[ { "id": "586f7631ed25396a829baaf4", "image_name": "jboss/wildfly", "timestamp": "2017-01-06 10:49:21.212508", "status": "Completed", "runtime_analysis": { "container_id": "69dbf26ab368", "start_timestamp": "2017-01-06 10:49:21.212508", "stop_timestamp": "2017-01-06 10:50:16.343847", "anomalous_activities_detected": { "anomalous_counts_by_severity": { "Warning": 2 }, "anomalous_activities_details": [{ "output": "10:49:47.492517329: Warning Unexpected setuid call by non-sudo, non-root program (user=<NA> command=ping 8.8.8.8 uid=<NA>) container=thirsty_spence (id=69dbf26ab368)", "priority": "Warning", "rule": "Non sudo setuid", "time": "2017-01-06 10:49:47.492516" }, { "output": "10:49:53.181654702: Warning Unexpected setuid call by non-sudo, non-root program (user=<NA> command=ping 8.8.4.4 uid=<NA>) container=thirsty_spence (id=69dbf26ab368)", "priority": "Warning", "rule": "Non sudo setuid", "time": "2017-01-06 10:49:53.181653" }] } } }, { "id": "58667994ed253915723c50e7", "image_name": "jboss/wildfly", "status": "Completed", "timestamp": "2016-12-14 13:17:12.802486", "static_analysis": { "malware_binaries": [ { "file": "/tmp/test/removal-tool.exe", "malware": "Worm.Sober" }, { "file": "/tmp/test/error.hta", "malware": "VBS.Inor.D" } ], "os_packages": { "total_os_packages": 182, "vuln_os_packages": 41, "ok_os_packages": 141, "os_packages_details": [ { "product": "sed", "version": "4.2.2", "is_vulnerable": false, "is_false_positive": false, "vulnerabilities": [] }, { "product": "grep", "version": "2.20", "is_vulnerable": true, "is_false_positive": false, "vulnerabilities": [ { "CVE-2015-1345": { "cveid": "CVE-2015-1345", "cvss_access_complexity": "Low", "cvss_access_vector": "Local access", "cvss_authentication": "None required", "cvss_availability_impact": "Partial", "cvss_base": 2.1, "cvss_confidentiality_impact": "None", "cvss_exploit": 3.9, "cvss_impact": 2.9, "cvss_integrity_impact": "None", "cvss_vector": [ "AV:L", "AC:L", "Au:N", "C:N", "I:N", "A:P" ], "cweid": "CWE-119", "mod_date": "23-12-2016", "pub_date": "12-02-2015", "summary": "The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option." } } ] }, { "product": "lua", "version": "5.1.4", "is_vulnerable": true, "is_false_positive": false, "vulnerabilities": [ { "CVE-2014-5461": { "cveid": "CVE-2014-5461", "cvss_access_complexity": "Low", "cvss_access_vector": "Network", "cvss_authentication": "None required", "cvss_availability_impact": "Partial", "cvss_base": 5.0, "cvss_confidentiality_impact": "None", "cvss_exploit": 10.0, "cvss_impact": 2.9, "cvss_integrity_impact": "None", "cvss_vector": [ "AV:N", "AC:L", "Au:N", "C:N", "I:N", "A:P" ], "cweid": "CWE-119", "mod_date": "06-01-2017", "pub_date": "04-09-2014", "summary": "Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments." } }, { "BID-34237": { "bugtraq_id": 34237, "class": "Unknown", "cve": [], "local": "no", "remote": "yes", "title": "Lua Unspecified Bytecode Verifier Security Vulnerability" } } ] }, [...] , { "product": "sqlite", "version": "3.7.17", "is_vulnerable": false, "is_false_positive": false, "vulnerabilities": [] } ] }, "prog_lang_dependencies": { "vuln_dependencies": 9, "dependencies_details": { "java": [ { "product": "xalan-java", "version": "2.5.2", "product_file_path": "/opt/jboss/java/xalan.2.5.2.jar", "is_vulnerable": true, "is_false_positive": false, "vulnerabilities": [ { "CVE-2014-0107": { "cveid": "CVE-2014-0107", "cvss_access_complexity": "Low", "cvss_access_vector": "Network", "cvss_authentication": "None required", "cvss_availability_impact": "Partial", "cvss_base": 7.5, "cvss_confidentiality_impact": "Partial", "cvss_exploit": 10.0, "cvss_impact": 6.4, "cvss_integrity_impact": "Partial", "cvss_vector": [ "AV:N", "AC:L", "Au:N", "C:P", "I:P", "A:P" ], "cweid": "CWE-264", "mod_date": "06-01-2017", "pub_date": "15-04-2014", "summary": "The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function." } }, { "BID-66397": { "bugtraq_id": 66397, "class": "Input Validation Error", "cve": [ "CVE-2014-0107" ], "local": "no", "remote": "yes", "title": "Apache Xalan-Java Library CVE-2014-0107 Security Bypass Vulnerability" } } ] }, [...] ], "js": [], "nodejs": [], "php": [], "python": [ { "product": "lxml", "version": "1.0.1", "product_file_path": "/opt/jboss/python/lxml.1.0.1.py", "is_vulnerable": true, "is_false_positive": false, "vulnerabilities": [ { "CVE-2014-3146": { "cveid": "CVE-2014-3146", "cvss_access_complexity": "Medium", "cvss_access_vector": "Network", "cvss_authentication": "None required", "cvss_availability_impact": "None", "cvss_base": 4.3, "cvss_confidentiality_impact": "None", "cvss_exploit": 8.6, "cvss_impact": 2.9, "cvss_integrity_impact": "Partial", "cvss_vector": [ "AV:N", "AC:M", "Au:N", "C:N", "I:P", "A:N" ], "cweid": "CWE-0", "mod_date": "14-04-2015", "pub_date": "14-05-2014", "summary": "Incomplete blacklist vulnerability in the lxml.html.clean module in lxml before 3.3.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via control characters in the link scheme to the clean_html function." } } ] } ], "ruby": [] } } } } ]
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4