |
-| | | | | | awk applet leads to denial |
-| | | | | | of service and possibly... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42385 |
-+ +------------------+ + + +---------------------------------------+
-| | CVE-2021-42386 | | | | busybox: use-after-free in |
-| | | | | | awk applet leads to denial |
-| | | | | | of service and possibly... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42386 |
-+ +------------------+----------+ +---------------+---------------------------------------+
-| | CVE-2021-42374 | MEDIUM | | 1.33.1-r4 | busybox: out-of-bounds read |
-| | | | | | in unlzma applet leads to |
-| | | | | | information leak and denial... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42374 |
-+ +------------------+ + +---------------+---------------------------------------+
-| | CVE-2021-42375 | | | 1.33.1-r5 | busybox: incorrect handling |
-| | | | | | of a special element in |
-| | | | | | ash applet leads to... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42375 |
-+------------+------------------+----------+ +---------------+---------------------------------------+
-| ssl_client | CVE-2021-42378 | HIGH | | 1.33.1-r6 | busybox: use-after-free in |
-| | | | | | awk applet leads to denial |
-| | | | | | of service and possibly... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42378 |
-+ +------------------+ + + +---------------------------------------+
-| | CVE-2021-42379 | | | | busybox: use-after-free in |
-| | | | | | awk applet leads to denial |
-| | | | | | of service and possibly... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42379 |
-+ +------------------+ + + +---------------------------------------+
-| | CVE-2021-42380 | | | | busybox: use-after-free in |
-| | | | | | awk applet leads to denial |
-| | | | | | of service and possibly... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42380 |
-+ +------------------+ + + +---------------------------------------+
-| | CVE-2021-42381 | | | | busybox: use-after-free in |
-| | | | | | awk applet leads to denial |
-| | | | | | of service and possibly... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42381 |
-+ +------------------+ + + +---------------------------------------+
-| | CVE-2021-42382 | | | | busybox: use-after-free in |
-| | | | | | awk applet leads to denial |
-| | | | | | of service and possibly... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42382 |
-+ +------------------+ + + +---------------------------------------+
-| | CVE-2021-42383 | | | | busybox: use-after-free in |
-| | | | | | awk applet leads to denial |
-| | | | | | of service and possibly... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42383 |
-+ +------------------+ + + +---------------------------------------+
-| | CVE-2021-42384 | | | | busybox: use-after-free in |
-| | | | | | awk applet leads to denial |
-| | | | | | of service and possibly... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42384 |
-+ +------------------+ + + +---------------------------------------+
-| | CVE-2021-42385 | | | | busybox: use-after-free in |
-| | | | | | awk applet leads to denial |
-| | | | | | of service and possibly... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42385 |
-+ +------------------+ + + +---------------------------------------+
-| | CVE-2021-42386 | | | | busybox: use-after-free in |
-| | | | | | awk applet leads to denial |
-| | | | | | of service and possibly... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42386 |
-+ +------------------+----------+ +---------------+---------------------------------------+
-| | CVE-2021-42374 | MEDIUM | | 1.33.1-r4 | busybox: out-of-bounds read |
-| | | | | | in unlzma applet leads to |
-| | | | | | information leak and denial... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42374 |
-+ +------------------+ + +---------------+---------------------------------------+
-| | CVE-2021-42375 | | | 1.33.1-r5 | busybox: incorrect handling |
-| | | | | | of a special element in |
-| | | | | | ash applet leads to... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-42375 |
-+------------+------------------+----------+-------------------+---------------+---------------------------------------+
-```
-
-**Container: tccr.io/truecharts/jackett:v0.20.83@sha256:b24ade69bfc1b9725c42043c0b4aab341aed7c2cb462fdc21bb5287aaa574d79**
-
-```
-2021-12-03T18:33:24.300Z [34mINFO[0m Detected OS: ubuntu
-2021-12-03T18:33:24.300Z [34mINFO[0m Detecting Ubuntu vulnerabilities...
-2021-12-03T18:33:24.303Z [34mINFO[0m Number of language-specific files: 1
-2021-12-03T18:33:24.303Z [34mINFO[0m Detecting gobinary vulnerabilities...
-
-tccr.io/truecharts/jackett:v0.20.83@sha256:b24ade69bfc1b9725c42043c0b4aab341aed7c2cb462fdc21bb5287aaa574d79 (ubuntu 20.04)
-==========================================================================================================================
-Total: 76 (UNKNOWN: 0, LOW: 52, MEDIUM: 24, HIGH: 0, CRITICAL: 0)
-
-+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+
-| LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE |
-+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+
-| bash | CVE-2019-18276 | LOW | 5.0-6ubuntu1.1 | | bash: when effective UID is not |
-| | | | | | equal to its real UID the... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2019-18276 |
-+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+
-| bind9-dnsutils | CVE-2021-25219 | MEDIUM | 1:9.16.1-0ubuntu2.8 | 1:9.16.1-0ubuntu2.9 | bind: Lame cache can be abused to |
-| | | | | | severely degrade resolver performance |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-25219 |
-+----------------------+ + + + + +
-| bind9-host | | | | | |
-| | | | | | |
-| | | | | | |
-+----------------------+ + + + + +
-| bind9-libs | | | | | |
-| | | | | | |
-| | | | | | |
-+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+
-| coreutils | CVE-2016-2781 | LOW | 8.30-3ubuntu2 | | coreutils: Non-privileged |
-| | | | | | session can escape to the |
-| | | | | | parent session in chroot |
-| | | | | | -->avd.aquasec.com/nvd/cve-2016-2781 |
-+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+
-| dnsutils | CVE-2021-25219 | MEDIUM | 1:9.16.1-0ubuntu2.8 | 1:9.16.1-0ubuntu2.9 | bind: Lame cache can be abused to |
-| | | | | | severely degrade resolver performance |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-25219 |
-+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+
-| libasn1-8-heimdal | CVE-2021-3671 | LOW | 7.7.0+dfsg-1ubuntu1 | | samba: Null pointer dereference |
-| | | | | | on missing sname in TGS-REQ |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-3671 |
-+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+
-| libc-bin | CVE-2021-35942 | MEDIUM | 2.31-0ubuntu9.2 | | glibc: Arbitrary read in wordexp() |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-35942 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2021-38604 | | | | glibc: NULL pointer dereference in |
-| | | | | | helper_thread() in mq_notify.c while |
-| | | | | | handling NOTIFY_REMOVED messages... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-38604 |
-+ +------------------+----------+ +-------------------------+-----------------------------------------+
-| | CVE-2016-10228 | LOW | | | glibc: iconv program can hang |
-| | | | | | when invoked with the -c option |
-| | | | | | -->avd.aquasec.com/nvd/cve-2016-10228 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2019-25013 | | | | glibc: buffer over-read in |
-| | | | | | iconv when processing invalid |
-| | | | | | multi-byte input sequences in... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2019-25013 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2020-27618 | | | | glibc: iconv when processing |
-| | | | | | invalid multi-byte input |
-| | | | | | sequences fails to advance the... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2020-27618 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2020-29562 | | | | glibc: assertion failure in iconv |
-| | | | | | when converting invalid UCS4 |
-| | | | | | -->avd.aquasec.com/nvd/cve-2020-29562 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2020-6096 | | | | glibc: signed comparison |
-| | | | | | vulnerability in the |
-| | | | | | ARMv7 memcpy function |
-| | | | | | -->avd.aquasec.com/nvd/cve-2020-6096 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2021-27645 | | | | glibc: Use-after-free in |
-| | | | | | addgetnetgrentX function |
-| | | | | | in netgroupcache.c |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-27645 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2021-3326 | | | | glibc: Assertion failure in |
-| | | | | | ISO-2022-JP-3 gconv module |
-| | | | | | related to combining characters |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-3326 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2021-33574 | | | | glibc: mq_notify does |
-| | | | | | not handle separately |
-| | | | | | allocated thread attributes |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-33574 |
-+----------------------+------------------+----------+ +-------------------------+-----------------------------------------+
-| libc6 | CVE-2021-35942 | MEDIUM | | | glibc: Arbitrary read in wordexp() |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-35942 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2021-38604 | | | | glibc: NULL pointer dereference in |
-| | | | | | helper_thread() in mq_notify.c while |
-| | | | | | handling NOTIFY_REMOVED messages... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-38604 |
-+ +------------------+----------+ +-------------------------+-----------------------------------------+
-| | CVE-2016-10228 | LOW | | | glibc: iconv program can hang |
-| | | | | | when invoked with the -c option |
-| | | | | | -->avd.aquasec.com/nvd/cve-2016-10228 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2019-25013 | | | | glibc: buffer over-read in |
-| | | | | | iconv when processing invalid |
-| | | | | | multi-byte input sequences in... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2019-25013 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2020-27618 | | | | glibc: iconv when processing |
-| | | | | | invalid multi-byte input |
-| | | | | | sequences fails to advance the... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2020-27618 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2020-29562 | | | | glibc: assertion failure in iconv |
-| | | | | | when converting invalid UCS4 |
-| | | | | | -->avd.aquasec.com/nvd/cve-2020-29562 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2020-6096 | | | | glibc: signed comparison |
-| | | | | | vulnerability in the |
-| | | | | | ARMv7 memcpy function |
-| | | | | | -->avd.aquasec.com/nvd/cve-2020-6096 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2021-27645 | | | | glibc: Use-after-free in |
-| | | | | | addgetnetgrentX function |
-| | | | | | in netgroupcache.c |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-27645 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2021-3326 | | | | glibc: Assertion failure in |
-| | | | | | ISO-2022-JP-3 gconv module |
-| | | | | | related to combining characters |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-3326 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2021-33574 | | | | glibc: mq_notify does |
-| | | | | | not handle separately |
-| | | | | | allocated thread attributes |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-33574 |
-+----------------------+------------------+ +--------------------------+-------------------------+-----------------------------------------+
-| libgmp10 | CVE-2021-43618 | | 2:6.2.0+dfsg-4 | | gmp: Integer overflow and resultant |
-| | | | | | buffer overflow via crafted input |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-43618 |
-+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+
-| libgssapi-krb5-2 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | krb5: Sending a request containing |
-| | | | | | PA-ENCRYPTED-CHALLENGE padata |
-| | | | | | element without using FAST could... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-36222 |
-+ +------------------+----------+ +-------------------------+-----------------------------------------+
-| | CVE-2018-5709 | LOW | | | krb5: integer overflow |
-| | | | | | in dbentry->n_key_data |
-| | | | | | in kadmin/dbutil/dump.c |
-| | | | | | -->avd.aquasec.com/nvd/cve-2018-5709 |
-+----------------------+------------------+ +--------------------------+-------------------------+-----------------------------------------+
-| libgssapi3-heimdal | CVE-2021-3671 | | 7.7.0+dfsg-1ubuntu1 | | samba: Null pointer dereference |
-| | | | | | on missing sname in TGS-REQ |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-3671 |
-+----------------------+ + + +-------------------------+ +
-| libhcrypto4-heimdal | | | | | |
-| | | | | | |
-| | | | | | |
-+----------------------+ + + +-------------------------+ +
-| libheimbase1-heimdal | | | | | |
-| | | | | | |
-| | | | | | |
-+----------------------+ + + +-------------------------+ +
-| libheimntlm0-heimdal | | | | | |
-| | | | | | |
-| | | | | | |
-+----------------------+ + + +-------------------------+ +
-| libhx509-5-heimdal | | | | | |
-| | | | | | |
-| | | | | | |
-+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+
-| libk5crypto3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | krb5: Sending a request containing |
-| | | | | | PA-ENCRYPTED-CHALLENGE padata |
-| | | | | | element without using FAST could... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-36222 |
-+ +------------------+----------+ +-------------------------+-----------------------------------------+
-| | CVE-2018-5709 | LOW | | | krb5: integer overflow |
-| | | | | | in dbentry->n_key_data |
-| | | | | | in kadmin/dbutil/dump.c |
-| | | | | | -->avd.aquasec.com/nvd/cve-2018-5709 |
-+----------------------+------------------+ +--------------------------+-------------------------+-----------------------------------------+
-| libkrb5-26-heimdal | CVE-2021-3671 | | 7.7.0+dfsg-1ubuntu1 | | samba: Null pointer dereference |
-| | | | | | on missing sname in TGS-REQ |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-3671 |
-+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+
-| libkrb5-3 | CVE-2021-36222 | MEDIUM | 1.17-6ubuntu4.1 | | krb5: Sending a request containing |
-| | | | | | PA-ENCRYPTED-CHALLENGE padata |
-| | | | | | element without using FAST could... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-36222 |
-+ +------------------+----------+ +-------------------------+-----------------------------------------+
-| | CVE-2018-5709 | LOW | | | krb5: integer overflow |
-| | | | | | in dbentry->n_key_data |
-| | | | | | in kadmin/dbutil/dump.c |
-| | | | | | -->avd.aquasec.com/nvd/cve-2018-5709 |
-+----------------------+------------------+----------+ +-------------------------+-----------------------------------------+
-| libkrb5support0 | CVE-2021-36222 | MEDIUM | | | krb5: Sending a request containing |
-| | | | | | PA-ENCRYPTED-CHALLENGE padata |
-| | | | | | element without using FAST could... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-36222 |
-+ +------------------+----------+ +-------------------------+-----------------------------------------+
-| | CVE-2018-5709 | LOW | | | krb5: integer overflow |
-| | | | | | in dbentry->n_key_data |
-| | | | | | in kadmin/dbutil/dump.c |
-| | | | | | -->avd.aquasec.com/nvd/cve-2018-5709 |
-+----------------------+------------------+ +--------------------------+-------------------------+-----------------------------------------+
-| libpcre3 | CVE-2017-11164 | | 2:8.39-12build1 | | pcre: OP_KETRMAX feature in the |
-| | | | | | match function in pcre_exec.c |
-| | | | | | -->avd.aquasec.com/nvd/cve-2017-11164 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2019-20838 | | | | pcre: Buffer over-read in JIT |
-| | | | | | when UTF is disabled and \X or... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2019-20838 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2020-14155 | | | | pcre: Integer overflow when |
-| | | | | | parsing callout numeric arguments |
-| | | | | | -->avd.aquasec.com/nvd/cve-2020-14155 |
-+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+
-| libpython3.8-minimal | CVE-2021-29921 | MEDIUM | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.1 | python-ipaddress: Improper input |
-| | | | | | validation of octal strings |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-29921 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2021-3737 | | | | python: urllib: HTTP client |
-| | | | | | possible infinite loop on |
-| | | | | | a 100 Continue response... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-3737 |
-+ +------------------+----------+ +-------------------------+-----------------------------------------+
-| | CVE-2021-23336 | LOW | | | python: Web cache poisoning |
-| | | | | | via urllib.parse.parse_qsl |
-| | | | | | and urllib.parse.parse_qs |
-| | | | | | by using a semicolon... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-23336 |
-+----------------------+------------------+----------+ +-------------------------+-----------------------------------------+
-| libpython3.8-stdlib | CVE-2021-29921 | MEDIUM | | 3.8.10-0ubuntu1~20.04.1 | python-ipaddress: Improper input |
