|
1 |
| -Registry;Repository;Tag;Id;Distro;Hosts;Layer;CVE ID;Compliance ID;Type;Severity;Packages;Source Package;Package Version;Package License;CVSS;Fix Status;Risk Factors;Vulnerability Tags;Description;Cause;Containers;Custom Labels;Published;Discovered;Binaries;Clusters |
2 |
| -111111111111.dkr.ecr.eu-central-1.amazonaws.com;mirror/quay.io/kubernetes-ingress-controller/nginx-ingress-controller;0.32.0;sha256:70144d369cb283ebd5e6c7236c730994e27f5362ad3f01e42542cd6fa1a99d6b;alpine-3.11.5;76;;CVE-2020-24977;46;OS;medium;libxml2;;2.9.10-r2;MIT;6.50;fixed in 2.9.10-r4;"Attack complexity: low; Attack vector: network; Has fix; Medium severity; Recent vulnerability";;GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.;;46;;2020-09-04 00:15:00.000;2020-09-29 07:55:04.733;;alpha |
3 |
| -111111111111.dkr.ecr.eu-central-1.amazonaws.com;mirror/quay.io/kubernetes-ingress-controller/nginx-ingress-controller;0.32.0;sha256:70144d369cb283ebd5e6c7236c730994e27f5362ad3f01e42542cd6fa1a99d6b;alpine-3.11.5;76;;CVE-2019-20388;46;OS;high;libxml2;;2.9.10-r2;MIT;7.50;fixed in 2.9.10-r3;"Attack complexity: low; Attack vector: network; Has fix; High severity; Recent vulnerability";;xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.;;46;;2020-01-21 23:15:00.000;2020-09-29 07:55:04.733;;alpha |
4 |
| -111111111111.dkr.ecr.eu-central-1.amazonaws.com;mirror/quay.io/kubernetes-ingress-controller/nginx-ingress-controller;0.32.0;sha256:70144d369cb283ebd5e6c7236c730994e27f5362ad3f01e42542cd6fa1a99d6b;alpine-3.11.5;76;;CVE-2020-28241;46;OS;medium;libmaxminddb;;1.4.2-r0;Apache-2.0;6.50;;"Attack complexity: low; Attack vector: network; Medium severity; Recent vulnerability";;libmaxminddb before 1.4.3 has a heap-based buffer over-read in dump_entry_data_list in maxminddb.c.;;46;;2020-11-06 05:15:00.000;2020-11-06 05:15:00.000;;alpha |
5 |
| -111111111111.dkr.ecr.eu-central-1.amazonaws.com;mirror/quay.io/kubernetes-ingress-controller/nginx-ingress-controller;0.32.0;sha256:70144d369cb283ebd5e6c7236c730994e27f5362ad3f01e42542cd6fa1a99d6b;alpine-3.11.5;76;;CVE-2020-1971;46;OS;medium;"libssl1.1;libcrypto1.1;openssl";openssl;1.1.1g-r0;OpenSSL;5.90;fixed in 1.1.1i-r0;"Attack vector: network; DoS; Has fix; Medium severity; Package in use; Recent vulnerability";;The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1;;46;;2020-12-08 16:15:00.000;2020-12-08 16:15:00.000;/usr/local/nginx/sbin/nginx;alpha |
| 1 | +Registry,Repository,Tag,Id,Distro,Hosts,Layer,CVE ID,Compliance ID,Type,Severity,Packages,Source Package,Package Version,Package License,CVSS,Fix Status,Risk Factors,Vulnerability Tags,Description,Cause,Containers,Custom Labels,Published,Discovered,Binaries,Clusters |
| 2 | +111111111111.dkr.ecr.eu-central-1.amazonaws.com,mirror/quay.io/kubernetes-ingress-controller/nginx-ingress-controller,0.32.0,sha256:70144d369cb283ebd5e6c7236c730994e27f5362ad3f01e42542cd6fa1a99d6b,alpine-3.11.5,76,,CVE-2020-24977,46,OS,medium,libxml2,,2.9.10-r2,MIT,6.50,fixed in 2.9.10-r4,"Attack complexity: low, Attack vector: network, Has fix, Medium severity, Recent vulnerability",,GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.,,46,,2020-09-04 00:15:00.000,2020-09-29 07:55:04.733,,alpha |
| 3 | +111111111111.dkr.ecr.eu-central-1.amazonaws.com,mirror/quay.io/kubernetes-ingress-controller/nginx-ingress-controller,0.32.0,sha256:70144d369cb283ebd5e6c7236c730994e27f5362ad3f01e42542cd6fa1a99d6b,alpine-3.11.5,76,,CVE-2019-20388,46,OS,high,libxml2,,2.9.10-r2,MIT,7.50,fixed in 2.9.10-r3,"Attack complexity: low, Attack vector: network, Has fix, High severity, Recent vulnerability",,xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.,,46,,2020-01-21 23:15:00.000,2020-09-29 07:55:04.733,,alpha |
| 4 | +111111111111.dkr.ecr.eu-central-1.amazonaws.com,mirror/quay.io/kubernetes-ingress-controller/nginx-ingress-controller,0.32.0,sha256:70144d369cb283ebd5e6c7236c730994e27f5362ad3f01e42542cd6fa1a99d6b,alpine-3.11.5,76,,CVE-2020-28241,46,OS,medium,libmaxminddb,,1.4.2-r0,Apache-2.0,6.50,,"Attack complexity: low, Attack vector: network, Medium severity, Recent vulnerability",,libmaxminddb before 1.4.3 has a heap-based buffer over-read in dump_entry_data_list in maxminddb.c.,,46,,2020-11-06 05:15:00.000,2020-11-06 05:15:00.000,,alpha |
| 5 | +111111111111.dkr.ecr.eu-central-1.amazonaws.com,mirror/quay.io/kubernetes-ingress-controller/nginx-ingress-controller,0.32.0,sha256:70144d369cb283ebd5e6c7236c730994e27f5362ad3f01e42542cd6fa1a99d6b,alpine-3.11.5,76,,CVE-2020-1971,46,OS,medium,"libssl1.1,libcrypto1.1,openssl",openssl,1.1.1g-r0,OpenSSL,5.90,fixed in 1.1.1i-r0,"Attack vector: network, DoS, Has fix, Medium severity, Package in use, Recent vulnerability",,The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1,,46,,2020-12-08 16:15:00.000,2020-12-08 16:15:00.000,/usr/local/nginx/sbin/nginx,alpha |
0 commit comments