You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: unittests/scans/zora/scan_many.csv
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ public key verification failed by calling SSL_get_verify_result(), and those
21
21
that do, and take appropriate action, are not affected. This issue was
22
22
introduced in the initial implementation of RPK support in OpenSSL 3.2.
23
23
24
-
The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.","3.3.3-r0"
24
+
The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.",""
25
25
"Trivy","ghcr.io/undistro/popeye:0.21","CVE-2024-13176","openssl: Timing side-channel in ECDSA signature computation","MEDIUM","fixed","Issue summary: A timing side-channel which could potentially allow recovering
26
26
the private key exists in the ECDSA signature computation.
27
27
@@ -38,7 +38,7 @@ process must either be located in the same physical computer or must
38
38
have a very fast network connection with low latency. For that reason
39
39
the severity of this vulnerability is Low.
40
40
41
-
The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are affected by this issue.","3.3.2-r2"
41
+
The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are affected by this issue.",
42
42
"Trivy","ghcr.io/undistro/popeye:0.21","CVE-2025-9230","openssl: Out-of-bounds read & write in RFC 3211 KEK Unwrap","MEDIUM","fixed","Issue summary: An application trying to decrypt CMS messages encrypted using
43
43
password based encryption can trigger an out-of-bounds read and write.
self.assertEqual('**Source**: Trivy\n**Image**: ghcr.io/undistro/popeye:0.21\n**ID**: CVE-2025-47912\n**Details**: The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: "http://[::1]/". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.\n', finding.description)
0 commit comments