This commit is contained in:
NeilHanlon 2023-01-01 13:04:20 +00:00
parent 1ec8d1551e
commit b0db43c275
2 changed files with 3 additions and 3 deletions

View file

@ -51,7 +51,7 @@
}
a.toggle-more-links { cursor: pointer; }
</style>
<title>docker.io/rockylinux/rockylinux:8 (rocky 8.7) - Trivy Report - 2022-12-31 13:03:47.048335496 +0000 UTC m=+1.390033373 </title>
<title>docker.io/rockylinux/rockylinux:8 (rocky 8.7) - Trivy Report - 2023-01-01 13:04:19.211474713 +0000 UTC m=+1.434036104 </title>
<script>
window.onload = function() {
document.querySelectorAll('td.links').forEach(function(linkCell) {
@ -81,7 +81,7 @@
</script>
</head>
<body>
<h1>docker.io/rockylinux/rockylinux:8 (rocky 8.7) - Trivy Report - 2022-12-31 13:03:47.048365996 +0000 UTC m=+1.390063973</h1>
<h1>docker.io/rockylinux/rockylinux:8 (rocky 8.7) - Trivy Report - 2023-01-01 13:04:19.211500814 +0000 UTC m=+1.434062205</h1>
<table>
<tr class="group-header"><th colspan="6">rocky</th></tr>
<tr><th colspan="6">No Vulnerabilities found</th></tr>

View file

@ -13,7 +13,7 @@
"id": "CVE-2022-40897",
"name": "LanguageSpecificPackageVulnerability",
"shortDescription": {
"text": "pypa/setuptools vulnerable to Regular Expression Denial of Service (ReDoS)"
"text": "CVE-2022-40897 affecting package python-setuptools 40.2.0-6"
},
"fullDescription": {
"text": "Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py."