cyber-dojo
flows
dashboard-archived-at-1707630840
artifacts
b550bc83dd44c771dd97503f60232ae4250b2838d594311159aded0e49e162ce
By signing up, you agree to the
Terms of Service.
For more information about Kosli’s privacy practices, see the Kosli’s
Privacy Policy.
We’ll occasionally send you account-related emails.
We’ll occasionally send you account-related emails.
dashboard-archived-at-1707630840
UX for a group practice dashboard
cyberdojo/dashboard:ec5886f
Non-compliant
Download Evidence Package
JSON
{ "created_at": 1706280372.1460557, "fingerprint": "b550bc83dd44c771dd97503f60232ae4250b2838d594311159aded0e49e162ce", "filename": "cyberdojo/dashboard:ec5886f", "git_commit": "ec5886fa5455b861e17022f32db136f7d13e2a23", "build_url": "https://github.com/cyber-dojo/dashboard/actions/runs/7669533771", "commit_url": "https://github.com/cyber-dojo/dashboard/commit/ec5886fa5455b861e17022f32db136f7d13e2a23", "evidence": { "snyk-scan": { "evidence_type": "snyk", "is_compliant": false, "build_url": "https://github.com/cyber-dojo/dashboard/actions/runs/7669533771", "evidence_archive_fingerprint": "4904c45eb8e01c4b9ab5639c46234817d9087e329d79c0d354f75ae595dc1b00", "user_data": {}, "snyk_results": { "applications": [ { "dependencyCount": 0, "displayTargetFile": "/usr/local/bundle/gems/concurrent-ruby-1.2.3/lib/concurrent-ruby/concurrent", "docker": {}, "filesystemPolicy": true, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": true, "org": "jonjagger", "packageManager": "maven", "path": "cyberdojo/dashboard:ec5886f/dashboard:ec5886f:/usr/local/bundle/gems/concurrent-ruby-1.2.3/lib/concurrent-ruby/concurrent", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\nignore: {}\npatch: {}\n", "projectName": "cyberdojo/dashboard:ec5886f:/usr/local/bundle/gems/concurrent-ruby-1.2.3/lib/concurrent-ruby/concurrent", "summary": "No known vulnerabilities", "targetFile": "/usr/local/bundle/gems/concurrent-ruby-1.2.3/lib/concurrent-ruby/concurrent", "uniqueCount": 0, "vulnerabilities": [] } ], "dependencyCount": 84, "displayTargetFile": "Dockerfile", "docker": { "baseImage": "cyberdojo/sinatra-base:a3e274a", "baseImageRemediation": { "advice": [ { "bold": true, "message": "Recommendations for your base image (cyberdojo/sinatra-base:a3e274a) are not available.\nSee above for details and fixes on individual vulnerabilities" } ], "code": "UNTRACKED_BASE_IMAGE" }, "binariesVulns": { "affectedPkgs": {}, "issuesData": {} } }, "filesystemPolicy": true, "filtered": { "ignore": [], "patch": [] }, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": false, "org": "jonjagger", "packageManager": "apk", "path": "cyberdojo/dashboard:ec5886f/dashboard", "platform": "linux/amd64", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\nignore: {}\npatch: {}\n", "projectName": "docker-image|cyberdojo/dashboard", "summary": "14 vulnerable dependency paths", "targetFile": "Dockerfile", "uniqueCount": 1, "vulnerabilities": [ { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "openssl/libcrypto3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [ false, "openssl/libcrypto3@3.1.4-r5" ], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", ".ruby-rundeps@20240108.230059", "openssl/libcrypto3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "apk-tools/apk-tools@2.14.0-r5", "openssl/libcrypto3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "busybox/ssl_client@1.36.1-r15", "openssl/libcrypto3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "ca-certificates/ca-certificates@20230506-r0", "openssl/libcrypto3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "nodejs/nodejs@20.11.0-r0", "openssl/libcrypto3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", ".ruby-rundeps@20240108.230059", "openssl/libssl3@3.1.4-r4", "openssl/libcrypto3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "curl/curl@8.5.0-r0", "curl/libcurl@8.5.0-r0", "openssl/libcrypto3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "openssl/libssl3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [ false, "openssl/libssl3@3.1.4-r5" ], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", ".ruby-rundeps@20240108.230059", "openssl/libssl3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "apk-tools/apk-tools@2.14.0-r5", "openssl/libssl3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "busybox/ssl_client@1.36.1-r15", "openssl/libssl3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "nodejs/nodejs@20.11.0-r0", "openssl/libssl3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "curl/curl@8.5.0-r0", "curl/libcurl@8.5.0-r0", "openssl/libssl3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" } ] }, "created_at": 1706280400.9161198, "has_audit_package": true }, "pull-request": { "evidence_type": "pull_request", "is_compliant": true, "build_url": "https://github.com/cyber-dojo/dashboard/actions/runs/7669533771", "commit_sha": "ec5886fa5455b861e17022f32db136f7d13e2a23", "evidence_url": "https://github.com/cyber-dojo/dashboard/pull/116", "user_data": {}, "git_provider": "github", "pull_requests": [ { "merge_commit": "ec5886fa5455b861e17022f32db136f7d13e2a23", "url": "https://github.com/cyber-dojo/dashboard/pull/116", "state": "closed", "approvers": [] } ], "created_at": 1706280364.28816, "has_audit_package": false }, "lint": { "evidence_type": "generic", "is_compliant": true, "build_url": "https://github.com/cyber-dojo/dashboard/actions/runs/7669533771", "commit_sha": "ec5886fa5455b861e17022f32db136f7d13e2a23", "evidence_archive_fingerprint": "54135ed5d686498b6719e22025355e02a67c37cabcbcba3f74a7d4904bb289b7", "user_data": {}, "created_at": 1706280369.5776908, "has_audit_package": true } }, "reported_by": "ci-pipelines", "git_commit_info": { "sha1": "ec5886fa5455b861e17022f32db136f7d13e2a23", "message": "CI: set kosli-trail env-var at top level (#116)", "author": "Jon Jagger <jon@kosli.com>", "timestamp": 1706280336, "branch": "main" }, "repo_url": "https://github.com/cyber-dojo/dashboard", "template": [ "artifact", "snyk-scan", "lint", "pull-request" ], "last_modified_at": 1706280400.9161198, "state": "NON-COMPLIANT", "html_url": "https://app.kosli.com/cyber-dojo/flows/dashboard-archived-at-1707630840/artifacts/b550bc83dd44c771dd97503f60232ae4250b2838d594311159aded0e49e162ce", "api_url": "https://app.kosli.com/api/v2/artifacts/cyber-dojo/dashboard-archived-at-1707630840/fingerprint/b550bc83dd44c771dd97503f60232ae4250b2838d594311159aded0e49e162ce" }
Artifact Information |
|
Name | cyberdojo/dashboard:ec5886f |
Fingerprint | b550bc83dd44c771dd97503f60232ae4250b2838d594311159aded0e49e162ce |
Git commit |
ec5886f
Jon Jagger <jon@kosli.com> (main)
1706280336.0 • 3 months ago
CI: set kosli-trail env-var at top level (#116)
|
CI Build | https://github.com/cyber-dojo/dashboard/actions/runs/7669533771 |
Running | - |
Exited | - |
Last modified | 1706280400.9161198 • 3 months ago |
Approvals
None |
Evidence
Evidence for 'snyk-scan'
{ "evidence_type": "snyk", "name": "snyk-scan", "is_compliant": false, "build_url": "https://github.com/cyber-dojo/dashboard/actions/runs/7669533771", "evidence_archive_fingerprint": "4904c45eb8e01c4b9ab5639c46234817d9087e329d79c0d354f75ae595dc1b00", "user_data": {}, "snyk_results": { "applications": [ { "dependencyCount": 0, "displayTargetFile": "/usr/local/bundle/gems/concurrent-ruby-1.2.3/lib/concurrent-ruby/concurrent", "docker": {}, "filesystemPolicy": true, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": true, "org": "jonjagger", "packageManager": "maven", "path": "cyberdojo/dashboard:ec5886f/dashboard:ec5886f:/usr/local/bundle/gems/concurrent-ruby-1.2.3/lib/concurrent-ruby/concurrent", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\nignore: {}\npatch: {}\n", "projectName": "cyberdojo/dashboard:ec5886f:/usr/local/bundle/gems/concurrent-ruby-1.2.3/lib/concurrent-ruby/concurrent", "summary": "No known vulnerabilities", "targetFile": "/usr/local/bundle/gems/concurrent-ruby-1.2.3/lib/concurrent-ruby/concurrent", "uniqueCount": 0, "vulnerabilities": [] } ], "dependencyCount": 84, "displayTargetFile": "Dockerfile", "docker": { "baseImage": "cyberdojo/sinatra-base:a3e274a", "baseImageRemediation": { "advice": [ { "bold": true, "message": "Recommendations for your base image (cyberdojo/sinatra-base:a3e274a) are not available.\nSee above for details and fixes on individual vulnerabilities" } ], "code": "UNTRACKED_BASE_IMAGE" }, "binariesVulns": { "affectedPkgs": {}, "issuesData": {} } }, "filesystemPolicy": true, "filtered": { "ignore": [], "patch": [] }, "hasUnknownVersions": false, "ignoreSettings": { "adminOnly": false, "disregardFilesystemIgnores": false, "reasonRequired": false }, "isPrivate": true, "licensesPolicy": { "orgLicenseRules": { "AGPL-1.0": { "instructions": "", "licenseType": "AGPL-1.0", "severity": "high" }, "AGPL-3.0": { "instructions": "", "licenseType": "AGPL-3.0", "severity": "high" }, "Artistic-1.0": { "instructions": "", "licenseType": "Artistic-1.0", "severity": "medium" }, "Artistic-2.0": { "instructions": "", "licenseType": "Artistic-2.0", "severity": "medium" }, "CDDL-1.0": { "instructions": "", "licenseType": "CDDL-1.0", "severity": "medium" }, "CPOL-1.02": { "instructions": "", "licenseType": "CPOL-1.02", "severity": "high" }, "EPL-1.0": { "instructions": "", "licenseType": "EPL-1.0", "severity": "medium" }, "GPL-2.0": { "instructions": "", "licenseType": "GPL-2.0", "severity": "high" }, "GPL-3.0": { "instructions": "", "licenseType": "GPL-3.0", "severity": "high" }, "LGPL-2.0": { "instructions": "", "licenseType": "LGPL-2.0", "severity": "medium" }, "LGPL-2.1": { "instructions": "", "licenseType": "LGPL-2.1", "severity": "medium" }, "LGPL-3.0": { "instructions": "", "licenseType": "LGPL-3.0", "severity": "medium" }, "MPL-1.1": { "instructions": "", "licenseType": "MPL-1.1", "severity": "medium" }, "MPL-2.0": { "instructions": "", "licenseType": "MPL-2.0", "severity": "medium" }, "MS-RL": { "instructions": "", "licenseType": "MS-RL", "severity": "medium" }, "SimPL-2.0": { "instructions": "", "licenseType": "SimPL-2.0", "severity": "high" } }, "severities": {} }, "ok": false, "org": "jonjagger", "packageManager": "apk", "path": "cyberdojo/dashboard:ec5886f/dashboard", "platform": "linux/amd64", "policy": "# Snyk (https://snyk.io) policy file, patches or ignores known vulnerabilities.\nversion: v1.25.1\nignore: {}\npatch: {}\n", "projectName": "docker-image|cyberdojo/dashboard", "summary": "14 vulnerable dependency paths", "targetFile": "Dockerfile", "uniqueCount": 1, "vulnerabilities": [ { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "openssl/libcrypto3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [ false, "openssl/libcrypto3@3.1.4-r5" ], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", ".ruby-rundeps@20240108.230059", "openssl/libcrypto3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "apk-tools/apk-tools@2.14.0-r5", "openssl/libcrypto3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "busybox/ssl_client@1.36.1-r15", "openssl/libcrypto3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "ca-certificates/ca-certificates@20230506-r0", "openssl/libcrypto3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "nodejs/nodejs@20.11.0-r0", "openssl/libcrypto3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", ".ruby-rundeps@20240108.230059", "openssl/libssl3@3.1.4-r4", "openssl/libcrypto3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "curl/curl@8.5.0-r0", "curl/libcurl@8.5.0-r0", "openssl/libcrypto3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libcrypto3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "openssl/libssl3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": true, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [ false, "openssl/libssl3@3.1.4-r5" ], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", ".ruby-rundeps@20240108.230059", "openssl/libssl3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "apk-tools/apk-tools@2.14.0-r5", "openssl/libssl3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "busybox/ssl_client@1.36.1-r15", "openssl/libssl3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "nodejs/nodejs@20.11.0-r0", "openssl/libssl3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" }, { "CVSSv3": null, "cpes": [], "creationTime": "2024-01-26T03:03:11.579088Z", "credit": [ "" ], "cvssDetails": [ { "assigner": "Red Hat", "cvssV3BaseScore": 3.3, "cvssV3Vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "modificationTime": "2024-01-25T13:59:48.995274Z", "severity": "low" } ], "cvssScore": null, "description": "## NVD Description\n_This vulnerability has not been analyzed by NVD yet._\n\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.4-r5 or higher.\n", "disclosureTime": null, "dockerBaseImage": "cyberdojo/sinatra-base:a3e274a", "epssDetails": null, "exploit": "Not Defined", "fixedIn": [ "3.1.4-r5" ], "from": [ "docker-image|cyberdojo/dashboard@ec5886f", "curl/curl@8.5.0-r0", "curl/libcurl@8.5.0-r0", "openssl/libssl3@3.1.4-r4" ], "id": "SNYK-ALPINE319-OPENSSL-6191693", "identifiers": { "ALTERNATIVE": [], "CVE": [ "CVE-2024-0727" ], "CWE": [] }, "insights": { "triageAdvice": null }, "isDisputed": false, "isPatchable": false, "isUpgradable": false, "language": "linux", "malicious": false, "modificationTime": "2024-01-26T03:03:11.584729Z", "name": "openssl/libssl3", "nearestFixedInVersion": "3.1.4-r5", "nvdSeverity": null, "packageManager": "alpine:3.19", "packageName": "openssl", "patches": [], "publicationTime": "2024-01-26T03:03:11.584623Z", "references": [], "relativeImportance": null, "semver": { "vulnerable": [ "<3.1.4-r5" ] }, "severity": "low", "severityWithCritical": "low", "socialTrendAlert": false, "title": "CVE-2024-0727", "upgradePath": [], "version": "3.1.4-r4" } ] }, "created_at": 1706280400.9161198, "has_audit_package": true }
Evidence for 'lint'
{ "evidence_type": "generic", "is_compliant": true, "build_url": "https://github.com/cyber-dojo/dashboard/actions/runs/7669533771", "commit_sha": "ec5886fa5455b861e17022f32db136f7d13e2a23", "evidence_archive_fingerprint": "54135ed5d686498b6719e22025355e02a67c37cabcbcba3f74a7d4904bb289b7", "user_data": {}, "created_at": 1706280369.5776908, "has_audit_package": true }
Evidence for 'pull-request'
{ "evidence_type": "pull_request", "is_compliant": true, "build_url": "https://github.com/cyber-dojo/dashboard/actions/runs/7669533771", "commit_sha": "ec5886fa5455b861e17022f32db136f7d13e2a23", "evidence_url": "https://github.com/cyber-dojo/dashboard/pull/116", "user_data": {}, "git_provider": "github", "pull_requests": [ { "merge_commit": "ec5886fa5455b861e17022f32db136f7d13e2a23", "url": "https://github.com/cyber-dojo/dashboard/pull/116", "state": "closed", "approvers": [] } ], "created_at": 1706280364.28816, "has_audit_package": false }