Skip to content

Instantly share code, notes, and snippets.

Cargo.lock (cargo)
Total: 23 (UNKNOWN: 8, LOW: 0, MEDIUM: 5, HIGH: 2, CRITICAL: 8)
┌─────────────────┬───────────────────┬──────────┬───────────────────┬───────────────┬─────────────────────────────────────────────────────────────┐
│ Library │ Vulnerability │ Severity │ Installed Version │ Fixed Version │ Title │
├─────────────────┼───────────────────┼──────────┼───────────────────┼───────────────┼─────────────────────────────────────────────────────────────┤
│ ansi_term │ RUSTSEC-2021-0139 │ UNKNOWN │ 0.11.0 │ │ ansi_term is Unmaintained │
│ │ │ │ │ │ https://osv.dev/vulnerability/RUSTSEC-2021-0139 │
├─────────────────┼───────────────────┼──────────┼───────────────────┼───────────────┼─────────────────────────────────────────────────────────────┤
[[package]]
name = "hello_world"
version = "0.1.0"
dependencies = [
"regex 1.5.0 (git+https://github.com/rust-lang/regex.git#9f9f693768c584971a4d53bc3c586c33ed3a6831)",
]
[[package]]
name = "abomonation"
version = "0.7.0"
{
"expires": "9999-12-31T00:00:00+00:00",
"version": "27.6~16.04.1",
"_doc": "Content provided in json response is currently considered Experimental and may change",
"machine_id": "<id>",
"contract": {
"id": "<token>",
"tech_support_level": "n/a",
"name": "amf@email",
"created_at": "2022-03-04T13:29:12+00:00",
<project xmlns="http://maven.apache.org/POM/4.0.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://maven.apache.org/POM/4.0.0
http://maven.apache.org/xsd/maven-4.0.0.xsd">
<modelVersion>4.0.0</modelVersion>
<groupId>com.javatpoint.application1</groupId>
<artifactId>my-application1</artifactId>
<version>1.0</version>
<project xmlns="http://maven.apache.org/POM/4.0.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://maven.apache.org/POM/4.0.0
http://maven.apache.org/xsd/maven-4.0.0.xsd">
<modelVersion>4.0.0</modelVersion>
<groupId>com.javatpoint.application1</groupId>
<artifactId>my-application1</artifactId>
<version>1.0</version>
python:3.9-slim (debian 11.1)
=============================
Total: 66 (UNKNOWN: 0, LOW: 61, MEDIUM: 1, HIGH: 2, CRITICAL: 2)
+------------------+------------------+----------+-------------------+---------------+-----------------------------------------+
| LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE |
+------------------+------------------+----------+-------------------+---------------+-----------------------------------------+
| apt | CVE-2011-3374 | LOW | 2.2.4 | | It was found that apt-key in apt, |
| | | | | | all versions, do not correctly... |
| | | | | | -->avd.aquasec.com/nvd/cve-2011-3374 |
$ trivy conf --severity HIGH,CRITICAL .
WARNING: Failed to load module: missing module with source 'terraform-aws-modules/acm/aws' - try to 'terraform init' first
WARNING: Failed to load module: missing module with source 'terraform-aws-modules/s3-bucket/aws' - try to 'terraform init' first
WARNING: Failed to load module: missing module with source 'terraform-aws-modules/alb/aws' - try to 'terraform init' first
2021-11-26T17:28:02.595+0600 INFO Detected config files: 185
.terraform/modules/endpoint.msk_nlb/examples/complete-nlb/main.tf (terraform)
=============================================================================
Tests: 13 (SUCCESSES: 13, FAILURES: 0, EXCEPTIONS: 0)
Failures: 0 (HIGH: 0, CRITICAL: 0)
@afdesk
afdesk / gist:0aa9dafc9442c9626396eb2696d0ef39
Created November 24, 2021 13:40
oraclelinux-8.5 packages
libgcc-8.5.0-4.0.1.el8_5.x86_64
tzdata-2021e-1.el8.noarch
python3-pip-wheel-9.0.3-20.el8.noarch
publicsuffix-list-dafsa-20180723-1.el8.noarch
pcre2-10.32-2.el8.x86_64
setup-2.12.2-6.el8.noarch
basesystem-11-5.el8.noarch
libselinux-2.9-5.el8.x86_64
glibc-langpack-en-2.28-164.0.1.el8.x86_64
glibc-2.28-164.0.1.el8.x86_64
@afdesk
afdesk / gist:8d09ebc7750fba08d9bf218c7992fcc9
Created November 21, 2021 17:03
trivy: oraclelinux:8.5 package
2021-11-21T22:52:39.729+0600 DEBUG ----------------------------------------------------------------------------------
2021-11-21T22:52:39.729+0600 DEBUG [Tracking] OS version: 8.5. Package "bind-export-libs", installedVersion: 9.11.26-6.el8
2021-11-21T22:52:39.729+0600 DEBUG [Tracking] "CVE-2019-6471", FixedVersion: "32:9.11.4-17.P2.el8_0.1"
2021-11-21T22:52:39.736+0600 DEBUG [Tracking] "CVE-2020-8616", FixedVersion: "32:9.11.13-5.el8_2"
2021-11-21T22:52:39.736+0600 DEBUG [Tracking] "CVE-2020-8622", FixedVersion: "32:9.11.20-5.el8"
2021-11-21T22:52:39.736+0600 DEBUG [Tracking] "CVE-2021-25214", FixedVersion: "32:9.11.26-6.el8"
2021-11-21T22:52:39.737+0600 DEBUG [Tracking] "CVE-2021-25215", FixedVersion: "32:9.11.26-4.el8_4"
2021-11-21T22:52:39.737+0600 DEBUG [Tracking] "CVE-2018-5745", FixedVersion: "32:9.11.4-26.P2.el8"
2021-11-21T22:52:39.737+0600 DEBUG [Tracking] "CVE-2019-6465", FixedVersion: "32:9.11.4-26.P2.el8"
2021-11-21T22:52:39.738+0600 DEBUG [Tracki
{
"$schema": "https://raw.githubusercontent.com/oasis-tcs/sarif-spec/master/Schemata/sarif-schema-2.1.0.json",
"version": "2.1.0",
"runs": [
{
"tool": {
"driver": {
"name": "Trivy",
"informationUri": "https://github.com/aquasecurity/trivy",
"fullName": "Trivy Vulnerability Scanner",