cyber-dojo
flows
dashboard-archived-at-1707630840
artifacts
a36fb1d4d931987817977ece68bee996a58e9f33f36493f9cf0b00fb85d7459b
By signing up, you agree to the
Terms of Service.
For more information about Kosli’s privacy practices, see the Kosli’s
Privacy Policy.
We’ll occasionally send you account-related emails.
We’ll occasionally send you account-related emails.
dashboard-archived-at-1707630840
UX for a group practice dashboard
cyberdojo/dashboard:7f51684
Compliant
Download Evidence Package
JSON
{ "created_at": 1705475300.8126795, "fingerprint": "a36fb1d4d931987817977ece68bee996a58e9f33f36493f9cf0b00fb85d7459b", "filename": "cyberdojo/dashboard:7f51684", "git_commit": "7f516849434897cf8c5460058cdad421263ccb39", "build_url": "https://github.com/cyber-dojo/dashboard/actions/runs/7552226481", "commit_url": "https://github.com/cyber-dojo/dashboard/commit/7f516849434897cf8c5460058cdad421263ccb39", "evidence": { "snyk-scan": { "evidence_type": "snyk", "is_compliant": true, "build_url": "https://github.com/cyber-dojo/dashboard/actions/runs/7552226481", "evidence_archive_fingerprint": "aad10b757d117ee0f9fed72bb3333cd426278466b97cc64b999fe1f88b121eca", "user_data": {}, "snyk_results": { "applications": [ { "dependencyCount": 0, "displayTargetFile": "/usr/local/bundle/gems/concurrent-ruby-1.2.2/lib/concurrent-ruby/concurrent", "docker": {}, "filesystemPolicy": true, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": true, "org": "jonjagger", "packageManager": "maven", "path": "cyberdojo/dashboard:7f51684/dashboard:7f51684:/usr/local/bundle/gems/concurrent-ruby-1.2.2/lib/concurrent-ruby/concurrent", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\n# ignores vulnerabilities until expiry date; change duration by modifying expiry date\nignore:\n SNYK-ALPINE318-OPENSSL-6160000:\n - '*':\n reason: Waiting for fix in base-image\n expires: 2024-03-01T12:46:34.671Z\n created: 2024-01-17T07:46:34.673Z\n source: cli\npatch: {}\n", "projectName": "cyberdojo/dashboard:7f51684:/usr/local/bundle/gems/concurrent-ruby-1.2.2/lib/concurrent-ruby/concurrent", "summary": "No known vulnerabilities", "targetFile": "/usr/local/bundle/gems/concurrent-ruby-1.2.2/lib/concurrent-ruby/concurrent", "uniqueCount": 0, "vulnerabilities": [] } ], "dependencyCount": 80, "displayTargetFile": "Dockerfile", "docker": { "baseImage": "cyberdojo/sinatra-base:6afffdb", "baseImageRemediation": { "advice": [ { "bold": true, "message": "Recommendations for your base image (cyberdojo/sinatra-base:6afffdb) are not available.\nSee above for details and fixes on individual vulnerabilities" } ], "code": "UNTRACKED_BASE_IMAGE" }, "binariesVulns": { "affectedPkgs": {}, "issuesData": {} } }, "filesystemPolicy": true, "filtered": { "ignore": [ { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [ false, "openssl/libcrypto3@3.1.4-r4" ], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", ".ruby-rundeps@20240108.230053", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "apk-tools/apk-tools@2.14.0-r2", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "busybox/ssl_client@1.36.1-r5", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "ca-certificates/ca-certificates@20230506-r0", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "nodejs/nodejs@18.18.2-r0", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", ".ruby-rundeps@20240108.230053", "openssl/libssl3@3.1.4-r3", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "curl/curl@8.5.0-r0", "curl/libcurl@8.5.0-r0", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [ false, "openssl/libssl3@3.1.4-r4" ], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", ".ruby-rundeps@20240108.230053", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "apk-tools/apk-tools@2.14.0-r2", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "busybox/ssl_client@1.36.1-r5", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "nodejs/nodejs@18.18.2-r0", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "curl/curl@8.5.0-r0", "curl/libcurl@8.5.0-r0", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" } ], "patch": [] }, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": true, "org": "jonjagger", "packageManager": "apk", "path": "cyberdojo/dashboard:7f51684/dashboard", "platform": "linux/amd64", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\n# ignores vulnerabilities until expiry date; change duration by modifying expiry date\nignore:\n SNYK-ALPINE318-OPENSSL-6160000:\n - '*':\n reason: Waiting for fix in base-image\n expires: 2024-03-01T12:46:34.671Z\n created: 2024-01-17T07:46:34.673Z\n source: cli\npatch: {}\n", "projectName": "docker-image|cyberdojo/dashboard", "summary": "No known operating system vulnerabilities", "targetFile": "Dockerfile", "uniqueCount": 0, "vulnerabilities": [] }, "created_at": 1705475328.6519756, "has_audit_package": true }, "pull-request": { "evidence_type": "pull_request", "is_compliant": true, "build_url": "https://github.com/cyber-dojo/dashboard/actions/runs/7552226481", "commit_sha": "7f516849434897cf8c5460058cdad421263ccb39", "evidence_url": "https://github.com/cyber-dojo/dashboard/pull/110", "user_data": {}, "git_provider": "github", "pull_requests": [ { "merge_commit": "7f516849434897cf8c5460058cdad421263ccb39", "url": "https://github.com/cyber-dojo/dashboard/pull/110", "state": "closed", "approvers": [] } ], "created_at": 1705475286.1706858, "has_audit_package": false }, "lint": { "evidence_type": "generic", "is_compliant": true, "build_url": "https://github.com/cyber-dojo/dashboard/actions/runs/7552226481", "commit_sha": "7f516849434897cf8c5460058cdad421263ccb39", "evidence_archive_fingerprint": "7f0ec1ad45fc20476291933403fb2048aec216763b218e6a36a12ab85027d463", "user_data": {}, "created_at": 1705475286.8674877, "has_audit_package": true } }, "reported_by": "ci-pipelines", "git_commit_info": { "sha1": "7f516849434897cf8c5460058cdad421263ccb39", "message": "Update .snyk file (#110)", "author": "Jon Jagger <jon@kosli.com>", "timestamp": 1705475256, "branch": "main" }, "repo_url": "https://github.com/cyber-dojo/dashboard", "template": [ "artifact", "snyk-scan", "lint", "pull-request" ], "last_modified_at": 1705475328.6519756, "releases": [ 148, 147 ], "deployments": [ 202, 201 ], "state": "COMPLIANT", "html_url": "https://app.kosli.com/cyber-dojo/flows/dashboard-archived-at-1707630840/artifacts/a36fb1d4d931987817977ece68bee996a58e9f33f36493f9cf0b00fb85d7459b", "api_url": "https://app.kosli.com/api/v2/artifacts/cyber-dojo/dashboard-archived-at-1707630840/fingerprint/a36fb1d4d931987817977ece68bee996a58e9f33f36493f9cf0b00fb85d7459b" }
Artifact Information |
|
Name | cyberdojo/dashboard:7f51684 |
Fingerprint | a36fb1d4d931987817977ece68bee996a58e9f33f36493f9cf0b00fb85d7459b |
Git commit |
7f51684
Jon Jagger <jon@kosli.com> (main)
1705475256.0 • 3 months ago
Update .snyk file (#110)
|
CI Build | https://github.com/cyber-dojo/dashboard/actions/runs/7552226481 |
Running | - |
Exited | aws-beta#2821 aws-prod#1956 |
Last modified | 1705475328.6519756 • 3 months ago |
Evidence
Evidence for 'snyk-scan'
{ "evidence_type": "snyk", "name": "snyk-scan", "is_compliant": true, "build_url": "https://github.com/cyber-dojo/dashboard/actions/runs/7552226481", "evidence_archive_fingerprint": "aad10b757d117ee0f9fed72bb3333cd426278466b97cc64b999fe1f88b121eca", "user_data": {}, "snyk_results": { "applications": [ { "dependencyCount": 0, "displayTargetFile": "/usr/local/bundle/gems/concurrent-ruby-1.2.2/lib/concurrent-ruby/concurrent", "docker": {}, "filesystemPolicy": true, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": true, "org": "jonjagger", "packageManager": "maven", "path": "cyberdojo/dashboard:7f51684/dashboard:7f51684:/usr/local/bundle/gems/concurrent-ruby-1.2.2/lib/concurrent-ruby/concurrent", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\n# ignores vulnerabilities until expiry date; change duration by modifying expiry date\nignore:\n SNYK-ALPINE318-OPENSSL-6160000:\n - '*':\n reason: Waiting for fix in base-image\n expires: 2024-03-01T12:46:34.671Z\n created: 2024-01-17T07:46:34.673Z\n source: cli\npatch: {}\n", "projectName": "cyberdojo/dashboard:7f51684:/usr/local/bundle/gems/concurrent-ruby-1.2.2/lib/concurrent-ruby/concurrent", "summary": "No known vulnerabilities", "targetFile": "/usr/local/bundle/gems/concurrent-ruby-1.2.2/lib/concurrent-ruby/concurrent", "uniqueCount": 0, "vulnerabilities": [] } ], "dependencyCount": 80, "displayTargetFile": "Dockerfile", "docker": { "baseImage": "cyberdojo/sinatra-base:6afffdb", "baseImageRemediation": { "advice": [ { "bold": true, "message": "Recommendations for your base image (cyberdojo/sinatra-base:6afffdb) are not available.\nSee above for details and fixes on individual vulnerabilities" } ], "code": "UNTRACKED_BASE_IMAGE" }, "binariesVulns": { "affectedPkgs": {}, "issuesData": {} } }, "filesystemPolicy": true, "filtered": { "ignore": [ { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [ false, "openssl/libcrypto3@3.1.4-r4" ], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", ".ruby-rundeps@20240108.230053", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "apk-tools/apk-tools@2.14.0-r2", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "busybox/ssl_client@1.36.1-r5", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "ca-certificates/ca-certificates@20230506-r0", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "nodejs/nodejs@18.18.2-r0", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", ".ruby-rundeps@20240108.230053", "openssl/libssl3@3.1.4-r3", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "curl/curl@8.5.0-r0", "curl/libcurl@8.5.0-r0", "openssl/libcrypto3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [ false, "openssl/libssl3@3.1.4-r4" ], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", ".ruby-rundeps@20240108.230053", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "apk-tools/apk-tools@2.14.0-r2", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "busybox/ssl_client@1.36.1-r5", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "nodejs/nodejs@18.18.2-r0", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-17T03:02:09.302865Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 5.9, "cvssV3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "modificationTime": "2024-01-16T13:32:46.781382Z", "severity": "medium" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.18` `openssl` to version 3.1.4-r4 or higher.\n", "disclosureTime": null, "epssDetails": null, "exploit": "Not Defined", "filtered": { "ignored": [ { "created": "2024-01-17T07:46:34.673Z", "expires": "2024-03-01T12:46:34.671Z", "path": [ "*" ], "reason": "Waiting for fix in base-image", "source": "cli" } ] }, "fixedIn": [ "3.1.4-r4" ], "from": [ "docker-image|cyberdojo/dashboard@7f51684", "curl/curl@8.5.0-r0", "curl/libcurl@8.5.0-r0", "openssl/libssl3@3.1.4-r3" ], "id": "SNYK-ALPINE318-OPENSSL-6160000", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2023-6237" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-17T03:02:09.311784Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r4", "nvdSeverity": null, "packageManager": "alpine:3.18", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-17T03:02:09.311648Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r4" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2023-6237", "upgradePath": [], "version": "3.1.4-r3" } ], "patch": [] }, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": true, "org": "jonjagger", "packageManager": "apk", "path": "cyberdojo/dashboard:7f51684/dashboard", "platform": "linux/amd64", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\n# ignores vulnerabilities until expiry date; change duration by modifying expiry date\nignore:\n SNYK-ALPINE318-OPENSSL-6160000:\n - '*':\n reason: Waiting for fix in base-image\n expires: 2024-03-01T12:46:34.671Z\n created: 2024-01-17T07:46:34.673Z\n source: cli\npatch: {}\n", "projectName": "docker-image|cyberdojo/dashboard", "summary": "No known operating system vulnerabilities", "targetFile": "Dockerfile", "uniqueCount": 0, "vulnerabilities": [] }, "created_at": 1705475328.6519756, "has_audit_package": true }
Evidence for 'lint'
{ "evidence_type": "generic", "is_compliant": true, "build_url": "https://github.com/cyber-dojo/dashboard/actions/runs/7552226481", "commit_sha": "7f516849434897cf8c5460058cdad421263ccb39", "evidence_archive_fingerprint": "7f0ec1ad45fc20476291933403fb2048aec216763b218e6a36a12ab85027d463", "user_data": {}, "created_at": 1705475286.8674877, "has_audit_package": true }
Evidence for 'pull-request'
{ "evidence_type": "pull_request", "is_compliant": true, "build_url": "https://github.com/cyber-dojo/dashboard/actions/runs/7552226481", "commit_sha": "7f516849434897cf8c5460058cdad421263ccb39", "evidence_url": "https://github.com/cyber-dojo/dashboard/pull/110", "user_data": {}, "git_provider": "github", "pull_requests": [ { "merge_commit": "7f516849434897cf8c5460058cdad421263ccb39", "url": "https://github.com/cyber-dojo/dashboard/pull/110", "state": "closed", "approvers": [] } ], "created_at": 1705475286.1706858, "has_audit_package": false }