We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent d88b019 commit 1d7c5b1Copy full SHA for 1d7c5b1
.trivyignore
@@ -48,3 +48,16 @@ CVE-2026-1229
48
# libexpat: XML_ExternalEntityParserCreate does not copy encoding handler user data.
49
# No external XML entity processing path exists in this product.
50
CVE-2026-24515
51
+
52
+# QuickJS stack overflow via deeply nested JS input.
53
+# Only internal tool scripts (convert-rule.mjs, report.mjs) are executed;
54
+# no untrusted JavaScript is evaluated.
55
+CVE-2023-31922
56
57
+# zlib: buffer overflow in standalone untgz demo utility.
58
+# The core zlib library (libz) is unaffected; untgz is not used in this image.
59
+CVE-2026-22184
60
61
+# Go stdlib net/url: incorrect parsing of IPv6 host literals.
62
+# CNI plugins do not parse user-supplied URLs.
63
+CVE-2026-25679
0 commit comments