Created
December 12, 2021 20:23
-
-
Save rverchere/1cf917f66711a4a1c638c92236d07132 to your computer and use it in GitHub Desktop.
Trivy Example
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ trivy image --severity CRITICAL elasticsearch:5.6.13 | |
2021-12-12T21:20:06.322+0100 INFO Detected OS: debian | |
2021-12-12T21:20:06.322+0100 INFO Detecting Debian vulnerabilities... | |
2021-12-12T21:20:06.350+0100 INFO Number of language-specific files: 1 | |
2021-12-12T21:20:06.350+0100 INFO Detecting jar vulnerabilities... | |
Java (jar) | |
========== | |
Total: 6 (CRITICAL: 6) | |
+-------------------------------------+------------------+----------+-------------------+---------------+---------------------------------------+ | |
| LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE | | |
+-------------------------------------+------------------+----------+-------------------+---------------+---------------------------------------+ | |
| io.netty:netty | CVE-2019-20444 | CRITICAL | 3.10.6.Final | 4.1.44.Final | netty: HTTP request smuggling | | |
| | | | | | -->avd.aquasec.com/nvd/cve-2019-20444 | | |
+ +------------------+ + + +---------------------------------------+ | |
| | CVE-2019-20445 | | | | netty: HttpObjectDecoder.java allows | | |
| | | | | | Content-Length header to accompanied | | |
| | | | | | by second Content-Length header | | |
| | | | | | -->avd.aquasec.com/nvd/cve-2019-20445 | | |
+-------------------------------------+------------------+ +-------------------+---------------+---------------------------------------+ | |
| io.netty:netty-handler | CVE-2019-20444 | | 4.1.13.Final | 4.1.44 | netty: HTTP request smuggling | | |
| | | | | | -->avd.aquasec.com/nvd/cve-2019-20444 | | |
+ +------------------+ + +---------------+---------------------------------------+ | |
| | CVE-2019-20445 | | | 4.1.45 | netty: HttpObjectDecoder.java allows | | |
| | | | | | Content-Length header to accompanied | | |
| | | | | | by second Content-Length header | | |
| | | | | | -->avd.aquasec.com/nvd/cve-2019-20445 | | |
+-------------------------------------+------------------+ +-------------------+---------------+---------------------------------------+ | |
| org.apache.logging.log4j:log4j-api | CVE-2021-44228 | | 2.11.1 | 2.15.0 | log4j-core: Remote code execution | | |
| | | | | | in Log4j 2.x when logs contain | | |
| | | | | | an attacker-controlled... | | |
| | | | | | -->avd.aquasec.com/nvd/cve-2021-44228 | | |
+-------------------------------------+ + + + + + | |
| org.apache.logging.log4j:log4j-core | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
+-------------------------------------+------------------+----------+-------------------+---------------+---------------------------------------+ |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment