-
## CVE-2020-1753 - Medium Severity Vulnerability
Vulnerable Library - ansible-2.9.9.tar.gz
Radically simple IT automation
Library home page: https://files.pythonhosted.org/packages/00/5d/e10b83e0e60…
-
As a CSP, I want to scan my Kubernetes infrastructure for security weaknesses so that I can find vulnerabilities.
This issue focusses on Trivy as a one-time execution tool in a Zuul pipeline.
T…
-
**What happened**:
grype generates different output content for the same image, which breaks the reproducibility.
Motivation comes from the https://github.com/in-toto/attestation/issues/58 to pu…
-
This issue lists Renovate updates and detected dependencies. Read the [Dependency Dashboard](https://docs.renovatebot.com/key-concepts/dashboard/) docs to learn more.
> [!WARNING]
These dependencies …
-
## CVE-2021-32762 - High Severity Vulnerability
Vulnerable Library - redis6.2.6
Redis is an in-memory database that persists on disk. The data model is key-value, but many different kind of values …
-
## CVE-2024-7885 - High Severity Vulnerability
Vulnerable Library - undertow-core-2.2.18.Final.jar
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/io/…
-
Veracode Software Composition Analysis
===============================
Attribute | Details
| --- | --- |
Library | Apache Log4j
Description | Apache Log4j 1.2
Language | JAVA
Vulnerabi…
-
Veracode Software Composition Analysis
===============================
Attribute | Details
| --- | --- |
Library | Apache Log4j
Description | Apache Log4j 1.2
Language | JAVA
Vulnerabi…
-
## CVE-2018-18074 - High Severity Vulnerability
Vulnerable Library - requests-2.19.1-py2.py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt
…
-
Exploit modules in WordPress Exploit Framework often have a name which is _similar_ to what is recorded in the WPScan Vulnerability Database, but not _exactly_ the same.
Here is an example:
https:…