Fix artifactory credentials #33
Annotations
4 errors and 135 warnings
stop vulnerabilities:
Dockerfile#L1
stop vulnerabilities:package
HIGH Vulnerability found in os package type (rpm) - glibc (fixed in: 2.28-225.el8_8.6)(CVE-2023-4911 - https://access.redhat.com/security/cve/CVE-2023-4911)
|
stop vulnerabilities:
Dockerfile#L1
stop vulnerabilities:package
HIGH Vulnerability found in os package type (rpm) - glibc-common (fixed in: 2.28-225.el8_8.6)(CVE-2023-4911 - https://access.redhat.com/security/cve/CVE-2023-4911)
|
stop vulnerabilities:
Dockerfile#L1
stop vulnerabilities:package
HIGH Vulnerability found in os package type (rpm) - glibc-minimal-langpack (fixed in: 2.28-225.el8_8.6)(CVE-2023-4911 - https://access.redhat.com/security/cve/CVE-2023-4911)
|
stop vulnerabilities:
Dockerfile#L1
stop vulnerabilities:package
HIGH Vulnerability found in os package type (rpm) - libnghttp2 (fixed in: 1.33.0-5.el8_8)(CVE-2023-44487 - https://access.redhat.com/security/cve/CVE-2023-44487)
|
warn dockerfile:
Dockerfile#L1
warn dockerfile:instruction
Dockerfile directive 'HEALTHCHECK' not found, matching condition 'not_exists' check
|
warn dockerfile:
Dockerfile#L1
warn dockerfile:instruction
Dockerfile directive 'USER' not found, matching condition 'not_exists' check
|
warn vulnerabilities:
Dockerfile#L1
warn vulnerabilities:stale_feed_data
The vulnerability feed for this image distro is older than MAXAGE (7) days
|
warn passwd_file:
Dockerfile#L1
warn passwd_file:content_not_available
Cannot locate /etc/passwd in image stored files archive: check analyzer settings.
|
warn dockerfile:
Dockerfile#L1
warn dockerfile:instruction
Dockerfile directive 'HEALTHCHECK' not found, matching condition 'not_exists' check
|
warn dockerfile:
Dockerfile#L1
warn dockerfile:instruction
Dockerfile directive 'USER' not found, matching condition 'not_exists' check
|
Vulnerability found: CVE-2019-12900:
Dockerfile#L1
CVE-2019-12900 Severity=Low Package=bzip2-libs-1.0.6-26.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2019-12900
|
Vulnerability found: CVE-2022-35252:
Dockerfile#L1
CVE-2022-35252 Severity=Low Package=curl-7.61.1-25.el8_7.3 Type=rpm Fix=7.61.1-30.el8 Url=https://access.redhat.com/security/cve/CVE-2022-35252
|
Vulnerability found: CVE-2022-43552:
Dockerfile#L1
CVE-2022-43552 Severity=Low Package=curl-7.61.1-25.el8_7.3 Type=rpm Fix=7.61.1-30.el8 Url=https://access.redhat.com/security/cve/CVE-2022-43552
|
Vulnerability found: CVE-2023-27534:
Dockerfile#L1
CVE-2023-27534 Severity=Low Package=curl-7.61.1-25.el8_7.3 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-27534
|
Vulnerability found: CVE-2023-27535:
Dockerfile#L1
CVE-2023-27535 Severity=Medium Package=curl-7.61.1-25.el8_7.3 Type=rpm Fix=7.61.1-30.el8_8.2 Url=https://access.redhat.com/security/cve/CVE-2023-27535
|
Vulnerability found: CVE-2023-27536:
Dockerfile#L1
CVE-2023-27536 Severity=Medium Package=curl-7.61.1-25.el8_7.3 Type=rpm Fix=7.61.1-30.el8_8.3 Url=https://access.redhat.com/security/cve/CVE-2023-27536
|
Vulnerability found: CVE-2023-28321:
Dockerfile#L1
CVE-2023-28321 Severity=Medium Package=curl-7.61.1-25.el8_7.3 Type=rpm Fix=7.61.1-30.el8_8.3 Url=https://access.redhat.com/security/cve/CVE-2023-28321
|
Vulnerability found: CVE-2023-28322:
Dockerfile#L1
CVE-2023-28322 Severity=Low Package=curl-7.61.1-25.el8_7.3 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-28322
|
Vulnerability found: CVE-2023-38546:
Dockerfile#L1
CVE-2023-38546 Severity=Low Package=curl-7.61.1-25.el8_7.3 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-38546
|
Vulnerability found: CVE-2019-8905:
Dockerfile#L1
CVE-2019-8905 Severity=Low Package=file-libs-5.33-21.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2019-8905
|
Vulnerability found: CVE-2019-8906:
Dockerfile#L1
CVE-2019-8906 Severity=Low Package=file-libs-5.33-21.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2019-8906
|
Vulnerability found: CVE-2023-4156:
Dockerfile#L1
CVE-2023-4156 Severity=Low Package=gawk-4.2.1-4.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-4156
|
Vulnerability found: CVE-2023-24593:
Dockerfile#L1
CVE-2023-24593 Severity=Low Package=glib2-2.56.4-159.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-24593
|
Vulnerability found: CVE-2023-25180:
Dockerfile#L1
CVE-2023-25180 Severity=Low Package=glib2-2.56.4-159.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-25180
|
Vulnerability found: CVE-2023-29499:
Dockerfile#L1
CVE-2023-29499 Severity=Low Package=glib2-2.56.4-159.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-29499
|
Vulnerability found: CVE-2023-32611:
Dockerfile#L1
CVE-2023-32611 Severity=Low Package=glib2-2.56.4-159.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-32611
|
Vulnerability found: CVE-2023-32636:
Dockerfile#L1
CVE-2023-32636 Severity=Low Package=glib2-2.56.4-159.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-32636
|
Vulnerability found: CVE-2023-32665:
Dockerfile#L1
CVE-2023-32665 Severity=Low Package=glib2-2.56.4-159.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-32665
|
Vulnerability found: CVE-2019-1010022:
Dockerfile#L1
CVE-2019-1010022 Severity=Medium Package=glibc-2.28-211.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2019-1010022
|
Vulnerability found: CVE-2021-43396:
Dockerfile#L1
CVE-2021-43396 Severity=Medium Package=glibc-2.28-211.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-43396
|
Vulnerability found: CVE-2023-0687:
Dockerfile#L1
CVE-2023-0687 Severity=Medium Package=glibc-2.28-211.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-0687
|
Vulnerability found: CVE-2023-4527:
Dockerfile#L1
CVE-2023-4527 Severity=Medium Package=glibc-2.28-211.el8 Type=rpm Fix=2.28-225.el8_8.6 Url=https://access.redhat.com/security/cve/CVE-2023-4527
|
Vulnerability found: CVE-2023-4806:
Dockerfile#L1
CVE-2023-4806 Severity=Medium Package=glibc-2.28-211.el8 Type=rpm Fix=2.28-225.el8_8.6 Url=https://access.redhat.com/security/cve/CVE-2023-4806
|
Vulnerability found: CVE-2023-4813:
Dockerfile#L1
CVE-2023-4813 Severity=Medium Package=glibc-2.28-211.el8 Type=rpm Fix=2.28-225.el8_8.6 Url=https://access.redhat.com/security/cve/CVE-2023-4813
|
Vulnerability found: CVE-2023-4911:
Dockerfile#L1
CVE-2023-4911 Severity=High Package=glibc-2.28-211.el8 Type=rpm Fix=2.28-225.el8_8.6 Url=https://access.redhat.com/security/cve/CVE-2023-4911
|
Vulnerability found: CVE-2019-1010022:
Dockerfile#L1
CVE-2019-1010022 Severity=Medium Package=glibc-common-2.28-211.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2019-1010022
|
Vulnerability found: CVE-2021-43396:
Dockerfile#L1
CVE-2021-43396 Severity=Medium Package=glibc-common-2.28-211.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-43396
|
Vulnerability found: CVE-2023-0687:
Dockerfile#L1
CVE-2023-0687 Severity=Medium Package=glibc-common-2.28-211.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-0687
|
Vulnerability found: CVE-2023-4527:
Dockerfile#L1
CVE-2023-4527 Severity=Medium Package=glibc-common-2.28-211.el8 Type=rpm Fix=2.28-225.el8_8.6 Url=https://access.redhat.com/security/cve/CVE-2023-4527
|
Vulnerability found: CVE-2023-4806:
Dockerfile#L1
CVE-2023-4806 Severity=Medium Package=glibc-common-2.28-211.el8 Type=rpm Fix=2.28-225.el8_8.6 Url=https://access.redhat.com/security/cve/CVE-2023-4806
|
Vulnerability found: CVE-2023-4813:
Dockerfile#L1
CVE-2023-4813 Severity=Medium Package=glibc-common-2.28-211.el8 Type=rpm Fix=2.28-225.el8_8.6 Url=https://access.redhat.com/security/cve/CVE-2023-4813
|
Vulnerability found: CVE-2023-4911:
Dockerfile#L1
CVE-2023-4911 Severity=High Package=glibc-common-2.28-211.el8 Type=rpm Fix=2.28-225.el8_8.6 Url=https://access.redhat.com/security/cve/CVE-2023-4911
|
Vulnerability found: CVE-2019-1010022:
Dockerfile#L1
CVE-2019-1010022 Severity=Medium Package=glibc-minimal-langpack-2.28-211.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2019-1010022
|
Vulnerability found: CVE-2021-43396:
Dockerfile#L1
CVE-2021-43396 Severity=Medium Package=glibc-minimal-langpack-2.28-211.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-43396
|
Vulnerability found: CVE-2023-0687:
Dockerfile#L1
CVE-2023-0687 Severity=Medium Package=glibc-minimal-langpack-2.28-211.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-0687
|
Vulnerability found: CVE-2023-4527:
Dockerfile#L1
CVE-2023-4527 Severity=Medium Package=glibc-minimal-langpack-2.28-211.el8 Type=rpm Fix=2.28-225.el8_8.6 Url=https://access.redhat.com/security/cve/CVE-2023-4527
|
Vulnerability found: CVE-2023-4806:
Dockerfile#L1
CVE-2023-4806 Severity=Medium Package=glibc-minimal-langpack-2.28-211.el8 Type=rpm Fix=2.28-225.el8_8.6 Url=https://access.redhat.com/security/cve/CVE-2023-4806
|
Vulnerability found: CVE-2023-4813:
Dockerfile#L1
CVE-2023-4813 Severity=Medium Package=glibc-minimal-langpack-2.28-211.el8 Type=rpm Fix=2.28-225.el8_8.6 Url=https://access.redhat.com/security/cve/CVE-2023-4813
|
Vulnerability found: CVE-2023-4911:
Dockerfile#L1
CVE-2023-4911 Severity=High Package=glibc-minimal-langpack-2.28-211.el8 Type=rpm Fix=2.28-225.el8_8.6 Url=https://access.redhat.com/security/cve/CVE-2023-4911
|
Vulnerability found: CVE-2021-43618:
Dockerfile#L1
CVE-2021-43618 Severity=Low Package=gmp-6.1.2-10.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-43618
|
Vulnerability found: CVE-2022-3219:
Dockerfile#L1
CVE-2022-3219 Severity=Low Package=gnupg2-2.2.20-3.el8_6 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2022-3219
|
Vulnerability found: CVE-2022-34903:
Dockerfile#L1
CVE-2022-34903 Severity=Medium Package=gnupg2-2.2.20-3.el8_6 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2022-34903
|
Vulnerability found: CVE-2021-4209:
Dockerfile#L1
CVE-2021-4209 Severity=Low Package=gnutls-3.6.16-6.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-4209
|
Vulnerability found: CVE-2018-1000880:
Dockerfile#L1
CVE-2018-1000880 Severity=Low Package=libarchive-3.3.3-4.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2018-1000880
|
Vulnerability found: CVE-2020-21674:
Dockerfile#L1
CVE-2020-21674 Severity=Medium Package=libarchive-3.3.3-4.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2020-21674
|
Vulnerability found: CVE-2022-36227:
Dockerfile#L1
CVE-2022-36227 Severity=Low Package=libarchive-3.3.3-4.el8 Type=rpm Fix=3.3.3-5.el8 Url=https://access.redhat.com/security/cve/CVE-2022-36227
|
Vulnerability found: CVE-2023-30571:
Dockerfile#L1
CVE-2023-30571 Severity=Medium Package=libarchive-3.3.3-4.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-30571
|
Vulnerability found: CVE-2023-2602:
Dockerfile#L1
CVE-2023-2602 Severity=Low Package=libcap-2.48-4.el8 Type=rpm Fix=2.48-5.el8_8 Url=https://access.redhat.com/security/cve/CVE-2023-2602
|
Vulnerability found: CVE-2023-2603:
Dockerfile#L1
CVE-2023-2603 Severity=Medium Package=libcap-2.48-4.el8 Type=rpm Fix=2.48-5.el8_8 Url=https://access.redhat.com/security/cve/CVE-2023-2603
|
Vulnerability found: CVE-2022-35252:
Dockerfile#L1
CVE-2022-35252 Severity=Low Package=libcurl-7.61.1-25.el8_7.3 Type=rpm Fix=7.61.1-30.el8 Url=https://access.redhat.com/security/cve/CVE-2022-35252
|
Vulnerability found: CVE-2022-43552:
Dockerfile#L1
CVE-2022-43552 Severity=Low Package=libcurl-7.61.1-25.el8_7.3 Type=rpm Fix=7.61.1-30.el8 Url=https://access.redhat.com/security/cve/CVE-2022-43552
|
Vulnerability found: CVE-2023-27534:
Dockerfile#L1
CVE-2023-27534 Severity=Low Package=libcurl-7.61.1-25.el8_7.3 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-27534
|
Vulnerability found: CVE-2023-27535:
Dockerfile#L1
CVE-2023-27535 Severity=Medium Package=libcurl-7.61.1-25.el8_7.3 Type=rpm Fix=7.61.1-30.el8_8.2 Url=https://access.redhat.com/security/cve/CVE-2023-27535
|
Vulnerability found: CVE-2023-27536:
Dockerfile#L1
CVE-2023-27536 Severity=Medium Package=libcurl-7.61.1-25.el8_7.3 Type=rpm Fix=7.61.1-30.el8_8.3 Url=https://access.redhat.com/security/cve/CVE-2023-27536
|
Vulnerability found: CVE-2023-28321:
Dockerfile#L1
CVE-2023-28321 Severity=Medium Package=libcurl-7.61.1-25.el8_7.3 Type=rpm Fix=7.61.1-30.el8_8.3 Url=https://access.redhat.com/security/cve/CVE-2023-28321
|
Vulnerability found: CVE-2023-28322:
Dockerfile#L1
CVE-2023-28322 Severity=Low Package=libcurl-7.61.1-25.el8_7.3 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-28322
|
Vulnerability found: CVE-2023-38546:
Dockerfile#L1
CVE-2023-38546 Severity=Low Package=libcurl-7.61.1-25.el8_7.3 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-38546
|
Vulnerability found: CVE-2019-14250:
Dockerfile#L1
CVE-2019-14250 Severity=Low Package=libgcc-8.5.0-16.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2019-14250
|
Vulnerability found: CVE-2020-35536:
Dockerfile#L1
CVE-2020-35536 Severity=Low Package=libgcc-8.5.0-16.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2020-35536
|
Vulnerability found: CVE-2020-35537:
Dockerfile#L1
CVE-2020-35537 Severity=Low Package=libgcc-8.5.0-16.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2020-35537
|
Vulnerability found: CVE-2021-42694:
Dockerfile#L1
CVE-2021-42694 Severity=Medium Package=libgcc-8.5.0-16.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-42694
|
Vulnerability found: CVE-2022-27943:
Dockerfile#L1
CVE-2022-27943 Severity=Low Package=libgcc-8.5.0-16.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2022-27943
|
Vulnerability found: CVE-2023-4039:
Dockerfile#L1
CVE-2023-4039 Severity=Medium Package=libgcc-8.5.0-16.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-4039
|
Vulnerability found: CVE-2019-12904:
Dockerfile#L1
CVE-2019-12904 Severity=Medium Package=libgcrypt-1.8.5-7.el8_6 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2019-12904
|
Vulnerability found: CVE-2023-44487:
Dockerfile#L1
CVE-2023-44487 Severity=High Package=libnghttp2-1.33.0-3.el8_2.1 Type=rpm Fix=1.33.0-5.el8_8 Url=https://access.redhat.com/security/cve/CVE-2023-44487
|
Vulnerability found: CVE-2021-44569:
Dockerfile#L1
CVE-2021-44569 Severity=Medium Package=libsolv-0.7.20-4.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-44569
|
Vulnerability found: CVE-2021-44570:
Dockerfile#L1
CVE-2021-44570 Severity=Medium Package=libsolv-0.7.20-4.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-44570
|
Vulnerability found: CVE-2021-44571:
Dockerfile#L1
CVE-2021-44571 Severity=Medium Package=libsolv-0.7.20-4.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-44571
|
Vulnerability found: CVE-2021-44573:
Dockerfile#L1
CVE-2021-44573 Severity=Medium Package=libsolv-0.7.20-4.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-44573
|
Vulnerability found: CVE-2021-44574:
Dockerfile#L1
CVE-2021-44574 Severity=Medium Package=libsolv-0.7.20-4.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-44574
|
Vulnerability found: CVE-2021-44575:
Dockerfile#L1
CVE-2021-44575 Severity=Medium Package=libsolv-0.7.20-4.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-44575
|
Vulnerability found: CVE-2021-44576:
Dockerfile#L1
CVE-2021-44576 Severity=Medium Package=libsolv-0.7.20-4.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-44576
|
Vulnerability found: CVE-2021-44577:
Dockerfile#L1
CVE-2021-44577 Severity=Medium Package=libsolv-0.7.20-4.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-44577
|
Vulnerability found: CVE-2023-1667:
Dockerfile#L1
CVE-2023-1667 Severity=Medium Package=libssh-0.9.6-3.el8 Type=rpm Fix=0.9.6-10.el8_8 Url=https://access.redhat.com/security/cve/CVE-2023-1667
|
Vulnerability found: CVE-2023-2283:
Dockerfile#L1
CVE-2023-2283 Severity=Medium Package=libssh-0.9.6-3.el8 Type=rpm Fix=0.9.6-10.el8_8 Url=https://access.redhat.com/security/cve/CVE-2023-2283
|
Vulnerability found: CVE-2023-1667:
Dockerfile#L1
CVE-2023-1667 Severity=Medium Package=libssh-config-0.9.6-3.el8 Type=rpm Fix=0.9.6-10.el8_8 Url=https://access.redhat.com/security/cve/CVE-2023-1667
|
Vulnerability found: CVE-2023-2283:
Dockerfile#L1
CVE-2023-2283 Severity=Medium Package=libssh-config-0.9.6-3.el8 Type=rpm Fix=0.9.6-10.el8_8 Url=https://access.redhat.com/security/cve/CVE-2023-2283
|
Vulnerability found: CVE-2019-14250:
Dockerfile#L1
CVE-2019-14250 Severity=Low Package=libstdc++-8.5.0-16.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2019-14250
|
Vulnerability found: CVE-2020-35536:
Dockerfile#L1
CVE-2020-35536 Severity=Low Package=libstdc++-8.5.0-16.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2020-35536
|
Vulnerability found: CVE-2020-35537:
Dockerfile#L1
CVE-2020-35537 Severity=Low Package=libstdc++-8.5.0-16.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2020-35537
|
Vulnerability found: CVE-2021-42694:
Dockerfile#L1
CVE-2021-42694 Severity=Medium Package=libstdc++-8.5.0-16.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-42694
|
Vulnerability found: CVE-2022-27943:
Dockerfile#L1
CVE-2022-27943 Severity=Low Package=libstdc++-8.5.0-16.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2022-27943
|
Vulnerability found: CVE-2023-4039:
Dockerfile#L1
CVE-2023-4039 Severity=Medium Package=libstdc++-8.5.0-16.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-4039
|
Vulnerability found: CVE-2018-1000654:
Dockerfile#L1
CVE-2018-1000654 Severity=Low Package=libtasn1-4.13-4.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2018-1000654
|
Vulnerability found: CVE-2023-28484:
Dockerfile#L1
CVE-2023-28484 Severity=Medium Package=libxml2-2.9.7-15.el8_7.1 Type=rpm Fix=2.9.7-16.el8_8.1 Url=https://access.redhat.com/security/cve/CVE-2023-28484
|
Vulnerability found: CVE-2023-29469:
Dockerfile#L1
CVE-2023-29469 Severity=Medium Package=libxml2-2.9.7-15.el8_7.1 Type=rpm Fix=2.9.7-16.el8_8.1 Url=https://access.redhat.com/security/cve/CVE-2023-29469
|
Vulnerability found: CVE-2023-39615:
Dockerfile#L1
CVE-2023-39615 Severity=Medium Package=libxml2-2.9.7-15.el8_7.1 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-39615
|
Vulnerability found: CVE-2023-45322:
Dockerfile#L1
CVE-2023-45322 Severity=Low Package=libxml2-2.9.7-15.el8_7.1 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-45322
|
Vulnerability found: CVE-2021-24032:
Dockerfile#L1
CVE-2021-24032 Severity=Low Package=libzstd-1.4.4-1.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-24032
|
Vulnerability found: CVE-2022-4899:
Dockerfile#L1
CVE-2022-4899 Severity=Low Package=libzstd-1.4.4-1.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2022-4899
|
Vulnerability found: CVE-2019-17543:
Dockerfile#L1
CVE-2019-17543 Severity=Medium Package=lz4-libs-1.8.3-3.el8_4 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2019-17543
|
Vulnerability found: CVE-2020-19185:
Dockerfile#L1
CVE-2020-19185 Severity=Low Package=ncurses-base-6.1-9.20180224.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2020-19185
|
Vulnerability found: CVE-2020-19186:
Dockerfile#L1
CVE-2020-19186 Severity=Low Package=ncurses-base-6.1-9.20180224.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2020-19186
|
Vulnerability found: CVE-2020-19187:
Dockerfile#L1
CVE-2020-19187 Severity=Low Package=ncurses-base-6.1-9.20180224.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2020-19187
|
Vulnerability found: CVE-2020-19188:
Dockerfile#L1
CVE-2020-19188 Severity=Low Package=ncurses-base-6.1-9.20180224.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2020-19188
|
Vulnerability found: CVE-2020-19189:
Dockerfile#L1
CVE-2020-19189 Severity=Low Package=ncurses-base-6.1-9.20180224.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2020-19189
|
Vulnerability found: CVE-2020-19190:
Dockerfile#L1
CVE-2020-19190 Severity=Low Package=ncurses-base-6.1-9.20180224.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2020-19190
|
Vulnerability found: CVE-2021-39537:
Dockerfile#L1
CVE-2021-39537 Severity=Low Package=ncurses-base-6.1-9.20180224.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-39537
|
Vulnerability found: CVE-2023-29491:
Dockerfile#L1
CVE-2023-29491 Severity=Medium Package=ncurses-base-6.1-9.20180224.el8 Type=rpm Fix=6.1-9.20180224.el8_8.1 Url=https://access.redhat.com/security/cve/CVE-2023-29491
|
Vulnerability found: CVE-2020-19185:
Dockerfile#L1
CVE-2020-19185 Severity=Low Package=ncurses-libs-6.1-9.20180224.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2020-19185
|
Vulnerability found: CVE-2020-19186:
Dockerfile#L1
CVE-2020-19186 Severity=Low Package=ncurses-libs-6.1-9.20180224.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2020-19186
|
Vulnerability found: CVE-2020-19187:
Dockerfile#L1
CVE-2020-19187 Severity=Low Package=ncurses-libs-6.1-9.20180224.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2020-19187
|
Vulnerability found: CVE-2020-19188:
Dockerfile#L1
CVE-2020-19188 Severity=Low Package=ncurses-libs-6.1-9.20180224.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2020-19188
|
Vulnerability found: CVE-2020-19189:
Dockerfile#L1
CVE-2020-19189 Severity=Low Package=ncurses-libs-6.1-9.20180224.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2020-19189
|
Vulnerability found: CVE-2020-19190:
Dockerfile#L1
CVE-2020-19190 Severity=Low Package=ncurses-libs-6.1-9.20180224.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2020-19190
|
Vulnerability found: CVE-2021-39537:
Dockerfile#L1
CVE-2021-39537 Severity=Low Package=ncurses-libs-6.1-9.20180224.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-39537
|
Vulnerability found: CVE-2023-29491:
Dockerfile#L1
