4.3
CVSSv2

CVE-2011-3374

Published: 26/11/2019 Updated: 09/02/2021
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 3.7 | Impact Score: 1.4 | Exploitability Score: 2.2
VMScore: 385
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

debian advanced package tool

debian debian linux 8.0

debian debian linux 9.0

debian debian linux 10.0

Github Repositories

Check images in your charts for vulnerabilities

Check your Helm chart for vulnerabilities The Helm plugin for Snyk provides a subcommand for testing the images in a given Helm chart for known vulnerabilities Installation Install the plugin using the built-in helm plugin command: helm plugin install githubcom/snyk-labs/helm-snyk The plugin connects to the Snyk service to look

Container Scan This action is a clone with modifications to the Azure Container Scan Github action This action can be used to help you add some additional checks to help you secure your Docker Images in your CI This would help you attain some confidence in your docker image before pushing them to your container registry or a deployment It internally uses Trivy for running ce

Open API spec definition for the scanners that can be plugged into Harbor to do artifact scanning.

pluggable-scanner-spec Open API spec definition for the scanners that can be plugged into Harbor to do artifact scanning Background Add support to Harbor for using other image scanners than Trivy by providing an adapter layer implemented as an HTTP API between Harbor and the scanners' native interfaces This will provide runtime configurable scanner invocation to provid

Python tools to enable augmentation of JSON formatted Trivy reports with CVSS data

Trivy CVSS Tools This repository contains two simple Python scripts that, together with the JSON files in this repository enable a CI/CD pipeline ir similar tooling to augment a Trivy container scan report with CVSS scores where they are available process-nvdcvepy This tool is used to parse all of the JSON files contained in the nvdcve repo - example usage might be: $ git clo

Clone of Azure/container-scan

Container Scan This action is a clone with modifications to the Azure Container Scan Github action This action can be used to help you add some additional checks to help you secure your Docker Images in your CI This would help you attain some confidence in your docker image before pushing them to your container registry or a deployment It internally uses Trivy for running ce

ThousandEyesChallenge Documentation To run the docker image, extract the archive (ThousandEyesAPIzip) and proceed to build and run the Docker image using the provided Dockerfile Next are the steps followed to create the code and the docker image API code Initialize a new virtual environment python -m venv env source env/bin/activate

About the Kubernetes CKS : Total Question = 15, Exam Time = 2 hours Security in Kubernetes is based out on 4C concepts: Cloud [DataCentre, Network, Services] Cluster [Authentication, Authorization, Admission Controller, Network Policy, Ingress, RBAC, update kubernetes version fequently] Container [Supply Chain,Minimizing Microservice vulnerabilities ] Supply Chain includ

Connector for Trivy as Django API

Trivy Connector - Django API This is a connector for Trivy as Django API This project runs Trivy commands in the background, asynchronously, so that user does not have to wait until the scan in finished Two simple endpoints are provided for requesting a scan and viewing the result Components Python 3 Django 22 LTS PostgreSQL 12 Celery 5 Setup Install dependencies: pip ins