-| | | | | | validation of octal strings |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-29921 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2021-3737 | | | | python: urllib: HTTP client |
-| | | | | | possible infinite loop on |
-| | | | | | a 100 Continue response... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-3737 |
-+ +------------------+----------+ +-------------------------+-----------------------------------------+
-| | CVE-2021-23336 | LOW | | | python: Web cache poisoning |
-| | | | | | via urllib.parse.parse_qsl |
-| | | | | | and urllib.parse.parse_qs |
-| | | | | | by using a semicolon... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-23336 |
-+----------------------+------------------+ +--------------------------+-------------------------+-----------------------------------------+
-| libroken18-heimdal | CVE-2021-3671 | | 7.7.0+dfsg-1ubuntu1 | | samba: Null pointer dereference |
-| | | | | | on missing sname in TGS-REQ |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-3671 |
-+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+
-| libsqlite3-0 | CVE-2020-9794 | MEDIUM | 3.31.1-4ubuntu0.2 | | An out-of-bounds read was |
-| | | | | | addressed with improved bounds |
-| | | | | | checking. This issue is... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2020-9794 |
-+ +------------------+----------+ +-------------------------+-----------------------------------------+
-| | CVE-2020-9849 | LOW | | | An information disclosure issue |
-| | | | | | was addressed with improved |
-| | | | | | state management. This issue... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2020-9849 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2020-9991 | | | | This issue was addressed |
-| | | | | | with improved checks. |
-| | | | | | This issue is fixed in... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2020-9991 |
-+----------------------+------------------+ +--------------------------+-------------------------+-----------------------------------------+
-| libtasn1-6 | CVE-2018-1000654 | | 4.16.0-2 | | libtasn1: Infinite loop in |
-| | | | | | _asn1_expand_object_id(ptree) |
-| | | | | | leads to memory exhaustion |
-| | | | | | -->avd.aquasec.com/nvd/cve-2018-1000654 |
-+----------------------+------------------+ +--------------------------+-------------------------+-----------------------------------------+
-| libwind0-heimdal | CVE-2021-3671 | | 7.7.0+dfsg-1ubuntu1 | | samba: Null pointer dereference |
-| | | | | | on missing sname in TGS-REQ |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-3671 |
-+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+
-| locales | CVE-2021-35942 | MEDIUM | 2.31-0ubuntu9.2 | | glibc: Arbitrary read in wordexp() |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-35942 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2021-38604 | | | | glibc: NULL pointer dereference in |
-| | | | | | helper_thread() in mq_notify.c while |
-| | | | | | handling NOTIFY_REMOVED messages... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-38604 |
-+ +------------------+----------+ +-------------------------+-----------------------------------------+
-| | CVE-2016-10228 | LOW | | | glibc: iconv program can hang |
-| | | | | | when invoked with the -c option |
-| | | | | | -->avd.aquasec.com/nvd/cve-2016-10228 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2019-25013 | | | | glibc: buffer over-read in |
-| | | | | | iconv when processing invalid |
-| | | | | | multi-byte input sequences in... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2019-25013 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2020-27618 | | | | glibc: iconv when processing |
-| | | | | | invalid multi-byte input |
-| | | | | | sequences fails to advance the... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2020-27618 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2020-29562 | | | | glibc: assertion failure in iconv |
-| | | | | | when converting invalid UCS4 |
-| | | | | | -->avd.aquasec.com/nvd/cve-2020-29562 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2020-6096 | | | | glibc: signed comparison |
-| | | | | | vulnerability in the |
-| | | | | | ARMv7 memcpy function |
-| | | | | | -->avd.aquasec.com/nvd/cve-2020-6096 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2021-27645 | | | | glibc: Use-after-free in |
-| | | | | | addgetnetgrentX function |
-| | | | | | in netgroupcache.c |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-27645 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2021-3326 | | | | glibc: Assertion failure in |
-| | | | | | ISO-2022-JP-3 gconv module |
-| | | | | | related to combining characters |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-3326 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2021-33574 | | | | glibc: mq_notify does |
-| | | | | | not handle separately |
-| | | | | | allocated thread attributes |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-33574 |
-+----------------------+------------------+ +--------------------------+-------------------------+-----------------------------------------+
-| login | CVE-2013-4235 | | 1:4.8.1-1ubuntu5.20.04.1 | | shadow-utils: TOCTOU race |
-| | | | | | conditions by copying and |
-| | | | | | removing directory trees |
-| | | | | | -->avd.aquasec.com/nvd/cve-2013-4235 |
-+----------------------+ + + +-------------------------+ +
-| passwd | | | | | |
-| | | | | | |
-| | | | | | |
-| | | | | | |
-+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+
-| perl-base | CVE-2020-16156 | MEDIUM | 5.30.0-9ubuntu0.2 | | [Signature Verification Bypass] |
-| | | | | | -->avd.aquasec.com/nvd/cve-2020-16156 |
-+----------------------+------------------+ +--------------------------+-------------------------+-----------------------------------------+
-| python3.8 | CVE-2021-29921 | | 3.8.10-0ubuntu1~20.04 | 3.8.10-0ubuntu1~20.04.1 | python-ipaddress: Improper input |
-| | | | | | validation of octal strings |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-29921 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2021-3737 | | | | python: urllib: HTTP client |
-| | | | | | possible infinite loop on |
-| | | | | | a 100 Continue response... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-3737 |
-+ +------------------+----------+ +-------------------------+-----------------------------------------+
-| | CVE-2021-23336 | LOW | | | python: Web cache poisoning |
-| | | | | | via urllib.parse.parse_qsl |
-| | | | | | and urllib.parse.parse_qs |
-| | | | | | by using a semicolon... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-23336 |
-+----------------------+------------------+----------+ +-------------------------+-----------------------------------------+
-| python3.8-minimal | CVE-2021-29921 | MEDIUM | | 3.8.10-0ubuntu1~20.04.1 | python-ipaddress: Improper input |
-| | | | | | validation of octal strings |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-29921 |
-+ +------------------+ + +-------------------------+-----------------------------------------+
-| | CVE-2021-3737 | | | | python: urllib: HTTP client |
-| | | | | | possible infinite loop on |
-| | | | | | a 100 Continue response... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-3737 |
-+ +------------------+----------+ +-------------------------+-----------------------------------------+
-| | CVE-2021-23336 | LOW | | | python: Web cache poisoning |
-| | | | | | via urllib.parse.parse_qsl |
-| | | | | | and urllib.parse.parse_qs |
-| | | | | | by using a semicolon... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2021-23336 |
-+----------------------+------------------+----------+--------------------------+-------------------------+-----------------------------------------+
-
-usr/local/bin/micro (gobinary)
-==============================
-Total: 1 (UNKNOWN: 0, LOW: 0, MEDIUM: 1, HIGH: 0, CRITICAL: 0)
-
-+------------------+------------------+----------+-------------------+---------------+---------------------------------------+
-| LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE |
-+------------------+------------------+----------+-------------------+---------------+---------------------------------------+
-| gopkg.in/yaml.v2 | CVE-2019-11254 | MEDIUM | v2.2.7 | v2.2.8 | kubernetes: Denial of |
-| | | | | | service in API server via |
-| | | | | | crafted YAML payloads by... |
-| | | | | | -->avd.aquasec.com/nvd/cve-2019-11254 |
-+------------------+------------------+----------+-------------------+---------------+---------------------------------------+
-```
diff --git a/stable/jackett/9.0.32/CHANGELOG.md b/stable/jackett/9.0.33/CHANGELOG.md
similarity index 91%
rename from stable/jackett/9.0.32/CHANGELOG.md
rename to stable/jackett/9.0.33/CHANGELOG.md
index 19f2bbe56e4..bc6d6e840b9 100644
--- a/stable/jackett/9.0.32/CHANGELOG.md
+++ b/stable/jackett/9.0.33/CHANGELOG.md
@@ -1,6 +1,15 @@
# Changelog
+
+### [jackett-9.0.33](https://github.com/truecharts/apps/compare/jackett-9.0.32...jackett-9.0.33) (2021-12-04)
+
+#### Chore
+
+* cleanup the ci for the security page a bit
+
+
+
### [jackett-9.0.32](https://github.com/truecharts/apps/compare/jackett-9.0.31...jackett-9.0.32) (2021-12-04)
@@ -88,12 +97,3 @@
-
-### [jackett-9.0.21](https://github.com/truecharts/apps/compare/jackett-9.0.20...jackett-9.0.21) (2021-11-22)
-
-#### Chore
-
-* update non-major ([#1380](https://github.com/truecharts/apps/issues/1380))
-
-#### Fix
-
diff --git a/stable/jackett/9.0.32/CONFIG.md b/stable/jackett/9.0.33/CONFIG.md
similarity index 100%
rename from stable/jackett/9.0.32/CONFIG.md
rename to stable/jackett/9.0.33/CONFIG.md
diff --git a/stable/jackett/9.0.32/Chart.lock b/stable/jackett/9.0.33/Chart.lock
similarity index 78%
rename from stable/jackett/9.0.32/Chart.lock
rename to stable/jackett/9.0.33/Chart.lock
index bc1da6dc381..1c938a616ba 100644
--- a/stable/jackett/9.0.32/Chart.lock
+++ b/stable/jackett/9.0.33/Chart.lock
@@ -3,4 +3,4 @@ dependencies:
repository: https://truecharts.org
version: 8.9.10
digest: sha256:76ef16a78cbfe53b0be5d9fac03039063f57b2b43f927e4cbfed13be1c939fcc
-generated: "2021-12-04T22:02:34.16799824Z"
+generated: "2021-12-04T22:22:20.831525987Z"
diff --git a/stable/jackett/9.0.32/Chart.yaml b/stable/jackett/9.0.33/Chart.yaml
similarity index 97%
rename from stable/jackett/9.0.32/Chart.yaml
rename to stable/jackett/9.0.33/Chart.yaml
index 0c4b5c3f575..3534770a3b5 100644
--- a/stable/jackett/9.0.32/Chart.yaml
+++ b/stable/jackett/9.0.33/Chart.yaml
@@ -21,7 +21,7 @@ name: jackett
sources:
- https://github.com/Jackett/Jackett
type: application
-version: 9.0.32
+version: 9.0.33
annotations:
truecharts.org/catagories: |
- media
diff --git a/stable/jackett/9.0.32/README.md b/stable/jackett/9.0.33/README.md
similarity index 100%
rename from stable/jackett/9.0.32/README.md
rename to stable/jackett/9.0.33/README.md
diff --git a/stable/jackett/9.0.32/app-readme.md b/stable/jackett/9.0.33/app-readme.md
similarity index 100%
rename from stable/jackett/9.0.32/app-readme.md
rename to stable/jackett/9.0.33/app-readme.md
diff --git a/stable/jackett/9.0.32/charts/common-8.9.10.tgz b/stable/jackett/9.0.33/charts/common-8.9.10.tgz
similarity index 100%
rename from stable/jackett/9.0.32/charts/common-8.9.10.tgz
rename to stable/jackett/9.0.33/charts/common-8.9.10.tgz
diff --git a/stable/jackett/9.0.32/helm-values.md b/stable/jackett/9.0.33/helm-values.md
similarity index 100%
rename from stable/jackett/9.0.32/helm-values.md
rename to stable/jackett/9.0.33/helm-values.md
diff --git a/stable/jackett/9.0.32/ix_values.yaml b/stable/jackett/9.0.33/ix_values.yaml
similarity index 100%
rename from stable/jackett/9.0.32/ix_values.yaml
rename to stable/jackett/9.0.33/ix_values.yaml
diff --git a/stable/jackett/9.0.32/questions.yaml b/stable/jackett/9.0.33/questions.yaml
similarity index 100%
rename from stable/jackett/9.0.32/questions.yaml
rename to stable/jackett/9.0.33/questions.yaml
diff --git a/stable/jackett/9.0.32/security.md b/stable/jackett/9.0.33/security.md
similarity index 99%
rename from stable/jackett/9.0.32/security.md
rename to stable/jackett/9.0.33/security.md
index 6a1b63f6bcf..d229542b9ef 100644
--- a/stable/jackett/9.0.32/security.md
+++ b/stable/jackett/9.0.33/security.md
@@ -1,3 +1,8 @@
+---
+hide:
+ - toc
+---
+
# Security Scan
## Helm-Chart
diff --git a/stable/jackett/9.0.32/templates/common.yaml b/stable/jackett/9.0.33/templates/common.yaml
similarity index 100%
rename from stable/jackett/9.0.32/templates/common.yaml
rename to stable/jackett/9.0.33/templates/common.yaml
diff --git a/stable/jackett/9.0.32/values.yaml b/stable/jackett/9.0.33/values.yaml
similarity index 100%
rename from stable/jackett/9.0.32/values.yaml
rename to stable/jackett/9.0.33/values.yaml