-
**What steps did you take and what happened:**
I am seeing a large number of trivy-operator generated vulnerability reports flagging CVEs for the following resources:
```
github.com/docker/dock…
-
The image `debian:stretch-slim` from Docker Hub, as of now, has a vulnerable glibc version:
```
$ docker images$ docker images
REPOSITORY TAG IMAGE ID CREA…
-
See https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9318 and https://bugzilla.gnome.org/show_bug.cgi?id=772726 . The initial CVSSv3 vulnerabiilty score is 7.8 (high).
-
Hi.
In 2013 i made a site with Frog CMS.
Now, the costumer lost their passwword and i don't know how to recover because the recover page don't work.
How can i do for it?
Thanks.
-
Since 0.19 Elm aims to mitigate some attack vectors which exist in HTML and JS. In that spirit, one good addition would be automatically adding `rel="noopener"` whenever the `target` attribute is set …
-
### Current Behavior:
Dependency-Track v3.4.1 (and 3.5.0-SNAPHOT) offers the following Audit Analysis states:
State | Description
------------ | -------------
EXPLOITABLE |The finding is explo…
-
### Role
I play modded minecraft
### Suggestion
When launching modpack on vulnerable versions, I want Prism to automatically add fixer mod for security vulnerabilty, see link below. Or warn me and …
-
Originally reported by: **Anonymous**
---
If cherrypy is running in proxy-mode ('tools.proxy.on': True) the remote ip is blindly set to the first "ip" in the array that is returned by split() (see l…
ghost updated
6 years ago
-
Currently, we store duplicated package-urls because of the way they are different structurally but similar when constructed as a purl whole, for example:
1st Scenario:
Purl A-
type-"pypi", name…
-
### Current Behavior
There are a few vulnerability items listed that are actually no longer valid as they have been withdrawn or rejected. Yet if a project has a new version and the BOM is processed …