CVE-2023-29491 Severity=Medium Package=ncurses-libs-6.1-9.20180224.el8 Type=rpm Fix=6.1-9.20180224.el8_8.1 Url=https://access.redhat.com/security/cve/CVE-2023-29491
|
Vulnerability found: CVE-2023-2953:
Dockerfile#L1
CVE-2023-2953 Severity=Low Package=openldap-2.4.46-18.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-2953
|
Vulnerability found: CVE-2021-43085:
Dockerfile#L1
CVE-2021-43085 Severity=Low Package=openssl-libs-1.1.1k-9.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-43085
|
Vulnerability found: CVE-2023-2650:
Dockerfile#L1
CVE-2023-2650 Severity=Medium Package=openssl-libs-1.1.1k-9.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-2650
|
Vulnerability found: CVE-2023-3446:
Dockerfile#L1
CVE-2023-3446 Severity=Low Package=openssl-libs-1.1.1k-9.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-3446
|
Vulnerability found: CVE-2023-5678:
Dockerfile#L1
CVE-2023-5678 Severity=Low Package=openssl-libs-1.1.1k-9.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-5678
|
Vulnerability found: CVE-2023-4016:
Dockerfile#L1
CVE-2023-4016 Severity=Low Package=procps-ng-3.3.15-9.el8 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-4016
|
Vulnerability found: CVE-2021-35937:
Dockerfile#L1
CVE-2021-35937 Severity=Medium Package=rpm-4.14.3-24.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-35937
|
Vulnerability found: CVE-2021-35938:
Dockerfile#L1
CVE-2021-35938 Severity=Medium Package=rpm-4.14.3-24.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-35938
|
Vulnerability found: CVE-2021-35939:
Dockerfile#L1
CVE-2021-35939 Severity=Medium Package=rpm-4.14.3-24.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-35939
|
Vulnerability found: CVE-2021-35937:
Dockerfile#L1
CVE-2021-35937 Severity=Medium Package=rpm-libs-4.14.3-24.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-35937
|
Vulnerability found: CVE-2021-35938:
Dockerfile#L1
CVE-2021-35938 Severity=Medium Package=rpm-libs-4.14.3-24.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-35938
|
Vulnerability found: CVE-2021-35939:
Dockerfile#L1
CVE-2021-35939 Severity=Medium Package=rpm-libs-4.14.3-24.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-35939
|
Vulnerability found: CVE-2019-9937:
Dockerfile#L1
CVE-2019-9937 Severity=Low Package=sqlite-libs-3.26.0-17.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2019-9937
|
Vulnerability found: CVE-2020-24736:
Dockerfile#L1
CVE-2020-24736 Severity=Medium Package=sqlite-libs-3.26.0-17.el8_7 Type=rpm Fix=3.26.0-18.el8_8 Url=https://access.redhat.com/security/cve/CVE-2020-24736
|
Vulnerability found: CVE-2023-36191:
Dockerfile#L1
CVE-2023-36191 Severity=Low Package=sqlite-libs-3.26.0-17.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-36191
|
Vulnerability found: CVE-2021-3997:
Dockerfile#L1
CVE-2021-3997 Severity=Medium Package=systemd-libs-239-68.el8_7.4 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2021-3997
|
Vulnerability found: CVE-2023-26604:
Dockerfile#L1
CVE-2023-26604 Severity=Medium Package=systemd-libs-239-68.el8_7.4 Type=rpm Fix=239-74.el8_8.2 Url=https://access.redhat.com/security/cve/CVE-2023-26604
|
Vulnerability found: CVE-2023-45853:
Dockerfile#L1
CVE-2023-45853 Severity=Medium Package=zlib-1.2.11-21.el8_7 Type=rpm Fix=None Url=https://access.redhat.com/security/cve/CVE-2023-45853
|
scratch
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
|
scratch
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
|
ubi
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
|
ubi
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
|