mirror of
https://github.com/aquasecurity/trivy.git
synced 2025-12-12 15:50:15 -08:00
Signed-off-by: juan131 <jariza@vmware.com> Signed-off-by: knqyf263 <knqyf263@gmail.com> Co-authored-by: DmitriyLewen <dmitriy.lewen@smartforce.io> Co-authored-by: DmitriyLewen <91113035+DmitriyLewen@users.noreply.github.com> Co-authored-by: Nikita Pivkin <nikita.pivkin@smartforce.io> Co-authored-by: knqyf263 <knqyf263@gmail.com>
79 lines
2.4 KiB
Plaintext
79 lines
2.4 KiB
Plaintext
{
|
|
"SchemaVersion": 2,
|
|
"CreatedAt": "2021-08-25T12:20:30.000000005Z",
|
|
"ArtifactName": "testdata/fixtures/repo/packagesprops",
|
|
"ArtifactType": "repository",
|
|
"Metadata": {
|
|
"ImageConfig": {
|
|
"architecture": "",
|
|
"created": "0001-01-01T00:00:00Z",
|
|
"os": "",
|
|
"rootfs": {
|
|
"type": "",
|
|
"diff_ids": null
|
|
},
|
|
"config": {}
|
|
}
|
|
},
|
|
"Results": [
|
|
{
|
|
"Target": "Directory.Packages.props",
|
|
"Class": "lang-pkgs",
|
|
"Type": "packages-props",
|
|
"Packages": [
|
|
{
|
|
"ID": "Newtonsoft.Json@9.0.1",
|
|
"Name": "Newtonsoft.Json",
|
|
"Identifier": {
|
|
"PURL": "pkg:nuget/Newtonsoft.Json@9.0.1"
|
|
},
|
|
"Version": "9.0.1",
|
|
"Layer": {}
|
|
}
|
|
],
|
|
"Vulnerabilities": [
|
|
{
|
|
"VulnerabilityID": "GHSA-5crp-9r3c-p9vr",
|
|
"PkgID": "Newtonsoft.Json@9.0.1",
|
|
"PkgName": "Newtonsoft.Json",
|
|
"PkgIdentifier": {
|
|
"PURL": "pkg:nuget/Newtonsoft.Json@9.0.1"
|
|
},
|
|
"InstalledVersion": "9.0.1",
|
|
"FixedVersion": "13.0.1",
|
|
"Status": "fixed",
|
|
"Layer": {},
|
|
"SeveritySource": "ghsa",
|
|
"PrimaryURL": "https://github.com/advisories/GHSA-5crp-9r3c-p9vr",
|
|
"DataSource": {
|
|
"ID": "ghsa",
|
|
"Name": "GitHub Security Advisory Nuget",
|
|
"URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Anuget"
|
|
},
|
|
"Title": "Improper Handling of Exceptional Conditions in Newtonsoft.Json",
|
|
"Description": "Newtonsoft.Json prior to version 13.0.1 is vulnerable to Insecure Defaults due to improper handling of expressions with high nesting level that lead to StackOverFlow exception or high CPU and RAM usage.",
|
|
"Severity": "HIGH",
|
|
"CweIDs": [
|
|
"CWE-755"
|
|
],
|
|
"VendorSeverity": {
|
|
"ghsa": 3
|
|
},
|
|
"CVSS": {
|
|
"ghsa": {
|
|
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"V3Score": 7.5
|
|
}
|
|
},
|
|
"References": [
|
|
"https://alephsecurity.com/2018/10/22/StackOverflowException/",
|
|
"https://alephsecurity.com/vulns/aleph-2018004"
|
|
],
|
|
"PublishedDate": "2022-06-22T15:08:47Z",
|
|
"LastModifiedDate": "2022-06-27T18:37:23Z"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|