Merge pull request #259 from pascaliske/dependabot/npm_and_yarn/cross… #514
Annotations
10 errors, 12 warnings, and 4 notices
Scan
CVE-2024-2398 - HIGH severity - curl: HTTP/2 push headers memory-leak vulnerability in curl
|
Scan
CVE-2024-6197 - HIGH severity - curl: freeing stack buffer in utf8asn1str vulnerability in curl
|
Scan
CVE-2024-2398 - HIGH severity - curl: HTTP/2 push headers memory-leak vulnerability in libcurl
|
Scan
CVE-2024-6197 - HIGH severity - curl: freeing stack buffer in utf8asn1str vulnerability in libcurl
|
Scan
CVE-2024-45491 - CRITICAL severity - libexpat: Integer Overflow or Wraparound vulnerability in libexpat
|
Scan
CVE-2024-45492 - CRITICAL severity - libexpat: integer overflow vulnerability in libexpat
|
Scan
CVE-2023-52425 - HIGH severity - expat: parsing large tokens can trigger a denial of service vulnerability in libexpat
|
Scan
CVE-2024-28757 - HIGH severity - expat: XML Entity Expansion vulnerability in libexpat
|
Scan
CVE-2024-45490 - HIGH severity - libexpat: Negative Length Parsing Vulnerability in libexpat vulnerability in libexpat
|
Scan
CVE-2024-25062 - HIGH severity - libxml2: use-after-free in XMLReader vulnerability in libxml2
|
Scan
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
|
Scan
CVE-2023-42363 - MEDIUM severity - busybox: use-after-free in awk vulnerability in busybox
|
Scan
CVE-2023-42364 - MEDIUM severity - busybox: use-after-free vulnerability in busybox
|
Scan
CVE-2023-42365 - MEDIUM severity - busybox: use-after-free vulnerability in busybox
|
Scan
CVE-2023-42366 - MEDIUM severity - busybox: A heap-buffer-overflow vulnerability in busybox
|
Scan
CVE-2023-42363 - MEDIUM severity - busybox: use-after-free in awk vulnerability in busybox-binsh
|
Scan
CVE-2023-42364 - MEDIUM severity - busybox: use-after-free vulnerability in busybox-binsh
|
Scan
CVE-2023-42365 - MEDIUM severity - busybox: use-after-free vulnerability in busybox-binsh
|
Scan
CVE-2023-42366 - MEDIUM severity - busybox: A heap-buffer-overflow vulnerability in busybox-binsh
|
Scan
CVE-2024-0853 - MEDIUM severity - curl: OCSP verification bypass with TLS session reuse vulnerability in curl
|
Scan
CVE-2024-2004 - MEDIUM severity - curl: Usage of disabled protocol vulnerability in curl
|
Build
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
|
Scan
CVE-2024-2511 - LOW severity - openssl: Unbounded memory growth with session handling in TLSv1.3 vulnerability in libcrypto3
|
Scan
CVE-2024-9143 - LOW severity - openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access vulnerability in libcrypto3
|
Scan
CVE-2024-2511 - LOW severity - openssl: Unbounded memory growth with session handling in TLSv1.3 vulnerability in libssl3
|
Scan
CVE-2024-9143 - LOW severity - openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access vulnerability in libssl3
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
pascaliske~docker-traefik-errors~WPCE4N.dockerbuild
|
140 KB |
|