You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jun 21, 2022. It is now read-only.
I really like how this (especially via Trivy) can be used to check for vulnerabilities about the OS and about installed packages (used by PHP, Node.JS, etc.).
Have you considered having it also check the version of the programming language(s) present?
For example, if the Docker container's PHP version is 7.0.0, that could report the CVE-2019-9020 vulnerability.
The text was updated successfully, but these errors were encountered:
"container's PHP version" or more generally "version of runtime of language X" can be obtained by the same means as any other software. It is not much different from http server for example.
For example if PHP7 was installed by .deb package, it is covered by this.
If it was installed by .rpm package, by some other relevant advisory.
If both above are false, but it was inherited from a well-known public docker-image, maybe all vulnerable image checksums can be somehow scraped? (quite interesting exploration here)
If it was directly compiled from source to binary, it would require some AI probably.
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
I really like how this (especially via Trivy) can be used to check for vulnerabilities about the OS and about installed packages (used by PHP, Node.JS, etc.).
Have you considered having it also check the version of the programming language(s) present?
For example, if the Docker container's PHP version is 7.0.0, that could report the CVE-2019-9020 vulnerability.
The text was updated successfully, but these errors were encountered: