-
-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): bump github.com/aquasecurity/trivy from 0.20.0 to 0.22.0 #1350
chore(deps): bump github.com/aquasecurity/trivy from 0.20.0 to 0.22.0 #1350
Conversation
@dependabot rebase |
Bumps [github.com/aquasecurity/trivy](https://github.com/aquasecurity/trivy) from 0.20.0 to 0.22.0. - [Release notes](https://github.com/aquasecurity/trivy/releases) - [Changelog](https://github.com/aquasecurity/trivy/blob/main/goreleaser.yml) - [Commits](aquasecurity/trivy@v0.20.0...v0.22.0) --- updated-dependencies: - dependency-name: github.com/aquasecurity/trivy dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com>
dc71249
to
ed85bac
Compare
Vuls via Trivy v0.22.0 vs Trivy v0.22.0diffenvironment$ vuls -v
vuls-v0.19.1-build-20220113_085202_3f63bbe
$ trivy --version
Version: v0.22.0
Vulnerability DB:
Type: Full
Version: 1
UpdatedAt: 2022-01-12 18:41:01.368432432 +0000 UTC
NextUpdate: 2022-01-13 00:41:01.368431832 +0000 UTC
DownloadedAt: 2022-01-12 20:16:53.249734575 +0000 UTC lockfileI verified with a file in bundlerIn Trivy, CVE-2018-8048 (loofah, nokogiri) is counted in two cases, so the total number of cases is 57 in Trivy and 56 in Vuls.
pip
pipenv
poetry
composer
npm
yarnAs in the case of bundler, Trivy also matched Vuls in terms of unique CVE-IDs with 50.
cargo
gomod
gobinary
jar
pom
nuget-lock
nuget-config
|
Diff with vuls master. $ ./vuls.old -v
vuls-v0.19.1-build-20220113_091111_a3f7d1d
$ ./vuls.new -v
vuls-v0.19.1-build-20220113_085202_3f63bbe
$ make diff
./vuls.old scan -config=./integration/int-config.toml --results-dir='/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results' 'bundler' 'pip' 'pipenv' 'poetry' 'composer' 'npm' 'yarn' 'cargo' 'gomod' 'gobinary' 'jar' 'pom' 'nuget-lock' 'nuget-config'
...
Scan Summary
================
gomod pseudo 0 installed, 0 updatable 328 libs
nuget-config pseudo 0 installed, 0 updatable 1 libs
npm pseudo 0 installed, 0 updatable 273 libs
nuget-lock pseudo 0 installed, 0 updatable 1 libs
composer pseudo 0 installed, 0 updatable 73 libs
bundler pseudo 0 installed, 0 updatable 111 libs
pip pseudo 0 installed, 0 updatable 1 libs
pipenv pseudo 0 installed, 0 updatable 19 libs
pom pseudo 0 installed, 0 updatable
gobinary pseudo 0 installed, 0 updatable
poetry pseudo 0 installed, 0 updatable 62 libs
cargo pseudo 0 installed, 0 updatable 399 libs
yarn pseudo 0 installed, 0 updatable 836 libs
jar pseudo 0 installed, 0 updatable 1 libs
./vuls.new scan -config=./integration/int-config.toml --results-dir='/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results' 'bundler' 'pip' 'pipenv' 'poetry' 'composer' 'npm' 'yarn' 'cargo' 'gomod' 'gobinary' 'jar' 'pom' 'nuget-lock' 'nuget-config'
...
Scan Summary
================
bundler pseudo 0 installed, 0 updatable 111 libs
nuget-config pseudo 0 installed, 0 updatable 1 libs
npm pseudo 0 installed, 0 updatable 273 libs
composer pseudo 0 installed, 0 updatable 73 libs
pipenv pseudo 0 installed, 0 updatable 19 libs
gomod pseudo 0 installed, 0 updatable 328 libs
nuget-lock pseudo 0 installed, 0 updatable 1 libs
gobinary pseudo 0 installed, 0 updatable 1 libs
pip pseudo 0 installed, 0 updatable 1 libs
poetry pseudo 0 installed, 0 updatable 62 libs
yarn pseudo 0 installed, 0 updatable 836 libs
cargo pseudo 0 installed, 0 updatable 399 libs
jar pseudo 0 installed, 0 updatable 1 libs
pom pseudo 0 installed, 0 updatable 2 libs
diff -c ''/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results'/2022-01-13T09:33:46+09:00' ''/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results'/2022-01-13T09:33:47+09:00'
diff -c /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/bundler.json /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/bundler.json
*** /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/bundler.json 2022-01-13 09:33:51.850530938 +0900
--- /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/bundler.json 2022-01-13 09:33:51.878531034 +0900
***************
*** 197,203 ****
{
"key": "ruby",
"name": "nokogiri",
! "fixedIn": "1.6.8",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 197,203 ----
{
"key": "ruby",
"name": "nokogiri",
! "fixedIn": "\u003e= 1.6.8",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 320,326 ****
{
"key": "ruby",
"name": "nokogiri",
! "fixedIn": "1.7.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 320,326 ----
{
"key": "ruby",
"name": "nokogiri",
! "fixedIn": "\u003e= 1.7.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 419,425 ****
{
"key": "ruby",
"name": "actionview",
! "fixedIn": "5.0.0.1, 4.2.7.1, 3.2.22.3",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 419,425 ----
{
"key": "ruby",
"name": "actionview",
! "fixedIn": "~\u003e 4.2.7.1, ~\u003e 4.2.8, \u003e= 5.0.0.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 498,504 ****
{
"key": "ruby",
"name": "activerecord",
! "fixedIn": "4.2.7.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 498,504 ----
{
"key": "ruby",
"name": "activerecord",
! "fixedIn": "\u003e= 4.2.7.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 767,773 ****
{
"key": "ruby",
"name": "yard",
! "fixedIn": "0.9.11",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 767,773 ----
{
"key": "ruby",
"name": "yard",
! "fixedIn": "\u003e= 0.9.11",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 834,840 ****
{
"key": "ruby",
"name": "net-ldap",
! "fixedIn": "0.16.0",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 834,840 ----
{
"key": "ruby",
"name": "net-ldap",
! "fixedIn": "\u003e= 0.16.0",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 1028,1034 ****
{
"key": "ruby",
"name": "nokogiri",
! "fixedIn": "1.7.2",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 1028,1034 ----
{
"key": "ruby",
"name": "nokogiri",
! "fixedIn": "\u003e= 1.7.2",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 1099,1105 ****
{
"key": "ruby",
"name": "rubyzip",
! "fixedIn": "1.2.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 1099,1105 ----
{
"key": "ruby",
"name": "rubyzip",
! "fixedIn": "\u003e= 1.2.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 1222,1228 ****
{
"key": "ruby",
"name": "nokogiri",
! "fixedIn": "1.8.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 1222,1228 ----
{
"key": "ruby",
"name": "nokogiri",
! "fixedIn": "\u003e= 1.8.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 1285,1291 ****
{
"key": "ruby",
"name": "ffi",
! "fixedIn": "1.9.24",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 1285,1291 ----
{
"key": "ruby",
"name": "ffi",
! "fixedIn": "\u003e= 1.9.24",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 1360,1366 ****
{
"key": "ruby",
"name": "rubyzip",
! "fixedIn": "1.2.2",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 1360,1366 ----
{
"key": "ruby",
"name": "rubyzip",
! "fixedIn": "\u003e= 1.2.2",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 1483,1489 ****
{
"key": "ruby",
"name": "nokogiri",
! "fixedIn": "1.8.5",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 1483,1489 ----
{
"key": "ruby",
"name": "nokogiri",
! "fixedIn": "\u003e= 1.8.5",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 1550,1556 ****
{
"key": "ruby",
"name": "loofah",
! "fixedIn": "2.2.3",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 1550,1556 ----
{
"key": "ruby",
"name": "loofah",
! "fixedIn": "\u003e= 2.2.3",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 1637,1643 ****
{
"key": "ruby",
"name": "rack",
! "fixedIn": "1.6.11, 2.0.6",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 1637,1643 ----
{
"key": "ruby",
"name": "rack",
! "fixedIn": "~\u003e 1.6.11, \u003e= 2.0.6",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 1712,1718 ****
{
"key": "ruby",
"name": "activejob",
! "fixedIn": "5.2.1.1, 5.1.6.1, 5.0.7.1, 4.2.11",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 1712,1718 ----
{
"key": "ruby",
"name": "activejob",
! "fixedIn": "~\u003e 4.2.11, ~\u003e 5.0.7.1, ~\u003e 5.1.6.1, ~\u003e 5.1.7, \u003e= 5.2.1.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 1771,1777 ****
{
"key": "ruby",
"name": "rails-html-sanitizer",
! "fixedIn": "1.0.4",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 1771,1777 ----
{
"key": "ruby",
"name": "rails-html-sanitizer",
! "fixedIn": "\u003e= 1.0.4",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 1870,1876 ****
{
"key": "ruby",
"name": "sprockets",
! "fixedIn": "4.0.0.beta8, 3.7.2, 2.12.5",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 1870,1876 ----
{
"key": "ruby",
"name": "sprockets",
! "fixedIn": "\u003e= 2.12.5, \u003c 3.0.0, \u003e= 3.7.2, \u003c 4.0.0, \u003e= 4.0.0.beta8",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 1949,1955 ****
{
"key": "ruby",
"name": "loofah",
! "fixedIn": "2.2.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
},
{
--- 1949,1955 ----
{
"key": "ruby",
"name": "loofah",
! "fixedIn": "\u003e= 2.2.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
},
{
***************
*** 2010,2016 ****
{
"key": "ruby",
"name": "yard",
! "fixedIn": "0.9.20",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 2010,2016 ----
{
"key": "ruby",
"name": "yard",
! "fixedIn": "\u003e= 0.9.20",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 2077,2082 ****
--- 2077,2083 ----
{
"key": "ruby",
"name": "ruby-openid",
+ "fixedIn": "\u003e= 2.9.0",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 2772,2778 ****
{
"key": "ruby",
"name": "loofah",
! "fixedIn": "2.3.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 2773,2779 ----
{
"key": "ruby",
"name": "loofah",
! "fixedIn": "\u003e= 2.3.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 2863,2869 ****
{
"key": "ruby",
"name": "rack",
! "fixedIn": "2.0.8, 1.6.12",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 2864,2870 ----
{
"key": "ruby",
"name": "rack",
! "fixedIn": "~\u003e 1.6.12, \u003e= 2.0.8",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 2958,2964 ****
{
"key": "ruby",
"name": "rubyzip",
! "fixedIn": "1.3.0",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 2959,2965 ----
{
"key": "ruby",
"name": "rubyzip",
! "fixedIn": "\u003e= 1.3.0",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 3077,3083 ****
{
"key": "ruby",
"name": "actionview",
! "fixedIn": "4.2.11.1, 5.2.2.1, 5.0.7.2, 5.1.6.2",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 3078,3084 ----
{
"key": "ruby",
"name": "actionview",
! "fixedIn": "~\u003e 4.2.11, \u003e= 4.2.11.1, ~\u003e 5.0.7, \u003e= 5.0.7.2, ~\u003e 5.1.6, \u003e= 5.1.6.2, ~\u003e 5.2.2, \u003e= 5.2.2.1, \u003e= 6.0.0.beta3",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 3188,3194 ****
{
"key": "ruby",
"name": "actionview",
! "fixedIn": "5.2.2.1, 4.2.11.1, 5.0.7.2, 5.1.6.2",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 3189,3195 ----
{
"key": "ruby",
"name": "actionview",
! "fixedIn": "\u003e= 6.0.0.beta3, ~\u003e 5.2.2, \u003e= 5.2.2.1, ~\u003e 5.1.6, \u003e= 5.1.6.2, ~\u003e 5.0.7, \u003e= 5.0.7.2, ~\u003e 4.2.11, \u003e= 4.2.11.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 3283,3289 ****
{
"key": "ruby",
"name": "nokogiri",
! "fixedIn": "1.10.4",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 3284,3290 ----
{
"key": "ruby",
"name": "nokogiri",
! "fixedIn": "\u003e= 1.10.4",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 3446,3452 ****
{
"key": "ruby",
"name": "json",
! "fixedIn": "2.3.0",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 3447,3453 ----
{
"key": "ruby",
"name": "json",
! "fixedIn": "\u003e= 2.3.0",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 3844,3850 ****
{
"key": "ruby",
"name": "actionview",
! "fixedIn": "5.2.4.4, 6.0.3.3",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 3845,3851 ----
