You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Image: bluet/cronicle-docker:0.8.62
Most of them will be fixed if you update the base Docker image and Cronicle https://github.com/anchore/grype
grype bluet/cronicle-docker:0.8.62
✔ Vulnerability DB [no update available]
✔ Loaded image
✔ Parsed image
✔ Cataloged packages [486 packages]
✔ Scanned image [74 vulnerabilities]
NAME INSTALLED FIXED-IN VULNERABILITY SEVERITY
@npmcli/arborist 2.6.2 2.8.2 GHSA-2h3h-q99f-3fhc Medium
@npmcli/arborist 2.6.2 2.8.2 GHSA-gmw6-94gg-2rc2 Medium
ansi-regex 3.0.0 5.0.1 GHSA-93q8-gq69-wqmw Medium
ansi-regex 3.0.0 CVE-2021-3807 High
ansi-regex 5.0.0 5.0.1 GHSA-93q8-gq69-wqmw Medium
ansi-regex 5.0.0 CVE-2021-3807 High
busybox 1.33.1-r3 1.33.1-r4 CVE-2021-42374 Medium
busybox 1.33.1-r3 1.33.1-r5 CVE-2021-42375 Medium
busybox 1.33.1-r3 1.33.1-r6 CVE-2021-42378 High
busybox 1.33.1-r3 1.33.1-r6 CVE-2021-42379 High
busybox 1.33.1-r3 1.33.1-r6 CVE-2021-42380 High
busybox 1.33.1-r3 1.33.1-r6 CVE-2021-42381 High
busybox 1.33.1-r3 1.33.1-r6 CVE-2021-42382 High
busybox 1.33.1-r3 1.33.1-r6 CVE-2021-42383 High
busybox 1.33.1-r3 1.33.1-r6 CVE-2021-42384 High
busybox 1.33.1-r3 1.33.1-r6 CVE-2021-42385 High
busybox 1.33.1-r3 1.33.1-r6 CVE-2021-42386 High
cookie 0.3.1 CVE-2017-18589 High
debug 2.3.3 2.6.9 GHSA-gxpj-cx7g-858c Low
debug 2.3.3 CVE-2017-16137 Medium
debug 2.2.0 2.6.9 GHSA-gxpj-cx7g-858c Low
debug 2.2.0 CVE-2017-16137 Medium
engine.io 1.8.3 CVE-2020-36048 High
jquery 3.5.0 CVE-2007-2379 Medium
json-schema 0.2.3 0.4.0 GHSA-896r-f27r-55mw Medium
json-schema 0.2.3 CVE-2021-3918 Critical
lodash 4.17.21 GHSA-8p5q-j9m2-g8wr Low
minimist 0.0.8 1.2.2 GHSA-7fhm-mqm4-2wp7 Medium
minimist 0.0.8 0.2.1 GHSA-vh95-rmgr-6w4m Medium
minimist 0.0.8 CVE-2020-7598 Medium
nodejs 14.17.6-r0 14.18.1-r0 CVE-2021-22960 Medium
nodejs 14.17.6-r0 14.18.1-r0 CVE-2021-22959 Medium
nodemailer 6.4.16 6.6.1 GHSA-hwqf-gcqm-7353 Medium
nodemailer 6.4.16 CVE-2021-23400 High
npm 7.17.0 CVE-2021-43616 Critical
openssh-client-common 8.6_p1-r2 8.6_p1-r3 CVE-2021-41617 High
openssh-client-default 8.6_p1-r2 8.6_p1-r3 CVE-2021-41617 High
openssh-keygen 8.6_p1-r2 8.6_p1-r3 CVE-2021-41617 High
parsejson 0.0.3 GHSA-q75g-2496-mxpp High
parsejson 0.0.3 CVE-2017-16113 High
shell-quote 1.6.1 CVE-2021-42740 Critical
socket.io 1.7.3 2.4.0 GHSA-fxwf-4rqh-v8g3 Medium
socket.io 1.7.3 CVE-2020-28481 Medium
socket.io-parser 2.3.1 3.3.2 GHSA-xfhh-g9f5-x4m4 High
socket.io-parser 2.3.1 CVE-2020-36049 High
ssl_client 1.33.1-r3 1.33.1-r4 CVE-2021-42374 Medium
ssl_client 1.33.1-r3 1.33.1-r5 CVE-2021-42375 Medium
ssl_client 1.33.1-r3 1.33.1-r6 CVE-2021-42378 High
ssl_client 1.33.1-r3 1.33.1-r6 CVE-2021-42379 High
ssl_client 1.33.1-r3 1.33.1-r6 CVE-2021-42380 High
ssl_client 1.33.1-r3 1.33.1-r6 CVE-2021-42381 High
ssl_client 1.33.1-r3 1.33.1-r6 CVE-2021-42382 High
ssl_client 1.33.1-r3 1.33.1-r6 CVE-2021-42383 High
ssl_client 1.33.1-r3 1.33.1-r6 CVE-2021-42384 High
ssl_client 1.33.1-r3 1.33.1-r6 CVE-2021-42385 High
ssl_client 1.33.1-r3 1.33.1-r6 CVE-2021-42386 High
tar 6.1.0 6.1.2 GHSA-r628-mhmh-qjhw High
tar 6.1.0 6.1.1 GHSA-3jfq-g458-7qm9 High
tar 6.1.0 6.1.9 GHSA-5955-9wpr-37jh High
tar 6.1.0 6.1.9 GHSA-qq89-hq3f-393p High
tar 6.1.0 6.1.7 GHSA-9r2w-394v-53qc High
tar 6.1.0 CVE-2021-32803 High
tar 6.1.0 CVE-2021-32804 High
tar 6.1.0 CVE-2021-37701 High
tar 6.1.0 CVE-2021-37712 High
tar 6.1.0 CVE-2021-37713 High
underscore 1.4.4 1.12.1 GHSA-cf4h-3jhx-xvhq High
underscore 1.4.4 CVE-2021-23358 High
ws 1.1.2 1.1.5 GHSA-5v72-xg48-5rpm High
xmlhttprequest-ssl 1.5.3 1.6.2 GHSA-h4j5-c7cj-74xg High
xmlhttprequest-ssl 1.5.3 1.6.1 GHSA-72mh-269x-7mh5 Critical
xmlhttprequest-ssl 1.5.3 CVE-2021-31597 Critical
The text was updated successfully, but these errors were encountered:
Image: bluet/cronicle-docker:0.8.62
Most of them will be fixed if you update the base Docker image and Cronicle
https://github.com/anchore/grype
The text was updated successfully, but these errors were encountered: