This repository has been archived by the owner on Jul 2, 2024. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 19
/
.trivyignore.yaml
17 lines (17 loc) · 1.66 KB
/
.trivyignore.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
vulnerabilities:
# │ braces │ CVE-2024-4068 │ HIGH │ fixed │ 2.3.2 │ 3.0.3 │ braces: fails to limit the number of characters it can │
- id: CVE-2024-4068
# │ glob-parent │ CVE-2020-28469 │ HIGH │ fixed │ 3.1.0 │ 5.1.2 │ Regular expression denial of service │
- id: CVE-2020-28469
# │ json5 │ CVE-2022-46175 │ HIGH │ fixed │ 0.5.1 │ 2.2.2, 1.0.2 │ json5: Prototype Pollution in JSON5 via Parse Method │
- id: CVE-2022-46175
# │ loader-utils │ CVE-2022-37601 │ CRITICAL │ fixed │ 0.2.17 │ 2.0.3, 1.4.1 │ loader-utils: prototype pollution in function parseQuery in │
- id: CVE-2022-37601
# │ node-forge │ CVE-2022-24771 │ HIGH │ fixed │ 0.10.0 │ 1.3.0 │ node-forge: Signature verification leniency in checking │
- id: CVE-2022-24771
# │ node-forge │ CVE-2022-24772 │ HIGH │ fixed │ 0.10.0 │ 1.3.0 │ node-forge: Signature verification failing to check tailing │
- id: CVE-2022-24772
# │ nth-check │ CVE-2021-3803 │ HIGH │ fixed │ 1.0.2 │ 2.0.1 │ inefficient regular expression complexity │
- id: CVE-2021-3803
# │ webpack-dev-middleware │ CVE-2024-29180 │ HIGH │ fixed │ 3.7.3 │ 7.1.0, 6.1.2, 5.3.4 │ webpack-dev-middleware: lack of URL validation may lead to │
- id: CVE-2024-29180