Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Test #5

Closed
wants to merge 2 commits into from
Closed

Test #5

wants to merge 2 commits into from

Conversation

pratheeshrussell-qb
Copy link
Owner

No description provided.

@pratheeshrussell-qb
Copy link
Owner Author

Vulnerability Scan Report for Dockerfile

{
  "version": "15.0.7",
  "scan": {
    "analyzer": {
      "id": "trivy",
      "name": "Trivy",
      "vendor": {
        "name": "Aqua Security"
      },
      "version": "0.59.1"
    },
    "end_time": "2025-02-20T08:37:46",
    "scanner": {
      "id": "trivy",
      "name": "Trivy",
      "url": "https://github.com/aquasecurity/trivy/",
      "vendor": {
        "name": "Aqua Security"
      },
      "version": "0.59.1"
    },
    "start_time": "2025-02-20T08:37:46",
    "status": "success",
    "type": "container_scanning"
  },
  "vulnerabilities": [
    {
      "id": "CVE-2021-36159",
      "name": "libfetch: an out of boundary read while libfetch uses strtol to parse the relevant numbers into address bytes leads to information leak or crash",
      "description": "libfetch before 2021-07-26, as used in apk-tools, xbps, and other products, mishandles numeric strings for the FTP and HTTP protocols. The FTP passive mode implementation allows an out-of-bounds read because strtol is used to parse the relevant numbers into address bytes. It does not check if the line ends prematurely. If it does, the for-loop condition checks for the '\0' terminator one byte too late.",
      "severity": "Critical",
      "solution": "Upgrade apk-tools to 2.10.7-r0",
      "location": {
        "dependency": {
          "package": {
            "name": "apk-tools"
          },
          "version": "2.10.6-r0"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-36159",
          "value": "CVE-2021-36159",
          "url": "https://avd.aquasec.com/nvd/cve-2021-36159"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-36159"
        },{
          "url": "https://github.com/freebsd/freebsd-src/commits/main/lib/libfetch"
        },{
          "url": "https://gitlab.alpinelinux.org/alpine/apk-tools/-/issues/10749"
        },{
          "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E"
        },{
          "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E"
        },{
          "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E"
        },{
          "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36159"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-36159"
        }
      ]
    },
    {
      "id": "CVE-2021-42378",
      "name": "busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i()",
      "description": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function",
      "severity": "High",
      "solution": "Upgrade busybox to 1.31.1-r11",
      "location": {
        "dependency": {
          "package": {
            "name": "busybox"
          },
          "version": "1.31.1-r10"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-42378",
          "value": "CVE-2021-42378",
          "url": "https://avd.aquasec.com/nvd/cve-2021-42378"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-42378"
        },{
          "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
        },{
          "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42378"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5179-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
        }
      ]
    },
    {
      "id": "CVE-2021-42379",
      "name": "busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file()",
      "description": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function",
      "severity": "High",
      "solution": "Upgrade busybox to 1.31.1-r11",
      "location": {
        "dependency": {
          "package": {
            "name": "busybox"
          },
          "version": "1.31.1-r10"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-42379",
          "value": "CVE-2021-42379",
          "url": "https://avd.aquasec.com/nvd/cve-2021-42379"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-42379"
        },{
          "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
        },{
          "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42379"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5179-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
        }
      ]
    },
    {
      "id": "CVE-2021-42380",
      "name": "busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar()",
      "description": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function",
      "severity": "High",
      "solution": "Upgrade busybox to 1.31.1-r11",
      "location": {
        "dependency": {
          "package": {
            "name": "busybox"
          },
          "version": "1.31.1-r10"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-42380",
          "value": "CVE-2021-42380",
          "url": "https://avd.aquasec.com/nvd/cve-2021-42380"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-42380"
        },{
          "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
        },{
          "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42380"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5179-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-42380"
        }
      ]
    },
    {
      "id": "CVE-2021-42381",
      "name": "busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init()",
      "description": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function",
      "severity": "High",
      "solution": "Upgrade busybox to 1.31.1-r11",
      "location": {
        "dependency": {
          "package": {
            "name": "busybox"
          },
          "version": "1.31.1-r10"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-42381",
          "value": "CVE-2021-42381",
          "url": "https://avd.aquasec.com/nvd/cve-2021-42381"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-42381"
        },{
          "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
        },{
          "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42381"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5179-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
        }
      ]
    },
    {
      "id": "CVE-2021-42382",
      "name": "busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s()",
      "description": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function",
      "severity": "High",
      "solution": "Upgrade busybox to 1.31.1-r11",
      "location": {
        "dependency": {
          "package": {
            "name": "busybox"
          },
          "version": "1.31.1-r10"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-42382",
          "value": "CVE-2021-42382",
          "url": "https://avd.aquasec.com/nvd/cve-2021-42382"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-42382"
        },{
          "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
        },{
          "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42382"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5179-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
        }
      ]
    },
    {
      "id": "CVE-2021-42383",
      "name": "busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate()",
      "description": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
      "severity": "High",
      "solution": "Upgrade busybox to 1.31.1-r11",
      "location": {
        "dependency": {
          "package": {
            "name": "busybox"
          },
          "version": "1.31.1-r10"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-42383",
          "value": "CVE-2021-42383",
          "url": "https://avd.aquasec.com/nvd/cve-2021-42383"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-42383"
        },{
          "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
        },{
          "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42383"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-42383"
        }
      ]
    },
    {
      "id": "CVE-2021-42384",
      "name": "busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special()",
      "description": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function",
      "severity": "High",
      "solution": "Upgrade busybox to 1.31.1-r11",
      "location": {
        "dependency": {
          "package": {
            "name": "busybox"
          },
          "version": "1.31.1-r10"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-42384",
          "value": "CVE-2021-42384",
          "url": "https://avd.aquasec.com/nvd/cve-2021-42384"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-42384"
        },{
          "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
        },{
          "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42384"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5179-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
        }
      ]
    },
    {
      "id": "CVE-2021-42385",
      "name": "busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate()",
      "description": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
      "severity": "High",
      "solution": "Upgrade busybox to 1.31.1-r11",
      "location": {
        "dependency": {
          "package": {
            "name": "busybox"
          },
          "version": "1.31.1-r10"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-42385",
          "value": "CVE-2021-42385",
          "url": "https://avd.aquasec.com/nvd/cve-2021-42385"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-42385"
        },{
          "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
        },{
          "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42385"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5179-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
        }
      ]
    },
    {
      "id": "CVE-2021-42386",
      "name": "busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc()",
      "description": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function",
      "severity": "High",
      "solution": "Upgrade busybox to 1.31.1-r11",
      "location": {
        "dependency": {
          "package": {
            "name": "busybox"
          },
          "version": "1.31.1-r10"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-42386",
          "value": "CVE-2021-42386",
          "url": "https://avd.aquasec.com/nvd/cve-2021-42386"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-42386"
        },{
          "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
        },{
          "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42386"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5179-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
        }
      ]
    },
    {
      "id": "CVE-2021-42374",
      "name": "busybox: out-of-bounds read in unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed",
      "description": "An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that",
      "severity": "Medium",
      "solution": "Upgrade busybox to 1.31.1-r11",
      "location": {
        "dependency": {
          "package": {
            "name": "busybox"
          },
          "version": "1.31.1-r10"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-42374",
          "value": "CVE-2021-42374",
          "url": "https://avd.aquasec.com/nvd/cve-2021-42374"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-42374"
        },{
          "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
        },{
          "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42374"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5179-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
        }
      ]
    },
    {
      "id": "CVE-2021-3711",
      "name": "openssl: SM2 Decryption Buffer Overflow",
      "description": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).",
      "severity": "Critical",
      "solution": "Upgrade libcrypto1.1 to 1.1.1l-r0",
      "location": {
        "dependency": {
          "package": {
            "name": "libcrypto1.1"
          },
          "version": "1.1.1k-r0"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-3711",
          "value": "CVE-2021-3711",
          "url": "https://avd.aquasec.com/nvd/cve-2021-3711"
        }
      ],
      "links": [{
          "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2"
        },{
          "url": "https://access.redhat.com/security/cve/CVE-2021-3711"
        },{
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
        },{
          "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46"
        },{
          "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46"
        },{
          "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E"
        },{
          "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E"
        },{
          "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E"
        },{
          "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3711"
        },{
          "url": "https://rustsec.org/advisories/RUSTSEC-2021-0097.html"
        },{
          "url": "https://security.gentoo.org/glsa/202209-02"
        },{
          "url": "https://security.gentoo.org/glsa/202210-02"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20210827-0010"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20210827-0010/"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211022-0003"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20240621-0006"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5051-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
        },{
          "url": "https://www.debian.org/security/2021/dsa-4963"
        },{
          "url": "https://www.openssl.org/news/secadv/20210824.txt"
        },{
          "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
        },{
          "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
        },{
          "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
        },{
          "url": "https://www.tenable.com/security/tns-2021-16"
        },{
          "url": "https://www.tenable.com/security/tns-2022-02"
        }
      ]
    },
    {
      "id": "CVE-2021-3712",
      "name": "openssl: Read buffer overruns processing ASN.1 strings",
      "description": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).",
      "severity": "High",
      "solution": "Upgrade libcrypto1.1 to 1.1.1l-r0",
      "location": {
        "dependency": {
          "package": {
            "name": "libcrypto1.1"
          },
          "version": "1.1.1k-r0"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-3712",
          "value": "CVE-2021-3712",
          "url": "https://avd.aquasec.com/nvd/cve-2021-3712"
        }
      ],
      "links": [{
          "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2"
        },{
          "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json"
        },{
          "url": "https://access.redhat.com/security/cve/CVE-2021-3712"
        },{
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf"
        },{
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
        },{
          "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11"
        },{
          "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12"
        },{
          "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11"
        },{
          "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12"
        },{
          "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2021-3712.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2022-9023.html"
        },{
          "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E"
        },{
          "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E"
        },{
          "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E"
        },{
          "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E"
        },{
          "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html"
        },{
          "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712"
        },{
          "url": "https://rustsec.org/advisories/RUSTSEC-2021-0098.html"
        },{
          "url": "https://security.gentoo.org/glsa/202209-02"
        },{
          "url": "https://security.gentoo.org/glsa/202210-02"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20210827-0010"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20210827-0010/"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20240621-0006"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5051-1"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5051-2"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5051-3"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5088-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
        },{
          "url": "https://www.debian.org/security/2021/dsa-4963"
        },{
          "url": "https://www.openssl.org/news/secadv/20210824.txt"
        },{
          "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
        },{
          "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
        },{
          "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
        },{
          "url": "https://www.tenable.com/security/tns-2021-16"
        },{
          "url": "https://www.tenable.com/security/tns-2022-02"
        }
      ]
    },
    {
      "id": "CVE-2021-3711",
      "name": "openssl: SM2 Decryption Buffer Overflow",
      "description": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).",
      "severity": "Critical",
      "solution": "Upgrade libssl1.1 to 1.1.1l-r0",
      "location": {
        "dependency": {
          "package": {
            "name": "libssl1.1"
          },
          "version": "1.1.1k-r0"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-3711",
          "value": "CVE-2021-3711",
          "url": "https://avd.aquasec.com/nvd/cve-2021-3711"
        }
      ],
      "links": [{
          "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2"
        },{
          "url": "https://access.redhat.com/security/cve/CVE-2021-3711"
        },{
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
        },{
          "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46"
        },{
          "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46"
        },{
          "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E"
        },{
          "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E"
        },{
          "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E"
        },{
          "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3711"
        },{
          "url": "https://rustsec.org/advisories/RUSTSEC-2021-0097.html"
        },{
          "url": "https://security.gentoo.org/glsa/202209-02"
        },{
          "url": "https://security.gentoo.org/glsa/202210-02"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20210827-0010"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20210827-0010/"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211022-0003"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20240621-0006"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5051-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
        },{
          "url": "https://www.debian.org/security/2021/dsa-4963"
        },{
          "url": "https://www.openssl.org/news/secadv/20210824.txt"
        },{
          "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
        },{
          "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
        },{
          "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
        },{
          "url": "https://www.tenable.com/security/tns-2021-16"
        },{
          "url": "https://www.tenable.com/security/tns-2022-02"
        }
      ]
    },
    {
      "id": "CVE-2021-3712",
      "name": "openssl: Read buffer overruns processing ASN.1 strings",
      "description": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).",
      "severity": "High",
      "solution": "Upgrade libssl1.1 to 1.1.1l-r0",
      "location": {
        "dependency": {
          "package": {
            "name": "libssl1.1"
          },
          "version": "1.1.1k-r0"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-3712",
          "value": "CVE-2021-3712",
          "url": "https://avd.aquasec.com/nvd/cve-2021-3712"
        }
      ],
      "links": [{
          "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2"
        },{
          "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json"
        },{
          "url": "https://access.redhat.com/security/cve/CVE-2021-3712"
        },{
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf"
        },{
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
        },{
          "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11"
        },{
          "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12"
        },{
          "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11"
        },{
          "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12"
        },{
          "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2021-3712.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2022-9023.html"
        },{
          "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E"
        },{
          "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E"
        },{
          "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E"
        },{
          "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E"
        },{
          "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html"
        },{
          "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712"
        },{
          "url": "https://rustsec.org/advisories/RUSTSEC-2021-0098.html"
        },{
          "url": "https://security.gentoo.org/glsa/202209-02"
        },{
          "url": "https://security.gentoo.org/glsa/202210-02"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20210827-0010"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20210827-0010/"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20240621-0006"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5051-1"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5051-2"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5051-3"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5088-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
        },{
          "url": "https://www.debian.org/security/2021/dsa-4963"
        },{
          "url": "https://www.openssl.org/news/secadv/20210824.txt"
        },{
          "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
        },{
          "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
        },{
          "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
        },{
          "url": "https://www.tenable.com/security/tns-2021-16"
        },{
          "url": "https://www.tenable.com/security/tns-2022-02"
        }
      ]
    },
    {
      "id": "CVE-2021-42378",
      "name": "busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i()",
      "description": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function",
      "severity": "High",
      "solution": "Upgrade ssl_client to 1.31.1-r11",
      "location": {
        "dependency": {
          "package": {
            "name": "ssl_client"
          },
          "version": "1.31.1-r10"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-42378",
          "value": "CVE-2021-42378",
          "url": "https://avd.aquasec.com/nvd/cve-2021-42378"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-42378"
        },{
          "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
        },{
          "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42378"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5179-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
        }
      ]
    },
    {
      "id": "CVE-2021-42379",
      "name": "busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file()",
      "description": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function",
      "severity": "High",
      "solution": "Upgrade ssl_client to 1.31.1-r11",
      "location": {
        "dependency": {
          "package": {
            "name": "ssl_client"
          },
          "version": "1.31.1-r10"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-42379",
          "value": "CVE-2021-42379",
          "url": "https://avd.aquasec.com/nvd/cve-2021-42379"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-42379"
        },{
          "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
        },{
          "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42379"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5179-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
        }
      ]
    },
    {
      "id": "CVE-2021-42380",
      "name": "busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar()",
      "description": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function",
      "severity": "High",
      "solution": "Upgrade ssl_client to 1.31.1-r11",
      "location": {
        "dependency": {
          "package": {
            "name": "ssl_client"
          },
          "version": "1.31.1-r10"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-42380",
          "value": "CVE-2021-42380",
          "url": "https://avd.aquasec.com/nvd/cve-2021-42380"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-42380"
        },{
          "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
        },{
          "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42380"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5179-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-42380"
        }
      ]
    },
    {
      "id": "CVE-2021-42381",
      "name": "busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init()",
      "description": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function",
      "severity": "High",
      "solution": "Upgrade ssl_client to 1.31.1-r11",
      "location": {
        "dependency": {
          "package": {
            "name": "ssl_client"
          },
          "version": "1.31.1-r10"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-42381",
          "value": "CVE-2021-42381",
          "url": "https://avd.aquasec.com/nvd/cve-2021-42381"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-42381"
        },{
          "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
        },{
          "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42381"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5179-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
        }
      ]
    },
    {
      "id": "CVE-2021-42382",
      "name": "busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s()",
      "description": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function",
      "severity": "High",
      "solution": "Upgrade ssl_client to 1.31.1-r11",
      "location": {
        "dependency": {
          "package": {
            "name": "ssl_client"
          },
          "version": "1.31.1-r10"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-42382",
          "value": "CVE-2021-42382",
          "url": "https://avd.aquasec.com/nvd/cve-2021-42382"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-42382"
        },{
          "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
        },{
          "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42382"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5179-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
        }
      ]
    },
    {
      "id": "CVE-2021-42383",
      "name": "busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate()",
      "description": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
      "severity": "High",
      "solution": "Upgrade ssl_client to 1.31.1-r11",
      "location": {
        "dependency": {
          "package": {
            "name": "ssl_client"
          },
          "version": "1.31.1-r10"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-42383",
          "value": "CVE-2021-42383",
          "url": "https://avd.aquasec.com/nvd/cve-2021-42383"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-42383"
        },{
          "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
        },{
          "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42383"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-42383"
        }
      ]
    },
    {
      "id": "CVE-2021-42384",
      "name": "busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special()",
      "description": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function",
      "severity": "High",
      "solution": "Upgrade ssl_client to 1.31.1-r11",
      "location": {
        "dependency": {
          "package": {
            "name": "ssl_client"
          },
          "version": "1.31.1-r10"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-42384",
          "value": "CVE-2021-42384",
          "url": "https://avd.aquasec.com/nvd/cve-2021-42384"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-42384"
        },{
          "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
        },{
          "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42384"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5179-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
        }
      ]
    },
    {
      "id": "CVE-2021-42385",
      "name": "busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate()",
      "description": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function",
      "severity": "High",
      "solution": "Upgrade ssl_client to 1.31.1-r11",
      "location": {
        "dependency": {
          "package": {
            "name": "ssl_client"
          },
          "version": "1.31.1-r10"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-42385",
          "value": "CVE-2021-42385",
          "url": "https://avd.aquasec.com/nvd/cve-2021-42385"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-42385"
        },{
          "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
        },{
          "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42385"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5179-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
        }
      ]
    },
    {
      "id": "CVE-2021-42386",
      "name": "busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc()",
      "description": "A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function",
      "severity": "High",
      "solution": "Upgrade ssl_client to 1.31.1-r11",
      "location": {
        "dependency": {
          "package": {
            "name": "ssl_client"
          },
          "version": "1.31.1-r10"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-42386",
          "value": "CVE-2021-42386",
          "url": "https://avd.aquasec.com/nvd/cve-2021-42386"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-42386"
        },{
          "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
        },{
          "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42386"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5179-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
        }
      ]
    },
    {
      "id": "CVE-2021-42374",
      "name": "busybox: out-of-bounds read in unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed",
      "description": "An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that",
      "severity": "Medium",
      "solution": "Upgrade ssl_client to 1.31.1-r11",
      "location": {
        "dependency": {
          "package": {
            "name": "ssl_client"
          },
          "version": "1.31.1-r10"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-42374",
          "value": "CVE-2021-42374",
          "url": "https://avd.aquasec.com/nvd/cve-2021-42374"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-42374"
        },{
          "url": "https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog"
        },{
          "url": "https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42374"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20211223-0002/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5179-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
        }
      ]
    },
    {
      "id": "CVE-2022-37434",
      "name": "zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field",
      "description": "zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).",
      "severity": "Critical",
      "solution": "Upgrade zlib to 1.2.11-r4",
      "location": {
        "dependency": {
          "package": {
            "name": "zlib"
          },
          "version": "1.2.11-r3"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2022-37434",
          "value": "CVE-2022-37434",
          "url": "https://avd.aquasec.com/nvd/cve-2022-37434"
        }
      ],
      "links": [{
          "url": "http://seclists.org/fulldisclosure/2022/Oct/37"
        },{
          "url": "http://seclists.org/fulldisclosure/2022/Oct/38"
        },{
          "url": "http://seclists.org/fulldisclosure/2022/Oct/41"
        },{
          "url": "http://seclists.org/fulldisclosure/2022/Oct/42"
        },{
          "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2"
        },{
          "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1"
        },{
          "url": "https://access.redhat.com/errata/RHSA-2022:8291"
        },{
          "url": "https://access.redhat.com/security/cve/CVE-2022-37434"
        },{
          "url": "https://bugzilla.redhat.com/2116639"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053198"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077431"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081296"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2116639"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37434"
        },{
          "url": "https://errata.almalinux.org/9/ALSA-2022-8291.html"
        },{
          "url": "https://errata.rockylinux.org/RLSA-2022:8291"
        },{
          "url": "https://github.com/curl/curl/issues/9271"
        },{
          "url": "https://github.com/ivd38/zlib_overflow"
        },{
          "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063"
        },{
          "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1"
        },{
          "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2022-37434.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2023-1095.html"
        },{
          "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00012.html"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37434"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20220901-0005/"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20230427-0007/"
        },{
          "url": "https://support.apple.com/kb/HT213488"
        },{
          "url": "https://support.apple.com/kb/HT213489"
        },{
          "url": "https://support.apple.com/kb/HT213490"
        },{
          "url": "https://support.apple.com/kb/HT213491"
        },{
          "url": "https://support.apple.com/kb/HT213493"
        },{
          "url": "https://support.apple.com/kb/HT213494"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5570-1"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5570-2"
        },{
          "url": "https://ubuntu.com/security/notices/USN-5573-1"
        },{
          "url": "https://ubuntu.com/security/notices/USN-6736-1"
        },{
          "url": "https://ubuntu.com/security/notices/USN-6736-2"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
        },{
          "url": "https://www.debian.org/security/2022/dsa-5218"
        }
      ]
    },
    {
      "id": "CVE-2021-3807",
      "name": "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes",
      "description": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity",
      "severity": "High",
      "solution": "Upgrade ansi-regex to 6.0.1, 5.0.1, 4.1.1, 3.0.1",
      "location": {
        "dependency": {
          "package": {
            "name": "ansi-regex"
          },
          "version": "3.0.0"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-3807",
          "value": "CVE-2021-3807",
          "url": "https://avd.aquasec.com/nvd/cve-2021-3807"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/errata/RHSA-2022:6595"
        },{
          "url": "https://access.redhat.com/security/cve/CVE-2021-3807"
        },{
          "url": "https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908"
        },{
          "url": "https://bugzilla.redhat.com/1907444"
        },{
          "url": "https://bugzilla.redhat.com/1945459"
        },{
          "url": "https://bugzilla.redhat.com/1964461"
        },{
          "url": "https://bugzilla.redhat.com/2007557"
        },{
          "url": "https://bugzilla.redhat.com/2098556"
        },{
          "url": "https://bugzilla.redhat.com/2102001"
        },{
          "url": "https://bugzilla.redhat.com/2105422"
        },{
          "url": "https://bugzilla.redhat.com/2105426"
        },{
          "url": "https://bugzilla.redhat.com/2105428"
        },{
          "url": "https://bugzilla.redhat.com/2105430"
        },{
          "url": "https://errata.almalinux.org/9/ALSA-2022-6595.html"
        },{
          "url": "https://github.com/chalk/ansi-regex"
        },{
          "url": "https://github.com/chalk/ansi-regex/commit/419250fa510bf31b4cc672e76537a64f9332e1f1"
        },{
          "url": "https://github.com/chalk/ansi-regex/commit/75a657da7af875b2e2724fd6331bf0a4b23d3c9a"
        },{
          "url": "https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9"
        },{
          "url": "https://github.com/chalk/ansi-regex/commit/c3c0b3f2736b9c01feec0fef33980c43720dcde8"
        },{
          "url": "https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311"
        },{
          "url": "https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774"
        },{
          "url": "https://github.com/chalk/ansi-regex/releases/tag/v6.0.1"
        },{
          "url": "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2021-3807.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2022-6595.html"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3807"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20221014-0002"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20221014-0002/"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3807"
        },{
          "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
        }
      ]
    },
    {
      "id": "CVE-2021-3807",
      "name": "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes",
      "description": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity",
      "severity": "High",
      "solution": "Upgrade ansi-regex to 6.0.1, 5.0.1, 4.1.1, 3.0.1",
      "location": {
        "dependency": {
          "package": {
            "name": "ansi-regex"
          },
          "version": "4.1.0"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-3807",
          "value": "CVE-2021-3807",
          "url": "https://avd.aquasec.com/nvd/cve-2021-3807"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/errata/RHSA-2022:6595"
        },{
          "url": "https://access.redhat.com/security/cve/CVE-2021-3807"
        },{
          "url": "https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908"
        },{
          "url": "https://bugzilla.redhat.com/1907444"
        },{
          "url": "https://bugzilla.redhat.com/1945459"
        },{
          "url": "https://bugzilla.redhat.com/1964461"
        },{
          "url": "https://bugzilla.redhat.com/2007557"
        },{
          "url": "https://bugzilla.redhat.com/2098556"
        },{
          "url": "https://bugzilla.redhat.com/2102001"
        },{
          "url": "https://bugzilla.redhat.com/2105422"
        },{
          "url": "https://bugzilla.redhat.com/2105426"
        },{
          "url": "https://bugzilla.redhat.com/2105428"
        },{
          "url": "https://bugzilla.redhat.com/2105430"
        },{
          "url": "https://errata.almalinux.org/9/ALSA-2022-6595.html"
        },{
          "url": "https://github.com/chalk/ansi-regex"
        },{
          "url": "https://github.com/chalk/ansi-regex/commit/419250fa510bf31b4cc672e76537a64f9332e1f1"
        },{
          "url": "https://github.com/chalk/ansi-regex/commit/75a657da7af875b2e2724fd6331bf0a4b23d3c9a"
        },{
          "url": "https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9"
        },{
          "url": "https://github.com/chalk/ansi-regex/commit/c3c0b3f2736b9c01feec0fef33980c43720dcde8"
        },{
          "url": "https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311"
        },{
          "url": "https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774"
        },{
          "url": "https://github.com/chalk/ansi-regex/releases/tag/v6.0.1"
        },{
          "url": "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2021-3807.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2022-6595.html"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3807"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20221014-0002"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20221014-0002/"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3807"
        },{
          "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
        }
      ]
    },
    {
      "id": "CVE-2021-3807",
      "name": "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes",
      "description": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity",
      "severity": "High",
      "solution": "Upgrade ansi-regex to 6.0.1, 5.0.1, 4.1.1, 3.0.1",
      "location": {
        "dependency": {
          "package": {
            "name": "ansi-regex"
          },
          "version": "4.1.0"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-3807",
          "value": "CVE-2021-3807",
          "url": "https://avd.aquasec.com/nvd/cve-2021-3807"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/errata/RHSA-2022:6595"
        },{
          "url": "https://access.redhat.com/security/cve/CVE-2021-3807"
        },{
          "url": "https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908"
        },{
          "url": "https://bugzilla.redhat.com/1907444"
        },{
          "url": "https://bugzilla.redhat.com/1945459"
        },{
          "url": "https://bugzilla.redhat.com/1964461"
        },{
          "url": "https://bugzilla.redhat.com/2007557"
        },{
          "url": "https://bugzilla.redhat.com/2098556"
        },{
          "url": "https://bugzilla.redhat.com/2102001"
        },{
          "url": "https://bugzilla.redhat.com/2105422"
        },{
          "url": "https://bugzilla.redhat.com/2105426"
        },{
          "url": "https://bugzilla.redhat.com/2105428"
        },{
          "url": "https://bugzilla.redhat.com/2105430"
        },{
          "url": "https://errata.almalinux.org/9/ALSA-2022-6595.html"
        },{
          "url": "https://github.com/chalk/ansi-regex"
        },{
          "url": "https://github.com/chalk/ansi-regex/commit/419250fa510bf31b4cc672e76537a64f9332e1f1"
        },{
          "url": "https://github.com/chalk/ansi-regex/commit/75a657da7af875b2e2724fd6331bf0a4b23d3c9a"
        },{
          "url": "https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9"
        },{
          "url": "https://github.com/chalk/ansi-regex/commit/c3c0b3f2736b9c01feec0fef33980c43720dcde8"
        },{
          "url": "https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311"
        },{
          "url": "https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774"
        },{
          "url": "https://github.com/chalk/ansi-regex/releases/tag/v6.0.1"
        },{
          "url": "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2021-3807.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2022-6595.html"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3807"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20221014-0002"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20221014-0002/"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3807"
        },{
          "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
        }
      ]
    },
    {
      "id": "CVE-2021-3807",
      "name": "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes",
      "description": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity",
      "severity": "High",
      "solution": "Upgrade ansi-regex to 6.0.1, 5.0.1, 4.1.1, 3.0.1",
      "location": {
        "dependency": {
          "package": {
            "name": "ansi-regex"
          },
          "version": "4.1.0"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-3807",
          "value": "CVE-2021-3807",
          "url": "https://avd.aquasec.com/nvd/cve-2021-3807"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/errata/RHSA-2022:6595"
        },{
          "url": "https://access.redhat.com/security/cve/CVE-2021-3807"
        },{
          "url": "https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908"
        },{
          "url": "https://bugzilla.redhat.com/1907444"
        },{
          "url": "https://bugzilla.redhat.com/1945459"
        },{
          "url": "https://bugzilla.redhat.com/1964461"
        },{
          "url": "https://bugzilla.redhat.com/2007557"
        },{
          "url": "https://bugzilla.redhat.com/2098556"
        },{
          "url": "https://bugzilla.redhat.com/2102001"
        },{
          "url": "https://bugzilla.redhat.com/2105422"
        },{
          "url": "https://bugzilla.redhat.com/2105426"
        },{
          "url": "https://bugzilla.redhat.com/2105428"
        },{
          "url": "https://bugzilla.redhat.com/2105430"
        },{
          "url": "https://errata.almalinux.org/9/ALSA-2022-6595.html"
        },{
          "url": "https://github.com/chalk/ansi-regex"
        },{
          "url": "https://github.com/chalk/ansi-regex/commit/419250fa510bf31b4cc672e76537a64f9332e1f1"
        },{
          "url": "https://github.com/chalk/ansi-regex/commit/75a657da7af875b2e2724fd6331bf0a4b23d3c9a"
        },{
          "url": "https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9"
        },{
          "url": "https://github.com/chalk/ansi-regex/commit/c3c0b3f2736b9c01feec0fef33980c43720dcde8"
        },{
          "url": "https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311"
        },{
          "url": "https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774"
        },{
          "url": "https://github.com/chalk/ansi-regex/releases/tag/v6.0.1"
        },{
          "url": "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2021-3807.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2022-6595.html"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3807"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20221014-0002"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20221014-0002/"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3807"
        },{
          "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
        }
      ]
    },
    {
      "id": "CVE-2024-21538",
      "name": "cross-spawn: regular expression denial of service",
      "description": "Versions of the package cross-spawn before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string.",
      "severity": "High",
      "solution": "Upgrade cross-spawn to 7.0.5, 6.0.6",
      "location": {
        "dependency": {
          "package": {
            "name": "cross-spawn"
          },
          "version": "5.1.0"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2024-21538",
          "value": "CVE-2024-21538",
          "url": "https://avd.aquasec.com/nvd/cve-2024-21538"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2024-21538"
        },{
          "url": "https://github.com/moxystudio/node-cross-spawn"
        },{
          "url": "https://github.com/moxystudio/node-cross-spawn/commit/5ff3a07d9add449021d806e45c4168203aa833ff"
        },{
          "url": "https://github.com/moxystudio/node-cross-spawn/commit/640d391fde65388548601d95abedccc12943374f"
        },{
          "url": "https://github.com/moxystudio/node-cross-spawn/commit/d35c865b877d2f9ded7c1ed87521c2fdb689c8dd"
        },{
          "url": "https://github.com/moxystudio/node-cross-spawn/issues/165"
        },{
          "url": "https://github.com/moxystudio/node-cross-spawn/pull/160"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21538"
        },{
          "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349"
        },{
          "url": "https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21538"
        }
      ]
    },
    {
      "id": "CVE-2022-38900",
      "name": "decode-uri-component: improper input validation resulting in DoS",
      "description": "decode-uri-component 0.2.0 is vulnerable to Improper Input Validation resulting in DoS.",
      "severity": "High",
      "solution": "Upgrade decode-uri-component to 0.2.1",
      "location": {
        "dependency": {
          "package": {
            "name": "decode-uri-component"
          },
          "version": "0.2.0"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2022-38900",
          "value": "CVE-2022-38900",
          "url": "https://avd.aquasec.com/nvd/cve-2022-38900"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/errata/RHSA-2023:6316"
        },{
          "url": "https://access.redhat.com/security/cve/CVE-2022-38900"
        },{
          "url": "https://bugzilla.redhat.com/2170644"
        },{
          "url": "https://errata.almalinux.org/9/ALSA-2023-6316.html"
        },{
          "url": "https://github.com/SamVerschueren/decode-uri-component"
        },{
          "url": "https://github.com/SamVerschueren/decode-uri-component/commit/746ca5dcb6667c5d364e782d53c542830e4c10b9"
        },{
          "url": "https://github.com/SamVerschueren/decode-uri-component/issues/5"
        },{
          "url": "https://github.com/SamVerschueren/decode-uri-component/releases/tag/v0.2.1"
        },{
          "url": "https://github.com/advisories/GHSA-w573-4hg7-7wgq"
        },{
          "url": "https://github.com/sindresorhus/query-string/issues/345"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2022-38900.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2023-6316.html"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ERN6YE3DS7NBW7UH44SCJBMNC2NWQ7SM/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KAC5KQ2SEWAMQ6UZAUBZ5KXKEOESH375/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QABOUA2I542UTANVZIVFKWMRYVHLV32D/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW4SCMT3SEUFVIL7YIADQ5K36GJEO6I5/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNV2GNZXOTEDAJRFH3ZYWRUBGIVL7BSU/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/ERN6YE3DS7NBW7UH44SCJBMNC2NWQ7SM"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/KAC5KQ2SEWAMQ6UZAUBZ5KXKEOESH375"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/QABOUA2I542UTANVZIVFKWMRYVHLV32D"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/UW4SCMT3SEUFVIL7YIADQ5K36GJEO6I5"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/VNV2GNZXOTEDAJRFH3ZYWRUBGIVL7BSU"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38900"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-38900"
        }
      ]
    },
    {
      "id": "CVE-2022-33987",
      "name": "nodejs-got: missing verification of requested URLs allows redirects to UNIX sockets",
      "description": "The got package before 12.1.0 (also fixed in 11.8.5) for Node.js allows a redirect to a UNIX socket.",
      "severity": "Medium",
      "solution": "Upgrade got to 12.1.0, 11.8.5",
      "location": {
        "dependency": {
          "package": {
            "name": "got"
          },
          "version": "6.7.1"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2022-33987",
          "value": "CVE-2022-33987",
          "url": "https://avd.aquasec.com/nvd/cve-2022-33987"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/errata/RHSA-2022:6595"
        },{
          "url": "https://access.redhat.com/security/cve/CVE-2022-33987"
        },{
          "url": "https://bugzilla.redhat.com/1907444"
        },{
          "url": "https://bugzilla.redhat.com/1945459"
        },{
          "url": "https://bugzilla.redhat.com/1964461"
        },{
          "url": "https://bugzilla.redhat.com/2007557"
        },{
          "url": "https://bugzilla.redhat.com/2098556"
        },{
          "url": "https://bugzilla.redhat.com/2102001"
        },{
          "url": "https://bugzilla.redhat.com/2105422"
        },{
          "url": "https://bugzilla.redhat.com/2105426"
        },{
          "url": "https://bugzilla.redhat.com/2105428"
        },{
          "url": "https://bugzilla.redhat.com/2105430"
        },{
          "url": "https://errata.almalinux.org/9/ALSA-2022-6595.html"
        },{
          "url": "https://github.com/sindresorhus/got"
        },{
          "url": "https://github.com/sindresorhus/got/commit/861ccd9ac2237df762a9e2beed7edd88c60782dc"
        },{
          "url": "https://github.com/sindresorhus/got/compare/v12.0.3...v12.1.0"
        },{
          "url": "https://github.com/sindresorhus/got/pull/2047"
        },{
          "url": "https://github.com/sindresorhus/got/releases/tag/v11.8.5"
        },{
          "url": "https://github.com/sindresorhus/got/releases/tag/v12.1.0"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2022-33987.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2022-6595.html"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-33987"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-33987"
        }
      ]
    },
    {
      "id": "CVE-2021-23362",
      "name": "nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl()",
      "description": "The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.",
      "severity": "Medium",
      "solution": "Upgrade hosted-git-info to 2.8.9, 3.0.8",
      "location": {
        "dependency": {
          "package": {
            "name": "hosted-git-info"
          },
          "version": "2.8.8"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-23362",
          "value": "CVE-2021-23362",
          "url": "https://avd.aquasec.com/nvd/cve-2021-23362"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-23362"
        },{
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
        },{
          "url": "https://errata.almalinux.org/8/ALSA-2021-3074.html"
        },{
          "url": "https://github.com/npm/hosted-git-info"
        },{
          "url": "https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7"
        },{
          "url": "https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01"
        },{
          "url": "https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3"
        },{
          "url": "https://github.com/npm/hosted-git-info/commits/v2"
        },{
          "url": "https://github.com/npm/hosted-git-info/pull/76"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2021-23362.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2021-3074.html"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23362"
        },{
          "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356"
        },{
          "url": "https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-23362"
        }
      ]
    },
    {
      "id": "CVE-2022-25881",
      "name": "http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability",
      "description": "This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.",
      "severity": "High",
      "solution": "Upgrade http-cache-semantics to 4.1.1",
      "location": {
        "dependency": {
          "package": {
            "name": "http-cache-semantics"
          },
          "version": "3.8.1"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2022-25881",
          "value": "CVE-2022-25881",
          "url": "https://avd.aquasec.com/nvd/cve-2022-25881"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/errata/RHSA-2023:2655"
        },{
          "url": "https://access.redhat.com/security/cve/CVE-2022-25881"
        },{
          "url": "https://bugzilla.redhat.com/2165824"
        },{
          "url": "https://bugzilla.redhat.com/2168631"
        },{
          "url": "https://bugzilla.redhat.com/2171935"
        },{
          "url": "https://bugzilla.redhat.com/2172190"
        },{
          "url": "https://bugzilla.redhat.com/2172204"
        },{
          "url": "https://bugzilla.redhat.com/2172217"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165824"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168631"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171935"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172190"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172204"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172217"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178076"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25881"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4904"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23918"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23920"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23936"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24807"
        },{
          "url": "https://errata.almalinux.org/9/ALSA-2023-2655.html"
        },{
          "url": "https://errata.rockylinux.org/RLSA-2023:2655"
        },{
          "url": "https://github.com/kornelski/http-cache-semantics"
        },{
          "url": "https://github.com/kornelski/http-cache-semantics/blob/master/index.js%23L83"
        },{
          "url": "https://github.com/kornelski/http-cache-semantics/commit/560b2d8ef452bbba20ffed69dc155d63ac757b74"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2022-25881.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2023-2655.html"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25881"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20230622-0008"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20230622-0008/"
        },{
          "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332"
        },{
          "url": "https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
        }
      ]
    },
    {
      "id": "CVE-2024-29415",
      "name": "node-ip: Incomplete fix for CVE-2023-42282",
      "description": "The ip package through 2.0.1 for Node.js might allow SSRF because some IP addresses (such as 127.1, 01200034567, 012.1.2.3, 000:0:0000::01, and ::fFFf:127.0.0.1) are improperly categorized as globally routable via isPublic. NOTE: this issue exists because of an incomplete fix for CVE-2023-42282.",
      "severity": "High",
      "solution": "No solution provided",
      "location": {
        "dependency": {
          "package": {
            "name": "ip"
          },
          "version": "1.1.5"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2024-29415",
          "value": "CVE-2024-29415",
          "url": "https://avd.aquasec.com/nvd/cve-2024-29415"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2024-29415"
        },{
          "url": "https://cosmosofcyberspace.github.io/npm_ip_cve/npm_ip_cve.html"
        },{
          "url": "https://github.com/indutny/node-ip"
        },{
          "url": "https://github.com/indutny/node-ip/issues/150"
        },{
          "url": "https://github.com/indutny/node-ip/pull/143"
        },{
          "url": "https://github.com/indutny/node-ip/pull/144"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29415"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20250117-0010"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20250117-0010/"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-29415"
        }
      ]
    },
    {
      "id": "CVE-2023-42282",
      "name": "nodejs-ip: arbitrary code execution via the isPublic() function",
      "description": "The ip package before 1.1.9 for Node.js might allow SSRF because some IP addresses (such as 0x7f.1) are improperly categorized as globally routable via isPublic.",
      "severity": "Low",
      "solution": "Upgrade ip to 2.0.1, 1.1.9",
      "location": {
        "dependency": {
          "package": {
            "name": "ip"
          },
          "version": "1.1.5"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2023-42282",
          "value": "CVE-2023-42282",
          "url": "https://avd.aquasec.com/nvd/cve-2023-42282"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2023-42282"
        },{
          "url": "https://cosmosofcyberspace.github.io/npm_ip_cve/npm_ip_cve.html"
        },{
          "url": "https://github.com/JoshGlazebrook/socks/issues/93#issue-2128357447"
        },{
          "url": "https://github.com/github/advisory-database/pull/3504#issuecomment-1937179999"
        },{
          "url": "https://github.com/indutny/node-ip"
        },{
          "url": "https://github.com/indutny/node-ip/commit/32f468f1245574785ec080705737a579be1223aa"
        },{
          "url": "https://github.com/indutny/node-ip/commit/6a3ada9b471b09d5f0f5be264911ab564bf67894"
        },{
          "url": "https://github.com/indutny/node-ip/pull/138"
        },{
          "url": "https://huntr.com/bounties/bfc3b23f-ddc0-4ee7-afab-223b07115ed3/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42282"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20240315-0008/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-6643-1"
        },{
          "url": "https://www.bleepingcomputer.com/news/security/dev-rejects-cve-severity-makes-his-github-repo-read-only/"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
        }
      ]
    },
    {
      "id": "CVE-2021-3918",
      "name": "nodejs-json-schema: Prototype pollution vulnerability",
      "description": "json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')",
      "severity": "Critical",
      "solution": "Upgrade json-schema to 0.4.0",
      "location": {
        "dependency": {
          "package": {
            "name": "json-schema"
          },
          "version": "0.2.3"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-3918",
          "value": "CVE-2021-3918",
          "url": "https://avd.aquasec.com/nvd/cve-2021-3918"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-3918"
        },{
          "url": "https://errata.almalinux.org/8/ALSA-2022-0350.html"
        },{
          "url": "https://github.com/kriszyp/json-schema"
        },{
          "url": "https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741"
        },{
          "url": "https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741 (v0.4.0)"
        },{
          "url": "https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a"
        },{
          "url": "https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa"
        },{
          "url": "https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2021-3918.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2022-0350.html"
        },{
          "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00013.html"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3918"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20250117-0004"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20250117-0004/"
        },{
          "url": "https://ubuntu.com/security/notices/USN-6103-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3918"
        }
      ]
    },
    {
      "id": "CVE-2022-3517",
      "name": "nodejs-minimatch: ReDoS via the braceExpand function",
      "description": "A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.",
      "severity": "High",
      "solution": "Upgrade minimatch to 3.0.5",
      "location": {
        "dependency": {
          "package": {
            "name": "minimatch"
          },
          "version": "3.0.4"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2022-3517",
          "value": "CVE-2022-3517",
          "url": "https://avd.aquasec.com/nvd/cve-2022-3517"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/errata/RHSA-2023:0321"
        },{
          "url": "https://access.redhat.com/security/cve/CVE-2022-3517"
        },{
          "url": "https://bugzilla.redhat.com/2066009"
        },{
          "url": "https://bugzilla.redhat.com/2130518"
        },{
          "url": "https://bugzilla.redhat.com/2134609"
        },{
          "url": "https://bugzilla.redhat.com/2140911"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066009"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130518"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134609"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140911"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142808"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44906"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3517"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548"
        },{
          "url": "https://errata.almalinux.org/9/ALSA-2023-0321.html"
        },{
          "url": "https://errata.rockylinux.org/RLSA-2023:0321"
        },{
          "url": "https://github.com/grafana/grafana-image-renderer/issues/329"
        },{
          "url": "https://github.com/isaacs/minimatch"
        },{
          "url": "https://github.com/isaacs/minimatch/commit/a8763f4388e51956be62dc6025cec1126beeb5e6"
        },{
          "url": "https://github.com/isaacs/minimatch/commit/a8763f4388e51956be62dc6025cec1126beeb5e6 (v3.0.5)"
        },{
          "url": "https://github.com/nodejs/node/issues/42510"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2022-3517.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2023-1743.html"
        },{
          "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00011.html"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3517"
        },{
          "url": "https://ubuntu.com/security/notices/USN-6086-1"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
        }
      ]
    },
    {
      "id": "CVE-2021-44906",
      "name": "minimist: prototype pollution",
      "description": "Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).",
      "severity": "Critical",
      "solution": "Upgrade minimist to 1.2.6, 0.2.4",
      "location": {
        "dependency": {
          "package": {
            "name": "minimist"
          },
          "version": "1.2.5"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-44906",
          "value": "CVE-2021-44906",
          "url": "https://avd.aquasec.com/nvd/cve-2021-44906"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/errata/RHSA-2023:0321"
        },{
          "url": "https://access.redhat.com/security/cve/CVE-2021-44906"
        },{
          "url": "https://bugzilla.redhat.com/2066009"
        },{
          "url": "https://bugzilla.redhat.com/2130518"
        },{
          "url": "https://bugzilla.redhat.com/2134609"
        },{
          "url": "https://bugzilla.redhat.com/2140911"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066009"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130518"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134609"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140911"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142808"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44906"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3517"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548"
        },{
          "url": "https://errata.almalinux.org/9/ALSA-2023-0321.html"
        },{
          "url": "https://errata.rockylinux.org/RLSA-2023:0321"
        },{
          "url": "https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip"
        },{
          "url": "https://github.com/advisories/GHSA-xvch-5gv4-984h"
        },{
          "url": "https://github.com/minimistjs/minimist/commit/34e20b8461118608703d6485326abbb8e35e1703"
        },{
          "url": "https://github.com/minimistjs/minimist/commit/bc8ecee43875261f4f17eb20b1243d3ed15e70eb"
        },{
          "url": "https://github.com/minimistjs/minimist/commit/c2b981977fa834b223b408cfb860f933c9811e4d"
        },{
          "url": "https://github.com/minimistjs/minimist/commit/ef9153fc52b6cea0744b2239921c5dcae4697f11"
        },{
          "url": "https://github.com/minimistjs/minimist/commits/v0.2.4"
        },{
          "url": "https://github.com/minimistjs/minimist/issues/11"
        },{
          "url": "https://github.com/minimistjs/minimist/pull/24"
        },{
          "url": "https://github.com/substack/minimist"
        },{
          "url": "https://github.com/substack/minimist/blob/master/index.js#L69"
        },{
          "url": "https://github.com/substack/minimist/issues/164"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2021-44906.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2023-0321.html"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44906"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20240621-0006"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
        },{
          "url": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764"
        },{
          "url": "https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
        }
      ]
    },
    {
      "id": "CVE-2021-44906",
      "name": "minimist: prototype pollution",
      "description": "Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).",
      "severity": "Critical",
      "solution": "Upgrade minimist to 1.2.6, 0.2.4",
      "location": {
        "dependency": {
          "package": {
            "name": "minimist"
          },
          "version": "1.2.5"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-44906",
          "value": "CVE-2021-44906",
          "url": "https://avd.aquasec.com/nvd/cve-2021-44906"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/errata/RHSA-2023:0321"
        },{
          "url": "https://access.redhat.com/security/cve/CVE-2021-44906"
        },{
          "url": "https://bugzilla.redhat.com/2066009"
        },{
          "url": "https://bugzilla.redhat.com/2130518"
        },{
          "url": "https://bugzilla.redhat.com/2134609"
        },{
          "url": "https://bugzilla.redhat.com/2140911"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066009"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130518"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134609"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140911"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142808"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44906"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3517"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548"
        },{
          "url": "https://errata.almalinux.org/9/ALSA-2023-0321.html"
        },{
          "url": "https://errata.rockylinux.org/RLSA-2023:0321"
        },{
          "url": "https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip"
        },{
          "url": "https://github.com/advisories/GHSA-xvch-5gv4-984h"
        },{
          "url": "https://github.com/minimistjs/minimist/commit/34e20b8461118608703d6485326abbb8e35e1703"
        },{
          "url": "https://github.com/minimistjs/minimist/commit/bc8ecee43875261f4f17eb20b1243d3ed15e70eb"
        },{
          "url": "https://github.com/minimistjs/minimist/commit/c2b981977fa834b223b408cfb860f933c9811e4d"
        },{
          "url": "https://github.com/minimistjs/minimist/commit/ef9153fc52b6cea0744b2239921c5dcae4697f11"
        },{
          "url": "https://github.com/minimistjs/minimist/commits/v0.2.4"
        },{
          "url": "https://github.com/minimistjs/minimist/issues/11"
        },{
          "url": "https://github.com/minimistjs/minimist/pull/24"
        },{
          "url": "https://github.com/substack/minimist"
        },{
          "url": "https://github.com/substack/minimist/blob/master/index.js#L69"
        },{
          "url": "https://github.com/substack/minimist/issues/164"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2021-44906.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2023-0321.html"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44906"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20240621-0006"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
        },{
          "url": "https://snyk.io/vuln/SNYK-JS-MINIMIST-559764"
        },{
          "url": "https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
        }
      ]
    },
    {
      "id": "CVE-2021-23343",
      "name": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe",
      "description": "All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.",
      "severity": "Medium",
      "solution": "Upgrade path-parse to 1.0.7",
      "location": {
        "dependency": {
          "package": {
            "name": "path-parse"
          },
          "version": "1.0.6"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-23343",
          "value": "CVE-2021-23343",
          "url": "https://avd.aquasec.com/nvd/cve-2021-23343"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-23343"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993924"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22930"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22931"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22939"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22940"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23343"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32803"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32804"
        },{
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3672"
        },{
          "url": "https://errata.almalinux.org/8/ALSA-2021-3666.html"
        },{
          "url": "https://errata.rockylinux.org/RLSA-2021:3666"
        },{
          "url": "https://github.com/jbgutierrez/path-parse"
        },{
          "url": "https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7"
        },{
          "url": "https://github.com/jbgutierrez/path-parse/issues/8"
        },{
          "url": "https://github.com/jbgutierrez/path-parse/pull/10"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2021-23343.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2021-3666.html"
        },{
          "url": "https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85%40%3Cdev.myfaces.apache.org%3E"
        },{
          "url": "https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343"
        },{
          "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028"
        },{
          "url": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-23343"
        }
      ]
    },
    {
      "id": "CVE-2022-24999",
      "name": "express: \"qs\" prototype poisoning causes the hang of the node process",
      "description": "qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&a[__proto__]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has \"deps: [email protected]\" in its release description, is not vulnerable).",
      "severity": "High",
      "solution": "Upgrade qs to 6.10.3, 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, 6.2.4",
      "location": {
        "dependency": {
          "package": {
            "name": "qs"
          },
          "version": "6.5.2"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2022-24999",
          "value": "CVE-2022-24999",
          "url": "https://avd.aquasec.com/nvd/cve-2022-24999"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/errata/RHSA-2023:0050"
        },{
          "url": "https://access.redhat.com/security/cve/CVE-2022-24999"
        },{
          "url": "https://bugzilla.redhat.com/2044591"
        },{
          "url": "https://bugzilla.redhat.com/2066009"
        },{
          "url": "https://bugzilla.redhat.com/2134609"
        },{
          "url": "https://bugzilla.redhat.com/2140911"
        },{
          "url": "https://bugzilla.redhat.com/2150323"
        },{
          "url": "https://errata.almalinux.org/8/ALSA-2023-0050.html"
        },{
          "url": "https://github.com/expressjs/express/releases/tag/4.17.3"
        },{
          "url": "https://github.com/ljharb/qs"
        },{
          "url": "https://github.com/ljharb/qs/commit/4310742efbd8c03f6495f07906b45213da0a32ec"
        },{
          "url": "https://github.com/ljharb/qs/commit/727ef5d34605108acb3513f72d5435972ed15b68"
        },{
          "url": "https://github.com/ljharb/qs/commit/73205259936317b40f447c5cdb71c5b341848e1b"
        },{
          "url": "https://github.com/ljharb/qs/commit/8b4cc14cda94a5c89341b77e5fe435ec6c41be2d"
        },{
          "url": "https://github.com/ljharb/qs/commit/ba24e74dd17931f825adb52f5633e48293b584e1"
        },{
          "url": "https://github.com/ljharb/qs/commit/e799ba57e573a30c14b67c1889c7c04d508b9105"
        },{
          "url": "https://github.com/ljharb/qs/commit/ed0f5dcbef4b168a8ae299d78b1e4a2e9b1baf1f"
        },{
          "url": "https://github.com/ljharb/qs/commit/f945393cfe442fe8c6e62b4156fd35452c0686ee"
        },{
          "url": "https://github.com/ljharb/qs/commit/fc3682776670524a42e19709ec4a8138d0d7afda"
        },{
          "url": "https://github.com/ljharb/qs/pull/428"
        },{
          "url": "https://github.com/n8tz/CVE-2022-24999"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2022-24999.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2023-0050.html"
        },{
          "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00039.html"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24999"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20230908-0005/"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
        }
      ]
    },
    {
      "id": "CVE-2023-28155",
      "name": "The Request package through 2.88.1 for Node.js allows a bypass of SSRF ...",
      "description": "The Request package through 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.",
      "severity": "Medium",
      "solution": "No solution provided",
      "location": {
        "dependency": {
          "package": {
            "name": "request"
          },
          "version": "2.88.0"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2023-28155",
          "value": "CVE-2023-28155",
          "url": "https://avd.aquasec.com/nvd/cve-2023-28155"
        }
      ],
      "links": [{
          "url": "https://doyensec.com/resources/Doyensec_Advisory_RequestSSRF_Q12023.pdf"
        },{
          "url": "https://github.com/cypress-io/request/blob/master/lib/redirect.js#L116"
        },{
          "url": "https://github.com/cypress-io/request/commit/c5bcf21d40fb61feaff21a0e5a2b3934a440024f"
        },{
          "url": "https://github.com/cypress-io/request/pull/28"
        },{
          "url": "https://github.com/cypress-io/request/releases/tag/v3.0.0"
        },{
          "url": "https://github.com/github/advisory-database/pull/2500"
        },{
          "url": "https://github.com/request/request"
        },{
          "url": "https://github.com/request/request/blob/master/lib/redirect.js#L111"
        },{
          "url": "https://github.com/request/request/issues/3442"
        },{
          "url": "https://github.com/request/request/pull/3444"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28155"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20230413-0007"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20230413-0007/"
        }
      ]
    },
    {
      "id": "CVE-2022-25883",
      "name": "nodejs-semver: Regular expression denial of service",
      "description": "Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.


",
      "severity": "High",
      "solution": "Upgrade semver to 7.5.2, 6.3.1, 5.7.2",
      "location": {
        "dependency": {
          "package": {
            "name": "semver"
          },
          "version": "5.7.1"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2022-25883",
          "value": "CVE-2022-25883",
          "url": "https://avd.aquasec.com/nvd/cve-2022-25883"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/errata/RHSA-2023:5363"
        },{
          "url": "https://access.redhat.com/security/cve/CVE-2022-25883"
        },{
          "url": "https://bugzilla.redhat.com/2216475"
        },{
          "url": "https://bugzilla.redhat.com/2230948"
        },{
          "url": "https://bugzilla.redhat.com/2230955"
        },{
          "url": "https://bugzilla.redhat.com/2230956"
        },{
          "url": "https://errata.almalinux.org/9/ALSA-2023-5363.html"
        },{
          "url": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw"
        },{
          "url": "https://github.com/npm/node-semver"
        },{
          "url": "https://github.com/npm/node-semver/blob/main/classes/range.js#L97-L104"
        },{
          "url": "https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104"
        },{
          "url": "https://github.com/npm/node-semver/blob/main/internal/re.js#L138"
        },{
          "url": "https://github.com/npm/node-semver/blob/main/internal/re.js#L160"
        },{
          "url": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L138"
        },{
          "url": "https://github.com/npm/node-semver/blob/main/internal/re.js%23L160"
        },{
          "url": "https://github.com/npm/node-semver/commit/2f8fd41487acf380194579ecb6f8b1bbfe116be0"
        },{
          "url": "https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441"
        },{
          "url": "https://github.com/npm/node-semver/commit/928e56d21150da0413a3333a3148b20e741a920c"
        },{
          "url": "https://github.com/npm/node-semver/pull/564"
        },{
          "url": "https://github.com/npm/node-semver/pull/585"
        },{
          "url": "https://github.com/npm/node-semver/pull/593"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2022-25883.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2023-5363.html"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20241025-0004"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20241025-0004/"
        },{
          "url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
        }
      ]
    },
    {
      "id": "CVE-2021-27290",
      "name": "nodejs-ssri: Regular expression DoS (ReDoS) when parsing malicious SRI in strict mode",
      "description": "ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.",
      "severity": "High",
      "solution": "Upgrade ssri to 6.0.2, 7.1.1, 8.0.1",
      "location": {
        "dependency": {
          "package": {
            "name": "ssri"
          },
          "version": "6.0.1"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-27290",
          "value": "CVE-2021-27290",
          "url": "https://avd.aquasec.com/nvd/cve-2021-27290"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-27290"
        },{
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
        },{
          "url": "https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf"
        },{
          "url": "https://errata.almalinux.org/8/ALSA-2021-3074.html"
        },{
          "url": "https://github.com/npm/ssri"
        },{
          "url": "https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2"
        },{
          "url": "https://github.com/npm/ssri/commit/809c84d09ea87c3857fa171d42914586899d4538"
        },{
          "url": "https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1"
        },{
          "url": "https://github.com/npm/ssri/pull/20#issuecomment-842677644"
        },{
          "url": "https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2021-27290.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2021-3074.html"
        },{
          "url": "https://npmjs.com"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27290"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
        },{
          "url": "https://www.npmjs.com/package/ssri"
        },{
          "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
        }
      ]
    },
    {
      "id": "CVE-2021-32803",
      "name": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite",
      "description": "The npm package \"tar\" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.",
      "severity": "High",
      "solution": "Upgrade tar to 3.2.3, 4.4.15, 5.0.7, 6.1.2",
      "location": {
        "dependency": {
          "package": {
            "name": "tar"
          },
          "version": "4.4.13"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-32803",
          "value": "CVE-2021-32803",
          "url": "https://avd.aquasec.com/nvd/cve-2021-32803"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-32803"
        },{
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
        },{
          "url": "https://errata.almalinux.org/8/ALSA-2021-3666.html"
        },{
          "url": "https://github.com/isaacs/node-tar"
        },{
          "url": "https://github.com/isaacs/node-tar/commit/46fe35083e2676e31c4e0a81639dce6da7aaa356"
        },{
          "url": "https://github.com/isaacs/node-tar/commit/5987d9a41f6bfbf1ddab1098e1fdcf1a5618f571"
        },{
          "url": "https://github.com/isaacs/node-tar/commit/85d3a942b4064e4ff171f91696fced7975167349"
        },{
          "url": "https://github.com/isaacs/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20"
        },{
          "url": "https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20"
        },{
          "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2021-32803.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2021-3666.html"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803"
        },{
          "url": "https://www.npmjs.com/advisories/1771"
        },{
          "url": "https://www.npmjs.com/package/tar"
        },{
          "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
        }
      ]
    },
    {
      "id": "CVE-2021-32804",
      "name": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite",
      "description": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.",
      "severity": "High",
      "solution": "Upgrade tar to 3.2.2, 4.4.14, 5.0.6, 6.1.1",
      "location": {
        "dependency": {
          "package": {
            "name": "tar"
          },
          "version": "4.4.13"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-32804",
          "value": "CVE-2021-32804",
          "url": "https://avd.aquasec.com/nvd/cve-2021-32804"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-32804"
        },{
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
        },{
          "url": "https://errata.almalinux.org/8/ALSA-2021-3666.html"
        },{
          "url": "https://github.com/npm/node-tar"
        },{
          "url": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4"
        },{
          "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2021-32804.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2021-3666.html"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804"
        },{
          "url": "https://www.npmjs.com/advisories/1770"
        },{
          "url": "https://www.npmjs.com/package/tar"
        },{
          "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
        }
      ]
    },
    {
      "id": "CVE-2021-37701",
      "name": "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite",
      "description": "The npm package \"tar\" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\` and `/` characters as path separators, however `\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.",
      "severity": "High",
      "solution": "Upgrade tar to 4.4.16, 5.0.8, 6.1.7",
      "location": {
        "dependency": {
          "package": {
            "name": "tar"
          },
          "version": "4.4.13"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-37701",
          "value": "CVE-2021-37701",
          "url": "https://avd.aquasec.com/nvd/cve-2021-37701"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-37701"
        },{
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
        },{
          "url": "https://errata.almalinux.org/8/ALSA-2022-0350.html"
        },{
          "url": "https://github.com/npm/node-tar"
        },{
          "url": "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2021-37701.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2022-0350.html"
        },{
          "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37701"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37701"
        },{
          "url": "https://www.debian.org/security/2021/dsa-5008"
        },{
          "url": "https://www.npmjs.com/advisories/1779"
        },{
          "url": "https://www.npmjs.com/package/tar"
        },{
          "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
        }
      ]
    },
    {
      "id": "CVE-2021-37712",
      "name": "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite",
      "description": "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 \"short path\" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.",
      "severity": "High",
      "solution": "Upgrade tar to 4.4.18, 5.0.10, 6.1.9",
      "location": {
        "dependency": {
          "package": {
            "name": "tar"
          },
          "version": "4.4.13"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-37712",
          "value": "CVE-2021-37712",
          "url": "https://avd.aquasec.com/nvd/cve-2021-37712"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-37712"
        },{
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
        },{
          "url": "https://errata.almalinux.org/8/ALSA-2022-0350.html"
        },{
          "url": "https://github.com/isaacs/node-tar/commit/1739408d3122af897caefd09662bce2ea477533b"
        },{
          "url": "https://github.com/isaacs/node-tar/commit/2f1bca027286c23e110b8dfc7efc10756fa3db5a"
        },{
          "url": "https://github.com/isaacs/node-tar/commit/3aaf19b2501bbddb145d92b3322c80dcaed3c35f"
        },{
          "url": "https://github.com/isaacs/node-tar/commit/b6162c7fafe797f856564ef37f4b82747f051455"
        },{
          "url": "https://github.com/isaacs/node-tar/commit/bb93ba243746f705092905da1955ac3b0509ba1e"
        },{
          "url": "https://github.com/isaacs/node-tar/commit/d56f790bda9fea807dd80c5083f24771dbdd6eb1"
        },{
          "url": "https://github.com/npm/node-tar"
        },{
          "url": "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2021-37712.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2022-0350.html"
        },{
          "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37712"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37712"
        },{
          "url": "https://www.debian.org/security/2021/dsa-5008"
        },{
          "url": "https://www.npmjs.com/advisories/1780"
        },{
          "url": "https://www.npmjs.com/package/tar"
        },{
          "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
        }
      ]
    },
    {
      "id": "CVE-2021-37713",
      "name": "nodejs-tar: Arbitrary File Creation/Overwrite on Windows via insufficient relative path sanitization",
      "description": "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\path`. If the drive letter does not match the extraction target, for example `D:\extraction\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. This only affects users of `node-tar` on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.",
      "severity": "High",
      "solution": "Upgrade tar to 4.4.18, 5.0.10, 6.1.9",
      "location": {
        "dependency": {
          "package": {
            "name": "tar"
          },
          "version": "4.4.13"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-37713",
          "value": "CVE-2021-37713",
          "url": "https://avd.aquasec.com/nvd/cve-2021-37713"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-37713"
        },{
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
        },{
          "url": "https://github.com/isaacs/node-tar/commit/52b09e309bcae0c741a7eb79a17ef36e7828b946"
        },{
          "url": "https://github.com/isaacs/node-tar/commit/82eac952f7c10765969ed464e549375854b26edc"
        },{
          "url": "https://github.com/isaacs/node-tar/commit/875a37e3ec031186fc6599f6807341f56c584598"
        },{
          "url": "https://github.com/npm/node-tar"
        },{
          "url": "https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37713"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37713"
        },{
          "url": "https://www.npmjs.com/package/tar"
        },{
          "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
        }
      ]
    },
    {
      "id": "CVE-2024-28863",
      "name": "node-tar: denial of service while parsing a tar file due to lack of folders depth validation",
      "description": "node-tar is a Tar for Node.js. node-tar prior to version 6.2.1 has no limit on the number of sub-folders created in the folder creation process. An attacker who generates a large number of sub-folders can consume memory on the system running node-tar and even crash the Node.js client within few seconds of running it using a path with too many sub-folders inside. Version 6.2.1 fixes this issue by preventing extraction in excessively deep sub-folders.",
      "severity": "Medium",
      "solution": "Upgrade tar to 6.2.1",
      "location": {
        "dependency": {
          "package": {
            "name": "tar"
          },
          "version": "4.4.13"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2024-28863",
          "value": "CVE-2024-28863",
          "url": "https://avd.aquasec.com/nvd/cve-2024-28863"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/errata/RHSA-2024:6147"
        },{
          "url": "https://access.redhat.com/security/cve/CVE-2024-28863"
        },{
          "url": "https://bugzilla.redhat.com/2293200"
        },{
          "url": "https://bugzilla.redhat.com/2296417"
        },{
          "url": "https://errata.almalinux.org/9/ALSA-2024-6147.html"
        },{
          "url": "https://github.com/isaacs/node-tar"
        },{
          "url": "https://github.com/isaacs/node-tar/commit/fe8cd57da5686f8695415414bda49206a545f7f7"
        },{
          "url": "https://github.com/isaacs/node-tar/commit/fe8cd57da5686f8695415414bda49206a545f7f7 (v6.2.1)"
        },{
          "url": "https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36"
        },{
          "url": "https://linux.oracle.com/cve/CVE-2024-28863.html"
        },{
          "url": "https://linux.oracle.com/errata/ELSA-2024-6148.html"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28863"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20240524-0005"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20240524-0005/"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
        }
      ]
    },
    {
      "id": "CVE-2023-26136",
      "name": "tough-cookie: prototype pollution in cookie memstore",
      "description": "Versions of the package tough-cookie before 4.1.3 are vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.",
      "severity": "Medium",
      "solution": "Upgrade tough-cookie to 4.1.3",
      "location": {
        "dependency": {
          "package": {
            "name": "tough-cookie"
          },
          "version": "2.4.3"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2023-26136",
          "value": "CVE-2023-26136",
          "url": "https://avd.aquasec.com/nvd/cve-2023-26136"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2023-26136"
        },{
          "url": "https://github.com/salesforce/tough-cookie"
        },{
          "url": "https://github.com/salesforce/tough-cookie/commit/12d474791bb856004e858fdb1c47b7608d09cf6e"
        },{
          "url": "https://github.com/salesforce/tough-cookie/issues/282"
        },{
          "url": "https://github.com/salesforce/tough-cookie/releases/tag/v4.1.3"
        },{
          "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00010.html"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/3HUE6ZR5SL73KHL7XUPAOEL6SB7HUDT2"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/3HUE6ZR5SL73KHL7XUPAOEL6SB7HUDT2/"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/6PVVPNSAGSDS63HQ74PJ7MZ3MU5IYNVZ"
        },{
          "url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/6PVVPNSAGSDS63HQ74PJ7MZ3MU5IYNVZ/"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26136"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20240621-0006"
        },{
          "url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
        },{
          "url": "https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
        }
      ]
    },
    {
      "id": "CVE-2021-4435",
      "name": "yarn: untrusted search path",
      "description": "An untrusted search path vulnerability was found in Yarn. When a victim runs certain Yarn commands in a directory with attacker-controlled content, malicious commands could be executed in unexpected ways.",
      "severity": "High",
      "solution": "Upgrade yarn to 1.22.13",
      "location": {
        "dependency": {
          "package": {
            "name": "yarn"
          },
          "version": "1.22.5"
        },
        "operating_system": "alpine 3.11.11",
        "image": "test-image-root"
      },
      "identifiers": [
        {
          "type": "cve",
          "name": "CVE-2021-4435",
          "value": "CVE-2021-4435",
          "url": "https://avd.aquasec.com/nvd/cve-2021-4435"
        }
      ],
      "links": [{
          "url": "https://access.redhat.com/security/cve/CVE-2021-4435"
        },{
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262284"
        },{
          "url": "https://github.com/yarnpkg/yarn"
        },{
          "url": "https://github.com/yarnpkg/yarn/commit/67fcce88935e45092ffa2674c08053f1ef5268a1"
        },{
          "url": "https://github.com/yarnpkg/yarn/releases/tag/v1.22.13"
        },{
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4435"
        },{
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-4435"
        }
      ]
    }
  ],
  "remediations": []
}

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant