Skip to content

Latest commit

 

History

History
22 lines (18 loc) · 3.85 KB

CONTAINER-SCAN-REPORT.md

File metadata and controls

22 lines (18 loc) · 3.85 KB

Container scan evidence : gl-container-scanning-report.json

Run date: Wed Sep 13 10:51:26 CEST 2023
Produced by: Job

CVE Message Description Severity Solution
CVE-2023-32360 Information leak through Cups-Get-Document operation An authentication issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.7.7, macOS Monterey 12.6.6, macOS Ventura 13.4. An unauthenticated user may be able to access recently printed documents. High Upgrade cups-libs to 1:2.2.6-51.el8_8.1
CVE-2022-40433 segmentation fault in ciMethodBlocks An issue was discovered in function ciMethodBlocks::make_block_at in Oracle JDK (HotSpot VM) 11, 17 and OpenJDK (HotSpot VM) 8, 11, 17, allows attackers to cause a denial of service. High No solution provided
CVE-2022-40433 segmentation fault in ciMethodBlocks An issue was discovered in function ciMethodBlocks::make_block_at in Oracle JDK (HotSpot VM) 11, 17 and OpenJDK (HotSpot VM) 8, 11, 17, allows attackers to cause a denial of service. High No solution provided
CVE-2022-40433 segmentation fault in ciMethodBlocks An issue was discovered in function ciMethodBlocks::make_block_at in Oracle JDK (HotSpot VM) 11, 17 and OpenJDK (HotSpot VM) 8, 11, 17, allows attackers to cause a denial of service. High No solution provided
CVE-2023-24329 urllib.parse url blocklisting bypass An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters. High Upgrade platform-python to 3.6.8-51.el8_8.1
CVE-2023-24329 urllib.parse url blocklisting bypass An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters. High Upgrade python3-libs to 3.6.8-51.el8_8.1
CVE-2022-45868 The web-based admin console in H2 Database Engine through 2.1.214 can ... ** DISPUTED CHANGELOG.md CONTAINER-SCAN-REPORT.md Dockerfile INSTALL.md OKD.md README.md RELEASE-NOTES.md docker_build gl-container-scanning-report.json gl-container-scanning-report.txt pom.xml profiles src tmp.md The web-based admin console in H2 Database Engine through 2.1.214 can be started via the CLI with the argument -webAdminPassword, which allows the user to specify the password in cleartext for the web admin console. Consequently, a local user (or an attacker that has obtained local access through some means) would be able to discover the password by listing processes and their arguments. NOTE: the vendor states "This is not a vulnerability of H2 Console ... Passwords should never be passed on the command line and every qualified DBA or system administrator is expected to know that." High Upgrade com.h2database:h2 to 2.2.220
CVE-2022-44729 Server-Side Request Forgery vulnerability Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.This issue affects Apache XML Graphics Batik: 1.16.

On version 1.16, a malicious SVG could trigger loading external resources by default, causing resource consumption or in some cases even information disclosure. Users are recommended to upgrade to version 1.17 or later.

|High|Upgrade org.apache.xmlgraphics:batik-bridge to 1.17| |CVE-2022-44729|Server-Side Request Forgery vulnerability|Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache XML Graphics Batik.This issue affects Apache XML Graphics Batik: 1.16.

On version 1.16, a malicious SVG could trigger loading external resources by default, causing resource consumption or in some cases even information disclosure. Users are recommended to upgrade to version 1.17 or later.

|High|Upgrade org.apache.xmlgraphics:batik-transcoder to 1.17|