{
"key": "ruby",
"name": "actionview",
! "fixedIn": "~\u003e 5.2.4, \u003e= 5.2.4.4, \u003e= 6.0.3.3",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 3923,3929 ****
{
"key": "ruby",
"name": "nokogiri",
! "fixedIn": "1.11.0",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 3924,3930 ----
{
"key": "ruby",
"name": "nokogiri",
! "fixedIn": "\u003e= 1.11.0.rc4",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 3994,4000 ****
{
"key": "ruby",
"name": "redcarpet",
! "fixedIn": "3.5.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 3995,4001 ----
{
"key": "ruby",
"name": "redcarpet",
! "fixedIn": "\u003e= 3.5.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 4081,4087 ****
{
"key": "ruby",
"name": "actionview",
! "fixedIn": "5.2.4.2, 6.0.2.2",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 4082,4088 ----
{
"key": "ruby",
"name": "actionview",
! "fixedIn": "~\u003e 5.2.4, \u003e= 5.2.4.2, \u003e= 6.0.2.2",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 4204,4210 ****
{
"key": "ruby",
"name": "nokogiri",
! "fixedIn": "1.10.8",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 4205,4211 ----
{
"key": "ruby",
"name": "nokogiri",
! "fixedIn": "\u003e= 1.10.8",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 4291,4297 ****
{
"key": "ruby",
"name": "rake",
! "fixedIn": "12.3.3",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 4292,4298 ----
{
"key": "ruby",
"name": "rake",
! "fixedIn": "\u003e= 12.3.3",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 4386,4392 ****
{
"key": "ruby",
"name": "rack",
! "fixedIn": "2.1.3",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 4387,4393 ----
{
"key": "ruby",
"name": "rack",
! "fixedIn": "~\u003e 2.1.3, \u003e= 2.2.0",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 4465,4471 ****
{
"key": "ruby",
"name": "actionview",
! "fixedIn": "4.2.11.3",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 4466,4472 ----
{
"key": "ruby",
"name": "actionview",
! "fixedIn": "\u003e= 4.2.11.2",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 4888,4894 ****
{
"key": "ruby",
"name": "rack",
! "fixedIn": "2.2.3, 2.1.4",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 4889,4895 ----
{
"key": "ruby",
"name": "rack",
! "fixedIn": "~\u003e 2.1.4, \u003e= 2.2.3",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 5050,5056 ****
{
"key": "ruby",
"name": "actionpack",
! "fixedIn": "5.2.4.6, 5.2.6, 6.1.3.2, 6.0.3.7",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 5051,5057 ----
{
"key": "ruby",
"name": "actionpack",
! "fixedIn": "~\u003e 5.2.4.6, ~\u003e 5.2.6, ~\u003e 6.0.3, \u003e= 6.0.3.7, \u003e= 6.1.3.2",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 5133,5139 ****
{
"key": "ruby",
"name": "actionpack",
! "fixedIn": "5.2.4.6, 5.2.6, 6.1.3.2, 6.0.3.7",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 5134,5140 ----
{
"key": "ruby",
"name": "actionpack",
! "fixedIn": "~\u003e 5.2.4.6, ~\u003e 5.2.6, ~\u003e 6.0.3, \u003e= 6.0.3.7, \u003e= 6.1.3.2",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 5228,5234 ****
{
"key": "ruby",
"name": "rdoc",
! "fixedIn": "6.3.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 5229,5235 ----
{
"key": "ruby",
"name": "rdoc",
! "fixedIn": "\u003e= 6.3.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 5299,5305 ****
{
"key": "ruby",
"name": "addressable",
! "fixedIn": "2.8.0",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 5300,5306 ----
{
"key": "ruby",
"name": "addressable",
! "fixedIn": "\u003e= 2.8.0",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 5358,5364 ****
{
"key": "ruby",
"name": "nokogiri",
! "fixedIn": "1.12.5",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 5359,5365 ----
{
"key": "ruby",
"name": "nokogiri",
! "fixedIn": "\u003e= 1.12.5",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
***************
*** 5409,5415 ****
{
"key": "ruby",
"name": "nokogiri",
! "fixedIn": "1.11.4",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
--- 5410,5416 ----
{
"key": "ruby",
"name": "nokogiri",
! "fixedIn": "\u003e= 1.11.4",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Gemfile.lock"
}
]
diff -c /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/composer.json /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/composer.json
*** /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/composer.json 2022-01-13 09:33:51.846530925 +0900
--- /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/composer.json 2022-01-13 09:33:51.874531019 +0900
***************
*** 157,163 ****
{
"key": "php",
"name": "symfony/http-foundation",
! "fixedIn": "4.2.7, 4.1.12, 3.4.26, 2.8.50, 2.7.51",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/composer.lock"
}
]
--- 157,163 ----
{
"key": "php",
"name": "symfony/http-foundation",
! "fixedIn": "3.2.0, 3.3.0, 3.4.0, 4.1.0, 4.2.7, 2.7.51, 2.8.50, 3.1.0, 3.4.26, 4.1.12",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/composer.lock"
}
]
***************
*** 236,242 ****
{
"key": "php",
"name": "symfony/http-kernel",
! "fixedIn": "2.3.0, 2.5.0, 2.6.0, 4.2.12, 3.4.35, 2.4.0, 2.8.0, 2.8.52, 3.2.0, 4.3.8, 2.7.0, 3.1.0, 3.3.0, 3.4.0, 4.1.0, 4.2.0",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/composer.lock"
}
]
--- 236,242 ----
{
"key": "php",
"name": "symfony/http-kernel",
! "fixedIn": "2.6.0, 2.8.52, 3.1.0, 2.4.0, 4.2.0, 4.2.12, 4.3.8, 2.3.0, 2.5.0, 2.8.0, 3.3.0, 2.7.0, 3.2.0, 3.4.0, 3.4.35, 4.1.0",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/composer.lock"
}
]
***************
*** 339,345 ****
{
"key": "php",
"name": "symfony/http-foundation",
! "fixedIn": "4.3.8, 4.2.12, 3.4.35, 2.8.52",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/composer.lock"
}
]
--- 339,345 ----
{
"key": "php",
"name": "symfony/http-foundation",
! "fixedIn": "2.3.0, 4.2.0, 4.2.12, 4.1.0, 2.5.0, 2.7.0, 3.1.0, 3.4.35, 3.2.0, 3.3.0, 4.3.8, 2.2.0, 2.4.0, 2.6.0, 2.8.52, 2.1.0, 2.8.0, 3.4.0",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/composer.lock"
}
]
***************
*** 729,735 ****
{
"key": "php",
"name": "league/flysystem",
! "fixedIn": "2.1.1, 1.1.4",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/composer.lock"
}
]
--- 729,735 ----
{
"key": "php",
"name": "league/flysystem",
! "fixedIn": "1.1.4, 2.1.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/composer.lock"
}
]
***************
*** 812,818 ****
{
"key": "php",
"name": "laravel/framework",
! "fixedIn": "8.75.0, 7.30.6, 6.20.42",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/composer.lock"
}
]
--- 812,818 ----
{
"key": "php",
"name": "laravel/framework",
! "fixedIn": "6.20.42, 7.30.6, 8.75.0",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/composer.lock"
}
]
diff -c /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/gobinary.json /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/gobinary.json
*** /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/gobinary.json 2022-01-13 09:33:51.834530885 +0900
--- /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/gobinary.json 2022-01-13 09:33:51.862530979 +0900
***************
*** 35,47 ****
"reportedBy": "lize",
"errors": [],
"warnings": [],
! "scannedCves": {},
"runningKernel": {
"release": "",
"version": "",
"rebootRequired": false
},
"packages": {},
"config": {
"scan": {
"logDir": "/var/log/vuls",
--- 35,178 ----
"reportedBy": "lize",
"errors": [],
"warnings": [],
! "scannedCves": {
! "CVE-2020-14040": {
! "cveID": "CVE-2020-14040",
! "confidences": [
! {
! "score": 100,
! "detectionMethod": "TrivyMatch"
! }
! ],
! "cveContents": {
! "trivy": [
! {
! "type": "trivy",
! "cveID": "CVE-2020-14040",
! "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash",
! "summary": "The x/text package before 0.3.3 for Go has a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String.",
! "cvss2Score": 0,
! "cvss2Vector": "",
! "cvss2Severity": "",
! "cvss3Score": 0,
! "cvss3Vector": "",
! "cvss3Severity": "HIGH",
! "sourceLink": "",
! "references": [
! {
! "link": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14040",
! "source": "trivy"
! },
! {
! "link": "https://github.com/advisories/GHSA-5rcv-m4m3-hfh7",
! "source": "trivy"
! },
! {
! "link": "https://github.com/golang/go/issues/39491",
! "source": "trivy"
! },
! {
! "link": "https://github.com/golang/text/commit/23ae387dee1f90d29a23c0e87ee0b46038fbed0e",
! "source": "trivy"
! },
! {
! "link": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0",
! "source": "trivy"
! },
! {
! "link": "https://linux.oracle.com/cve/CVE-2020-14040.html",
! "source": "trivy"
! },
! {
! "link": "https://linux.oracle.com/errata/ELSA-2020-4694.html",
! "source": "trivy"
! },
! {
! "link": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/",
! "source": "trivy"
! },
! {
! "link": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040",
! "source": "trivy"
! }
! ],
! "published": "0001-01-01T00:00:00Z",
! "lastModified": "0001-01-01T00:00:00Z"
! }
! ]
! },
! "alertDict": {
! "cisa": null,
! "jpcert": null,
! "uscert": null
! },
! "libraryFixedIns": [
! {
! "name": "golang.org/x/text",
! "fixedIn": "0.3.3",
! "path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/gobinary"
! }
! ]
! },
! "CVE-2021-38561": {
! "cveID": "CVE-2021-38561",
! "confidences": [
! {
! "score": 100,
! "detectionMethod": "TrivyMatch"
! }
! ],
! "cveContents": {
! "trivy": [
! {
! "type": "trivy",
! "cveID": "CVE-2021-38561",
! "title": "",
! "summary": "",
! "cvss2Score": 0,
! "cvss2Vector": "",
! "cvss2Severity": "",
! "cvss3Score": 0,
! "cvss3Vector": "",
! "cvss3Severity": "UNKNOWN",
! "sourceLink": "",
! "published": "0001-01-01T00:00:00Z",
! "lastModified": "0001-01-01T00:00:00Z"
! }
! ]
! },
! "alertDict": {
! "cisa": null,
! "jpcert": null,
! "uscert": null
! },
! "libraryFixedIns": [
! {
! "name": "golang.org/x/text",
! "fixedIn": "0.3.7",
! "path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/gobinary"
! }
! ]
! }
! },
"runningKernel": {
"release": "",
"version": "",
"rebootRequired": false
},
"packages": {},
+ "libraries": [
+ {
+ "Libs": [
+ {
+ "Name": "golang.org/x/text",
+ "Version": "v0.3.2",
+ "FilePath": ""
+ }
+ ],
+ "path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/gobinary"
+ }
+ ],
"config": {
"scan": {
"logDir": "/var/log/vuls",
diff -c /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/jar.json /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/jar.json
*** /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/jar.json 2022-01-13 09:33:51.838530898 +0900
--- /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/jar.json 2022-01-13 09:33:51.866530993 +0900
***************
*** 681,687 ****
{
"Name": "org.apache.logging.log4j:log4j-core",
"Version": "2.14.1",
! "FilePath": ""
}
],
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/test.jar"
--- 681,687 ----
{
"Name": "org.apache.logging.log4j:log4j-core",
"Version": "2.14.1",
! "FilePath": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/test.jar"
}
],
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/test.jar"
diff -c /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/npm.json /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/npm.json
*** /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/npm.json 2022-01-13 09:33:51.854530953 +0900
--- /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/npm.json 2022-01-13 09:33:51.882531047 +0900
***************
*** 173,179 ****
{
"key": "node",
"name": "cryptiles",
! "fixedIn": "4.1.2",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/package-lock.json"
}
]
--- 173,179 ----
{
"key": "node",
"name": "cryptiles",
! "fixedIn": "\u003e=4.1.2",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/package-lock.json"
}
]
***************
*** 240,246 ****
{
"key": "node",
"name": "lodash",
! "fixedIn": "4.17.11",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/package-lock.json"
}
]
--- 240,246 ----
{
"key": "node",
"name": "lodash",
! "fixedIn": "\u003e=4.17.11",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/package-lock.json"
}
]
***************
*** 453,459 ****
{
"key": "node",
"name": "lodash",
! "fixedIn": "4.17.5",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/package-lock.json"
}
]
--- 453,459 ----
{
"key": "node",
"name": "lodash",
! "fixedIn": "\u003e=4.17.5",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/package-lock.json"
}
]
***************
*** 536,542 ****
{
"key": "node",
"name": "hoek",
! "fixedIn": "5.0.3, 4.2.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/package-lock.json"
}
]
--- 536,542 ----
{
"key": "node",
"name": "hoek",
! "fixedIn": "\u003e=5.0.3 \u003e=4.2.1",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/package-lock.json"
}
]
diff -c /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/pipenv.json /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/pipenv.json
*** /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/pipenv.json 2022-01-13 09:33:51.862530979 +0900
--- /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/pipenv.json 2022-01-13 09:33:51.890531074 +0900
***************
*** 526,532 ****
{
"key": "python",
"name": "flask",
! "fixedIn": "1.0.0",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Pipfile.lock"
}
]
--- 526,532 ----
{
"key": "python",
"name": "flask",
! "fixedIn": "1.0",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/Pipfile.lock"
}
]
diff -c /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/poetry.json /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/poetry.json
*** /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/poetry.json 2022-01-13 09:33:51.838530898 +0900
--- /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/poetry.json 2022-01-13 09:33:51.866530993 +0900
***************
*** 268,274 ****
{
"key": "python",
"name": "keyring",
- "fixedIn": "0.10",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/poetry.lock"
}
]
--- 268,273 ----
***************
*** 489,495 ****
{
"key": "python",
"name": "py",
- "fixedIn": "1.10.0",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/poetry.lock"
}
]
--- 488,493 ----
diff -c /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/pom.json /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/pom.json
*** /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/pom.json 2022-01-13 09:33:51.842530912 +0900
--- /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/pom.json 2022-01-13 09:33:51.870531006 +0900
***************
*** 35,47 ****
"reportedBy": "lize",
"errors": [],
"warnings": [],
! "scannedCves": {},
"runningKernel": {
"release": "",
"version": "",
"rebootRequired": false
},
"packages": {},
"config": {
"scan": {
"logDir": "/var/log/vuls",
--- 35,693 ----
"reportedBy": "lize",
"errors": [],
"warnings": [],
! "scannedCves": {
! "CVE-2021-44228": {
! "cveID": "CVE-2021-44228",
! "confidences": [
! {
! "score": 100,
! "detectionMethod": "TrivyMatch"
! }
! ],
! "cveContents": {
! "trivy": [
! {
! "type": "trivy",
! "cveID": "CVE-2021-44228",
! "title": "log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value",
! "summary": "Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0, this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.",
! "cvss2Score": 0,
! "cvss2Vector": "",
! "cvss2Severity": "",
! "cvss3Score": 0,
! "cvss3Vector": "",
! "cvss3Severity": "CRITICAL",
! "sourceLink": "",
! "references": [
! {
! "link": "http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html",
! "source": "trivy"
! },
! {
! "link": "http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html",
! "source": "trivy"
! },
! {
! "link": "http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html",
! "source": "trivy"
! },
! {
! "link": "http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html",
! "source": "trivy"
! },
! {
! "link": "http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html",
! "source": "trivy"
! },
! {
! "link": "http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html",
! "source": "trivy"
! },
! {
! "link": "http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html",
! "source": "trivy"
! },
! {
! "link": "http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html",
! "source": "trivy"
! },
! {
! "link": "http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html",
! "source": "trivy"
! },
! {
! "link": "http://www.openwall.com/lists/oss-security/2021/12/10/1",
! "source": "trivy"
! },
! {
! "link": "http://www.openwall.com/lists/oss-security/2021/12/10/2",
! "source": "trivy"
! },
! {
! "link": "http://www.openwall.com/lists/oss-security/2021/12/10/3",
! "source": "trivy"
! },
! {
! "link": "http://www.openwall.com/lists/oss-security/2021/12/13/1",
! "source": "trivy"
! },
! {
! "link": "http://www.openwall.com/lists/oss-security/2021/12/13/2",
! "source": "trivy"
! },
! {
! "link": "http://www.openwall.com/lists/oss-security/2021/12/14/4",
! "source": "trivy"
! },
! {
! "link": "http://www.openwall.com/lists/oss-security/2021/12/15/3",
! "source": "trivy"
! },
! {
! "link": "https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf",
! "source": "trivy"
! },
! {
! "link": "https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf",
! "source": "trivy"
! },
! {
! "link": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228",
! "source": "trivy"
! },
! {
! "link": "https://github.com/advisories/GHSA-7rjr-3q55-vv33",
! "source": "trivy"
! },
! {
! "link": "https://github.com/advisories/GHSA-jfh8-c2jp-5v3q",
! "source": "trivy"
! },
! {
! "link": "https://github.com/apache/logging-log4j2/commit/c77b3cb39312b83b053d23a2158b99ac7de44dd3",
! "source": "trivy"
! },
! {
! "link": "https://github.com/apache/logging-log4j2/pull/608",
! "source": "trivy"
! },
! {
! "link": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126",
! "source": "trivy"
! },
! {
! "link": "https://github.com/tangxiaofeng7/apache-log4j-poc",
! "source": "trivy"
! },
! {
! "link": "https://issues.apache.org/jira/browse/LOG4J2-3198",
! "source": "trivy"
! },
! {
! "link": "https://issues.apache.org/jira/browse/LOG4J2-3201",
! "source": "trivy"
! },
! {
! "link": "https://issues.apache.org/jira/browse/LOG4J2-3214",
! "source": "trivy"
! },
! {
! "link": "https://issues.apache.org/jira/browse/LOG4J2-3221",
! "source": "trivy"
! },
! {
! "link": "https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html",
! "source": "trivy"
! },
! {
! "link": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/",
! "source": "trivy"
! },
! {
! "link": "https://logging.apache.org/log4j/2.x/changes-report.html#a2.15.0",
! "source": "trivy"
! },
! {
! "link": "https://logging.apache.org/log4j/2.x/manual/lookups.html#JndiLookup",
! "source": "trivy"
! },
! {
! "link": "https://logging.apache.org/log4j/2.x/manual/migration.html",
! "source": "trivy"
! },
! {
! "link": "https://logging.apache.org/log4j/2.x/security.html",
! "source": "trivy"
! },
! {
! "link": "https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/",
! "source": "trivy"
! },
! {
! "link": "https://nvd.nist.gov/vuln/detail/CVE-2021-44228",
! "source": "trivy"
! },
! {
! "link": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032",
! "source": "trivy"
! },
! {
! "link": "https://security.netapp.com/advisory/ntap-20211210-0007/",
! "source": "trivy"
! },
! {
! "link": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd",
! "source": "trivy"
! },
! {
! "link": "https://twitter.com/kurtseifried/status/1469345530182455296",
! "source": "trivy"
! },
! {
! "link": "https://ubuntu.com/security/notices/USN-5192-1",
! "source": "trivy"
! },
! {
! "link": "https://ubuntu.com/security/notices/USN-5192-2",
! "source": "trivy"
! },
! {
! "link": "https://ubuntu.com/security/notices/USN-5197-1",
! "source": "trivy"
! },
! {
! "link": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/Log4Shell",
! "source": "trivy"
! },
! {
! "link": "https://www.debian.org/security/2021/dsa-5020",
! "source": "trivy"
! },
! {
! "link": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html",
! "source": "trivy"
! },
! {
! "link": "https://www.kb.cert.org/vuls/id/930724",
! "source": "trivy"
! },
! {
! "link": "https://www.lunasec.io/docs/blog/log4j-zero-day/",
! "source": "trivy"
! },
! {
! "link": "https://www.oracle.com/security-alerts/alert-cve-2021-44228.html",
! "source": "trivy"
! }
! ],
! "published": "0001-01-01T00:00:00Z",
! "lastModified": "0001-01-01T00:00:00Z"
! }
! ]
! },
! "alertDict": {
! "cisa": null,
! "jpcert": null,
! "uscert": null
! },
! "libraryFixedIns": [
! {
! "name": "org.apache.logging.log4j:log4j-core",
! "fixedIn": "2.15.0",
! "path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/pom.xml"
! }
! ]
! },
! "CVE-2021-44832": {
! "cveID": "CVE-2021-44832",
! "confidences": [
! {
! "score": 100,
! "detectionMethod": "TrivyMatch"
! }
! ],
! "cveContents": {
! "trivy": [
! {
! "type": "trivy",
! "cveID": "CVE-2021-44832",
! "title": "log4j-core: remote code execution via JDBC Appender",
! "summary": "Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.",
! "cvss2Score": 0,
! "cvss2Vector": "",
! "cvss2Severity": "",
! "cvss3Score": 0,
! "cvss3Vector": "",
! "cvss3Severity": "MEDIUM",
! "sourceLink": "",
! "references": [
! {
! "link": "http://www.openwall.com/lists/oss-security/2021/12/28/1",
! "source": "trivy"
! },
! {
! "link": "https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf",
! "source": "trivy"
! },
! {
! "link": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832",
! "source": "trivy"
! },
! {
! "link": "https://github.com/advisories/GHSA-8489-44mv-ggj8",
! "source": "trivy"
! },
! {
! "link": "https://github.com/apache/logging-log4j2/commit/05db5f9527254632b59aed2a1d78a32c5ab74f16",
! "source": "trivy"
! },
! {
! "link": "https://issues.apache.org/jira/browse/LOG4J2-3293",
! "source": "trivy"
! },
! {
! "link": "https://lists.apache.org/thread/s1o5vlo78ypqxnzn6p8zf6t9shtq5143",
! "source": "trivy"
! },
! {
! "link": "https://lists.debian.org/debian-lts-announce/2021/12/msg00036.html",
! "source": "trivy"
! },
! {
! "link": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVV25FXL4FU5X6X5BSL7RLQ7T6F65MRA/",
! "source": "trivy"
! },
! {
! "link": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57MPJUW3MA6QGWZRTMCHHMMPQNVKGFC/",
! "source": "trivy"
! },
! {
! "link": "https://nvd.nist.gov/vuln/detail/CVE-2021-44832",
! "source": "trivy"
! },
! {
! "link": "https://security.netapp.com/advisory/ntap-20220104-0001/",
! "source": "trivy"
! },
! {
! "link": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd",
! "source": "trivy"
! },
! {
! "link": "https://ubuntu.com/security/notices/USN-5222-1",
! "source": "trivy"
! }
! ],
! "published": "0001-01-01T00:00:00Z",
! "lastModified": "0001-01-01T00:00:00Z"
! }
! ]
! },
! "alertDict": {
! "cisa": null,
! "jpcert": null,
! "uscert": null
! },
! "libraryFixedIns": [
! {
! "name": "org.apache.logging.log4j:log4j-core",
! "fixedIn": "2.17.1, 2.12.4, 2.3.2",
! "path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/pom.xml"
! }
! ]
! },
! "CVE-2021-45046": {
! "cveID": "CVE-2021-45046",
! "confidences": [
! {
! "score": 100,
! "detectionMethod": "TrivyMatch"
! }
! ],
! "cveContents": {
! "trivy": [
! {
! "type": "trivy",
! "cveID": "CVE-2021-45046",
! "title": "log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228)",
! "summary": "It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.",
! "cvss2Score": 0,
! "cvss2Vector": "",
! "cvss2Severity": "",
! "cvss3Score": 0,
! "cvss3Vector": "",
! "cvss3Severity": "CRITICAL",
! "sourceLink": "",
! "references": [
! {
! "link": "http://www.openwall.com/lists/oss-security/2021/12/14/4",
! "source": "trivy"
! },
! {
! "link": "http://www.openwall.com/lists/oss-security/2021/12/15/3",
! "source": "trivy"
! },
! {
! "link": "http://www.openwall.com/lists/oss-security/2021/12/18/1",
! "source": "trivy"
! },
! {
! "link": "https://access.redhat.com/security/cve/CVE-2021-44228",
! "source": "trivy"
! },
! {
! "link": "https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf",
! "source": "trivy"
! },
! {
! "link": "https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf",
! "source": "trivy"
! },
! {
! "link": "https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf",
! "source": "trivy"
! },
! {
! "link": "https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf",
! "source": "trivy"
! },
! {
! "link": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046",
! "source": "trivy"
! },
! {
! "link": "https://github.com/advisories/GHSA-7rjr-3q55-vv33",
! "source": "trivy"
! },
! {
! "link": "https://github.com/advisories/GHSA-jfh8-c2jp-5v3q",
! "source": "trivy"
! },
! {
! "link": "https://issues.apache.org/jira/browse/LOG4J2-3221",
! "source": "trivy"
! },
! {
! "link": "https://lists.apache.org/thread/83y7dx5xvn3h5290q1twn16tltolv88f",
! "source": "trivy"
! },
! {
! "link": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/",
! "source": "trivy"
! },
! {
! "link": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/",
! "source": "trivy"
! },
! {
! "link": "https://logging.apache.org/log4j/2.x/security.html",
! "source": "trivy"
! },
! {
! "link": "https://nvd.nist.gov/vuln/detail/CVE-2021-45046",
! "source": "trivy"
! },
! {
! "link": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032",
! "source": "trivy"
! },
! {
! "link": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd",
! "source": "trivy"
! },
! {
! "link": "https://ubuntu.com/security/notices/USN-5197-1",
! "source": "trivy"
! },
! {
! "link": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/Log4Shell",
! "source": "trivy"
! },
! {
! "link": "https://www.cve.org/CVERecord?id=CVE-2021-44228",
! "source": "trivy"
! },
! {
! "link": "https://www.cve.org/CVERecord?id=CVE-2021-45046",
! "source": "trivy"
! },
! {
! "link": "https://www.debian.org/security/2021/dsa-5022",
! "source": "trivy"
! },
! {
! "link": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html",
! "source": "trivy"
! },
! {
! "link": "https://www.kb.cert.org/vuls/id/930724",
! "source": "trivy"
! },
! {
! "link": "https://www.openwall.com/lists/oss-security/2021/12/14/4",
! "source": "trivy"
! },
! {
! "link": "https://www.oracle.com/security-alerts/alert-cve-2021-44228.html",
! "source": "trivy"
! }
! ],
! "published": "0001-01-01T00:00:00Z",
! "lastModified": "0001-01-01T00:00:00Z"
! }
! ]
! },
! "alertDict": {
! "cisa": null,
! "jpcert": null,
! "uscert": null
! },
! "libraryFixedIns": [
! {
! "name": "org.apache.logging.log4j:log4j-core",
! "fixedIn": "2.16.0",
! "path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/pom.xml"
! }
! ]
! },
! "CVE-2021-45105": {
! "cveID": "CVE-2021-45105",
! "confidences": [
! {
! "score": 100,
! "detectionMethod": "TrivyMatch"
! }
! ],
! "cveContents": {
! "trivy": [
! {
! "type": "trivy",
! "cveID": "CVE-2021-45105",
! "title": "log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern",
! "summary": "Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.",
! "cvss2Score": 0,
! "cvss2Vector": "",
! "cvss2Severity": "",
! "cvss3Score": 0,
! "cvss3Vector": "",
! "cvss3Severity": "MEDIUM",
! "sourceLink": "",
! "references": [
! {
! "link": "http://www.openwall.com/lists/oss-security/2021/12/19/1",
! "source": "trivy"
! },
! {
! "link": "https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf",
! "source": "trivy"
! },
! {
! "link": "https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf",
! "source": "trivy"
! },
! {
! "link": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105",
! "source": "trivy"
! },
! {
! "link": "https://github.com/advisories/GHSA-p6xc-xr62-6r2g",
! "source": "trivy"
! },
! {
! "link": "https://issues.apache.org/jira/browse/LOG4J2-3230",
! "source": "trivy"
! },
! {
! "link": "https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html",
! "source": "trivy"
! },
! {
! "link": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/",
! "source": "trivy"
! },
! {
! "link": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/",
! "source": "trivy"
! },
! {
! "link": "https://logging.apache.org/log4j/2.x/security.html",
! "source": "trivy"
! },
! {
! "link": "https://logging.apache.org/log4j/2.x/security.html#CVE-2021-45105",
! "source": "trivy"
! },
! {
! "link": "https://nvd.nist.gov/vuln/detail/CVE-2021-45105",
! "source": "trivy"
! },
! {
! "link": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032",
! "source": "trivy"
! },
! {
! "link": "https://security.netapp.com/advisory/ntap-20211218-0001/",
! "source": "trivy"
! },
! {
! "link": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd",
! "source": "trivy"
! },
! {
! "link": "https://ubuntu.com/security/notices/USN-5203-1",
! "source": "trivy"
! },
! {
! "link": "https://ubuntu.com/security/notices/USN-5222-1",
! "source": "trivy"
! },
! {
! "link": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/Log4Shell",
! "source": "trivy"
! },
! {
! "link": "https://www.cve.org/CVERecord?id=CVE-2021-45105",
! "source": "trivy"
! },
! {
! "link": "https://www.debian.org/security/2021/dsa-5024",
! "source": "trivy"
! },
! {
! "link": "https://www.kb.cert.org/vuls/id/930724",
! "source": "trivy"
! },
! {
! "link": "https://www.openwall.com/lists/oss-security/2021/12/19/1",
! "source": "trivy"
! },
! {
! "link": "https://www.zerodayinitiative.com/advisories/ZDI-21-1541/",
! "source": "trivy"
! }
! ],
! "published": "0001-01-01T00:00:00Z",
! "lastModified": "0001-01-01T00:00:00Z"
! }
! ]
! },
! "alertDict": {
! "cisa": null,
! "jpcert": null,
! "uscert": null
! },
! "libraryFixedIns": [
! {
! "name": "org.apache.logging.log4j:log4j-core",
! "fixedIn": "2.17.0, 2.12.3",
! "path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/pom.xml"
! }
! ]
! }
! },
"runningKernel": {
"release": "",
"version": "",
"rebootRequired": false
},
"packages": {},
+ "libraries": [
+ {
+ "Libs": [
+ {
+ "Name": "com.example:example",
+ "Version": "1",
+ "FilePath": ""
+ },
+ {
+ "Name": "org.apache.logging.log4j:log4j-core",
+ "Version": "2.14.1",
+ "FilePath": ""
+ }
+ ],
+ "path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/pom.xml"
+ }
+ ],
"config": {
"scan": {
"logDir": "/var/log/vuls",
diff -c /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/yarn.json /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/yarn.json
*** /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/yarn.json 2022-01-13 09:33:51.842530912 +0900
--- /home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/yarn.json 2022-01-13 09:33:51.870531006 +0900
***************
*** 161,167 ****
{
"key": "node",
"name": "lodash",
! "fixedIn": "4.17.11",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/yarn.lock"
}
]
--- 161,167 ----
{
"key": "node",
"name": "lodash",
! "fixedIn": "\u003e=4.17.11",
"path": "/home/mainek00n/github/github.com/MaineK00n/vuls/integration/data/lockfile/yarn.lock"
}
]
echo "old: ''/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results'/2022-01-13T09:33:46+09:00' , new: ''/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results'/2022-01-13T09:33:47+09:00'"
old: ''/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results'/2022-01-13T09:33:46+09:00' , new: ''/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results'/2022-01-13T09:33:47+09:00'
for jsonfile in ''/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results'/2022-01-13T09:33:46+09:00'/*.json ; do echo $jsonfile; cat $jsonfile | jq ".scannedCves | length" ; done
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/bundler.json
56
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/cargo.json
13
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/composer.json
13
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/gobinary.json
0
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/gomod.json
27
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/jar.json
4
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/npm.json
28
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/nuget-config.json
2
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/nuget-lock.json
2
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/pip.json
1
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/pipenv.json
16
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/poetry.json
8
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/pom.json
0
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:46+09:00/yarn.json
50
for jsonfile in ''/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results'/2022-01-13T09:33:47+09:00'/*.json ; do echo $jsonfile; cat $jsonfile | jq ".scannedCves | length" ; done
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/bundler.json
56
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/cargo.json
13
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/composer.json
13
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/gobinary.json
2
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/gomod.json
27
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/jar.json
4
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/npm.json
28
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/nuget-config.json
2
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/nuget-lock.json
2
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/pip.json
1
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/pipenv.json
16
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/poetry.json
8
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/pom.json
4
/home/mainek00n/github/github.com/MaineK00n/vuls/integration/results/2022-01-13T09:33:47+09:00/yarn.json
50 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Bumps github.com/aquasecurity/trivy from 0.20.0 to 0.22.0.
Release notes
Sourced from github.com/aquasecurity/trivy's releases.
... (truncated)
Commits
42f795f
fix(java/pom): ignore unsupported requirements (#1514)8f737cc
feat(cli): warning for root command (#1516)76249bd
BREAKING: disable JAR detection in fs/repo scanning (#1512)59957d4
feat(scan): support --offline-scan option (#1511)da8b72d
fix: improve memory usage (#1509)b713ad0
feat(java): support pom.xml (#1501)56115e9
docs: fixing rust link to security advisory (#1504)7f859af
Add missing IacMetdata (#1505)628a796
feat(jar): add file path (#1498)82fba77
feat(rpm): support NDB (#1497)Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase
.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebase
will rebase this PR@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it@dependabot merge
will merge this PR after your CI passes on it@dependabot squash and merge
will squash and merge this PR after your CI passes on it@dependabot cancel merge
will cancel a previously requested merge and block automerging@dependabot reopen
will reopen this PR if it is closed@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot ignore this major version
will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor version
will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependency
will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)