fix: use aws mirror for trivy db #388
Annotations
10 errors and 10 warnings
Parse vulnerability scan results
HIGH CVE-2022-28391 busybox: busybox: remote attackers may execute arbitrary code if netstat is used (https://avd.aquasec.com/nvd/cve-2022-28391)
|
Parse vulnerability scan results
CRITICAL CVE-2022-22822 expat: expat: Integer overflow in addBinding in xmlparse.c (https://avd.aquasec.com/nvd/cve-2022-22822)
|
Parse vulnerability scan results
CRITICAL CVE-2022-22823 expat: expat: Integer overflow in build_model in xmlparse.c (https://avd.aquasec.com/nvd/cve-2022-22823)
|
Parse vulnerability scan results
CRITICAL CVE-2022-22824 expat: expat: Integer overflow in defineAttribute in xmlparse.c (https://avd.aquasec.com/nvd/cve-2022-22824)
|
Parse vulnerability scan results
CRITICAL CVE-2022-23852 expat: expat: Integer overflow in function XML_GetBuffer (https://avd.aquasec.com/nvd/cve-2022-23852)
|
Parse vulnerability scan results
CRITICAL CVE-2022-25235 expat: expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (https://avd.aquasec.com/nvd/cve-2022-25235)
|
Parse vulnerability scan results
CRITICAL CVE-2022-25236 expat: expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (https://avd.aquasec.com/nvd/cve-2022-25236)
|
Parse vulnerability scan results
CRITICAL CVE-2022-25315 expat: expat: Integer overflow in storeRawNames() (https://avd.aquasec.com/nvd/cve-2022-25315)
|
Parse vulnerability scan results
HIGH CVE-2021-45960 expat: expat: Large number of prefixed XML attributes on a single tag can crash libexpat (https://avd.aquasec.com/nvd/cve-2021-45960)
|
Parse vulnerability scan results
HIGH CVE-2021-46143 expat: expat: Integer overflow in doProlog in xmlparse.c (https://avd.aquasec.com/nvd/cve-2021-46143)
|
Parse vulnerability scan results
MEDIUM CVE-2022-25313 expat: expat: Stack exhaustion in doctype parsing (https://avd.aquasec.com/nvd/cve-2022-25313)
|
Parse vulnerability scan results
MEDIUM CVE-2021-37750 krb5-libs: krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field (https://avd.aquasec.com/nvd/cve-2021-37750)
|
Parse vulnerability scan results
MEDIUM CVE-2022-2097 libcrypto1.1: openssl: AES OCB fails to encrypt some bytes (https://avd.aquasec.com/nvd/cve-2022-2097)
|
Parse vulnerability scan results
MEDIUM CVE-2022-4304 libcrypto1.1: openssl: timing attack in RSA Decryption implementation (https://avd.aquasec.com/nvd/cve-2022-4304)
|
Parse vulnerability scan results
MEDIUM CVE-2023-0465 libcrypto1.1: openssl: Invalid certificate policies in leaf certificates are silently ignored (https://avd.aquasec.com/nvd/cve-2023-0465)
|
Parse vulnerability scan results
MEDIUM CVE-2023-2650 libcrypto1.1: openssl: Possible DoS translating ASN.1 object identifiers (https://avd.aquasec.com/nvd/cve-2023-2650)
|
Parse vulnerability scan results
MEDIUM CVE-2023-3446 libcrypto1.1: openssl: Excessive time spent checking DH keys and parameters (https://avd.aquasec.com/nvd/cve-2023-3446)
|
Parse vulnerability scan results
MEDIUM CVE-2023-3817 libcrypto1.1: OpenSSL: Excessive time spent checking DH q parameter value (https://avd.aquasec.com/nvd/cve-2023-3817)
|
Parse vulnerability scan results
MEDIUM CVE-2023-5678 libcrypto1.1: openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow (https://avd.aquasec.com/nvd/cve-2023-5678)
|
Parse vulnerability scan results
MEDIUM CVE-2022-2097 libssl1.1: openssl: AES OCB fails to encrypt some bytes (https://avd.aquasec.com/nvd/cve-2022-2097)
|
Loading