Skip to content
This repository has been archived by the owner on Jul 2, 2024. It is now read-only.

Commit

Permalink
fix: add CVE-2024-4068 to .trivyignore.yaml
Browse files Browse the repository at this point in the history
  • Loading branch information
ruzickap committed Jun 16, 2024
1 parent 3f558bf commit 7896b06
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 1 deletion.
1 change: 0 additions & 1 deletion .github/workflows/mega-linter.yml
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,6 @@ jobs:
# Extract: ```bash ... ```
sed -n "/^ \`\`\`\(bash\|shell\)$/,/^ \`\`\`$/p" "${FILE}" | sed '/^ ```*/d; s/^ //' >> README.sh
done
ls -la README.sh
chmod a+x README.sh
- name: 💡 MegaLinter
Expand Down
2 changes: 2 additions & 0 deletions .trivyignore.yaml
Original file line number Diff line number Diff line change
@@ -1,4 +1,6 @@
vulnerabilities:
# │ braces │ CVE-2024-4068 │ HIGH │ fixed │ 2.3.2 │ 3.0.3 │ braces: fails to limit the number of characters it can │
- id: CVE-2024-4068
# │ glob-parent │ CVE-2020-28469 │ HIGH │ fixed │ 3.1.0 │ 5.1.2 │ Regular expression denial of service │
- id: CVE-2020-28469
# │ json5 │ CVE-2022-46175 │ HIGH │ fixed │ 0.5.1 │ 2.2.2, 1.0.2 │ json5: Prototype Pollution in JSON5 via Parse Method │
Expand Down

0 comments on commit 7896b06

Please sign in to comment.