Created
February 28, 2024 10:59
-
-
Save O5ten/8028494b3719fe5f944a900f665107d3 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
11:55 $ snyk container test nginx:stable-bullseye --severity-threshold=critical | |
Testing nginx:stable-bullseye... | |
✗ Critical severity vulnerability found in zlib/zlib1g | |
Description: Integer Overflow or Wraparound | |
Info: https://security.snyk.io/vuln/SNYK-DEBIAN11-ZLIB-6008961 | |
Introduced through: zlib/zlib1g@1:1.2.11.dfsg-2+deb11u2 | |
From: zlib/zlib1g@1:1.2.11.dfsg-2+deb11u2 | |
✗ Critical severity vulnerability found in curl/libcurl4 | |
Description: Cleartext Transmission of Sensitive Information | |
Info: https://security.snyk.io/vuln/SNYK-DEBIAN11-CURL-3320493 | |
Introduced through: [email protected]+deb11u11 | |
From: [email protected]+deb11u11 > curl/[email protected]+deb11u11 | |
From: [email protected]+deb11u11 | |
Organization: o5ten | |
Package manager: deb | |
Project name: docker-image|nginx | |
Docker image: nginx:stable-bullseye | |
Platform: linux/amd64 | |
Licenses: enabled | |
Tested 142 dependencies for known issues, found 2 issues. | |
Snyk wasn’t able to auto detect the base image, use `--file` option to get base image remediation advice. | |
Example: $ snyk container test nginx:stable-bullseye --file=path/to/Dockerfile | |
To remove this message in the future, please run `snyk config set disableSuggestions=true` | |
------------------------------------------------------- | |
Testing nginx:stable-bullseye... | |
Organization: o5ten | |
Package manager: maven | |
Target file: /usr/share/java | |
Project name: nginx:stable-bullseye:/usr/share/java | |
Docker image: nginx:stable-bullseye | |
Licenses: enabled | |
✔ Tested nginx:stable-bullseye for known issues, no vulnerable paths found. | |
Tested 2 projects, 1 contained vulnerable paths. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment