Skip to content

Conversation

@n0vad3v
Copy link
Member

@n0vad3v n0vad3v commented Apr 14, 2025

Fixs: #398

@github-actions
Copy link

github-actions bot commented Apr 14, 2025


Report Summary

┌───────────────────────────────────────────────┬──────────┬─────────────────┬─────────┐
│                    Target                     │   Type   │ Vulnerabilities │ Secrets │
├───────────────────────────────────────────────┼──────────┼─────────────────┼─────────┤
│ ghcr.io/webp-sh/webp_server_go (debian 12.10) │  debian  │        1        │    -    │
├───────────────────────────────────────────────┼──────────┼─────────────────┼─────────┤
│ usr/bin/webp-server                           │ gobinary │        0        │    -    │
└───────────────────────────────────────────────┴──────────┴─────────────────┴─────────┘
Legend:
- '-': Not scanned
- '0': Clean (no security findings detected)


For OSS Maintainers: VEX Notice
--------------------------------
If you're an OSS maintainer and Trivy has detected vulnerabilities in your project that you believe are not actually exploitable, consider issuing a VEX (Vulnerability Exploitability eXchange) statement.
VEX allows you to communicate the actual status of vulnerabilities in your project, improving security transparency and reducing false positives for your users.
Learn more and start using VEX: https://trivy.dev/v0.61/docs/supply-chain/vex/repo#publishing-vex-documents

To disable this notice, set the TRIVY_DISABLE_VEX_NOTICE environment variable.


ghcr.io/webp-sh/webp_server_go (debian 12.10)
=============================================
Total: 1 (HIGH: 1, CRITICAL: 0)

┌───────────┬────────────────┬──────────┬────────┬───────────────────┬──────────────────┬──────────────────────────────────────────────────────────┐
│  Library  │ Vulnerability  │ Severity │ Status │ Installed Version │  Fixed Version   │                          Title                           │
├───────────┼────────────────┼──────────┼────────┼───────────────────┼──────────────────┼──────────────────────────────────────────────────────────┤
│ perl-base │ CVE-2024-56406 │ HIGH     │ fixed  │ 5.36.0-7+deb12u1  │ 5.36.0-7+deb12u2 │ perl: Perl 5.34, 5.36, 5.38 and 5.40 are vulnerable to a │
│           │                │          │        │                   │                  │ heap...                                                  │
│           │                │          │        │                   │                  │ https://avd.aquasec.com/nvd/cve-2024-56406               │
└───────────┴────────────────┴──────────┴────────┴───────────────────┴──────────────────┴──────────────────────────────────────────────────────────┘

@n0vad3v n0vad3v merged commit 6dbc328 into master Apr 24, 2025
5 checks passed
@n0vad3v n0vad3v deleted the prefix-slash-reqURIwithQuery-fix branch April 24, 2025 08:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants