Skip to content

Conversation

@MWest2020
Copy link
Contributor

No description provided.

@github-actions
Copy link

👋 @MWest2020
Thank you for raising your pull request.
Please make sure you have followed our contributing guidelines. We will review it as soon as possible. In the meanwhile make sure your PR checks the following boxes

  • Is based on an issue
  • Has been locally tested
  • Has been tested with the admin UI
  • Has been discussed with the development team in an open channel

@github-actions
Copy link

Your image ghcr.io/commongateway/wooservice-php:prod critical: 1 high: 2 medium: 5 low: 2 unspecified: 3
Current base image php:8.2-fpm-alpine critical: 0 high: 0 medium: 5 low: 0 unspecified: 2
Refreshed base image php:8.2-fpm-alpine critical: 0 high: 0 medium: 5 low: 0 unspecified: 2
Updated base image php:8.3-fpm-alpine critical: 0 high: 0 medium: 5 low: 0 unspecified: 2

@github-actions
Copy link

🔍 Vulnerabilities of ghcr.io/commongateway/wooservice-php:prod

📦 Image Reference ghcr.io/commongateway/wooservice-php:prod
digestsha256:c238fe6938acc4f1cb7fe42aa8d8c6a15b3419d569ced4bf59a8dca84fc4cb10
vulnerabilitiescritical: 1 high: 2 medium: 5 low: 2 unspecified: 3
size254 MB
packages312
📦 Base Image php:8.2-fpm-alpine
also known as
  • 8.2-fpm-alpine3.19
  • 8.2.18-fpm-alpine
  • 8.2.18-fpm-alpine3.19
digestsha256:9fe7b8986b361acbd9ee9a6d5f32d75c68218d9df0974c44d3b7878662b9fce8
vulnerabilitiescritical: 0 high: 0 medium: 5 low: 0 unspecified: 2
critical: 1 high: 2 medium: 0 low: 2 git 2.43.0-r0 (apk)

pkg:apk/alpine/git@2.43.0-r0?os_name=alpine&os_version=3.19

critical : CVE--2024--32002

Affected range<2.43.4-r0
Fixed version2.43.4-r0
EPSS Score0.00045
EPSS Percentile0.14917
Description

high : CVE--2024--32004

Affected range<2.43.4-r0
Fixed version2.43.4-r0
EPSS Score0.00045
EPSS Percentile0.14917
Description

high : CVE--2024--32465

Affected range<2.43.4-r0
Fixed version2.43.4-r0
EPSS Score0.00045
EPSS Percentile0.14867
Description

low : CVE--2024--32021

Affected range<2.43.4-r0
Fixed version2.43.4-r0
EPSS Score0.00043
EPSS Percentile0.08601
Description

low : CVE--2024--32020

Affected range<2.43.4-r0
Fixed version2.43.4-r0
EPSS Score0.00045
EPSS Percentile0.14867
Description
critical: 0 high: 0 medium: 4 low: 0 busybox 1.36.1-r15 (apk)

pkg:apk/alpine/busybox@1.36.1-r15?os_name=alpine&os_version=3.19

medium : CVE--2023--42366

Affected range<1.36.1-r16
Fixed version1.36.1-r16
EPSS Score0.00044
EPSS Percentile0.12311
Description

medium : CVE--2023--42365

Affected range<1.36.1-r17
Fixed version1.36.1-r17
EPSS Score0.00044
EPSS Percentile0.12311
Description

medium : CVE--2023--42364

Affected range<1.36.1-r17
Fixed version1.36.1-r17
EPSS Score0.00044
EPSS Percentile0.12311
Description

medium : CVE--2023--42363

Affected range<1.36.1-r17
Fixed version1.36.1-r17
EPSS Score0.00044
EPSS Percentile0.12311
Description
critical: 0 high: 0 medium: 1 low: 0 curl 8.5.0-r0 (apk)

pkg:apk/alpine/curl@8.5.0-r0?os_name=alpine&os_version=3.19

medium : CVE--2024--0853

Affected range<8.6.0-r0
Fixed versionNot Fixed
EPSS Score0.00058
EPSS Percentile0.23702
Description
critical: 0 high: 0 medium: 0 low: 0 unspecified: 1libxml2 2.11.7-r0 (apk)

pkg:apk/alpine/libxml2@2.11.7-r0?os_name=alpine&os_version=3.19

unspecified : CVE--2024--34459

Affected range<2.11.8-r0
Fixed version2.11.8-r0
Description
critical: 0 high: 0 medium: 0 low: 0 unspecified: 1openssl 3.1.4-r6 (apk)

pkg:apk/alpine/openssl@3.1.4-r6?os_name=alpine&os_version=3.19

unspecified : CVE--2024--4603

Affected range<3.1.5-r0
Fixed version3.1.5-r0
EPSS Score0.00045
EPSS Percentile0.14867
Description
critical: 0 high: 0 medium: 0 low: 0 unspecified: 1dompdf/dompdf 2.0.4 (composer)

pkg:composer/dompdf/dompdf@2.0.4

unspecified : GMS--2024--338 OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

Affected range<=2.0.4
Fixed versionNot Fixed
Description

Improper Neutralization in dompdf/dompdf.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants