You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
vulnerability.get("vector", "CVSS vector not provided. ")
236
-
)
237
-
status= (
238
-
vulnerability.get("status", "There seems to be no fix yet. Please check description field.")
239
-
)
240
-
cvss= (
241
-
vulnerability.get("cvss", "No CVSS score yet.")
242
-
)
243
-
riskFactors= (
244
-
vulnerability.get("riskFactors", "No risk factors.")
245
-
)
233
+
cvssv3=vulnerability.get("vector")
234
+
status=vulnerability.get("status", "There seems to be no fix yet. Please check description field.")
235
+
cvssv3_score=vulnerability.get("cvss")
236
+
riskFactors=vulnerability.get("riskFactors", "No risk factors.")
246
237
247
238
# Build impact field combining severity and image metadata which can change between scans, so we add it to the impact field as the description field is sometimes used for hash code calculation
"title": "(CIS_Docker_v1.5.0 - 4.6) Add HEALTHCHECK instruction to the container image",
32
+
"severity": "medium",
33
+
"description": "One of the important security triads is availability. Adding HEALTHCHECK instruction to your\ncontainer image ensures that the docker engine periodically checks the running container\ninstances against that instruction to ensure that the instances are still working",
"description": "The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.",
0 commit comments