mirror of
https://github.com/rocky-linux/sig-cloud-instance-images.git
synced 2024-12-20 08:08:29 +00:00
deploy: 8ccce7fd31
This commit is contained in:
parent
1ec8d1551e
commit
b0db43c275
@ -51,7 +51,7 @@
|
|||||||
}
|
}
|
||||||
a.toggle-more-links { cursor: pointer; }
|
a.toggle-more-links { cursor: pointer; }
|
||||||
</style>
|
</style>
|
||||||
<title>docker.io/rockylinux/rockylinux:8 (rocky 8.7) - Trivy Report - 2022-12-31 13:03:47.048335496 +0000 UTC m=+1.390033373 </title>
|
<title>docker.io/rockylinux/rockylinux:8 (rocky 8.7) - Trivy Report - 2023-01-01 13:04:19.211474713 +0000 UTC m=+1.434036104 </title>
|
||||||
<script>
|
<script>
|
||||||
window.onload = function() {
|
window.onload = function() {
|
||||||
document.querySelectorAll('td.links').forEach(function(linkCell) {
|
document.querySelectorAll('td.links').forEach(function(linkCell) {
|
||||||
@ -81,7 +81,7 @@
|
|||||||
</script>
|
</script>
|
||||||
</head>
|
</head>
|
||||||
<body>
|
<body>
|
||||||
<h1>docker.io/rockylinux/rockylinux:8 (rocky 8.7) - Trivy Report - 2022-12-31 13:03:47.048365996 +0000 UTC m=+1.390063973</h1>
|
<h1>docker.io/rockylinux/rockylinux:8 (rocky 8.7) - Trivy Report - 2023-01-01 13:04:19.211500814 +0000 UTC m=+1.434062205</h1>
|
||||||
<table>
|
<table>
|
||||||
<tr class="group-header"><th colspan="6">rocky</th></tr>
|
<tr class="group-header"><th colspan="6">rocky</th></tr>
|
||||||
<tr><th colspan="6">No Vulnerabilities found</th></tr>
|
<tr><th colspan="6">No Vulnerabilities found</th></tr>
|
||||||
|
@ -13,7 +13,7 @@
|
|||||||
"id": "CVE-2022-40897",
|
"id": "CVE-2022-40897",
|
||||||
"name": "LanguageSpecificPackageVulnerability",
|
"name": "LanguageSpecificPackageVulnerability",
|
||||||
"shortDescription": {
|
"shortDescription": {
|
||||||
"text": "pypa/setuptools vulnerable to Regular Expression Denial of Service (ReDoS)"
|
"text": "CVE-2022-40897 affecting package python-setuptools 40.2.0-6"
|
||||||
},
|
},
|
||||||
"fullDescription": {
|
"fullDescription": {
|
||||||
"text": "Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py."
|
"text": "Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py."
|
||||||
|
Loading…
Reference in New Issue
Block a user