chibenwa opened a new pull request #559:
URL: https://github.com/apache/james-project/pull/559


   
   Keeping your Docker base image up-to-date means you’ll benefit from security 
fixes in the latest version of your chosen image.
   
   #### Changes included in this PR
   
   - dockerfiles/site/homepage/Dockerfile
   
   We recommend upgrading to `ruby:2.6.8-slim-buster`, as this image has only 
61 known vulnerabilities. To do this, merge this pull request, then verify your 
application still works as expected.
   
   
   
   Some of the most important vulnerabilities in your base image include:
   
   | Severity                                                                   
                                              | Priority Score / 1000  | Issue  
                                                                   | Exploit 
Maturity      |
   | :------:                                                                   
                                              | :--------------------  | :----  
                                                                   | 
:---------------      |
   | ![critical 
severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/c.png
 "critical severity")   | **714**  | Credentials Management 
<br/>[SNYK-DEBIAN10-PYTHON37-349025](https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON37-349025)
   | No Known Exploit   |
   | ![critical 
severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/c.png
 "critical severity")   | **714**  | Directory Traversal 
<br/>[SNYK-DEBIAN10-PYTHON37-452235](https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON37-452235)
   | No Known Exploit   |
   | ![high 
severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png
 "high severity")   | **714**  | Improper Input Validation 
<br/>[SNYK-DEBIAN10-PYTHON37-461183](https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON37-461183)
   | No Known Exploit   |
   | ![high 
severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png
 "high severity")   | **714**  | Improper Input Validation 
<br/>[SNYK-DEBIAN10-PYTHON37-584371](https://snyk.io/vuln/SNYK-DEBIAN10-PYTHON37-584371)
   | No Known Exploit   |
   | ![high 
severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png
 "high severity")   | **714**  | NULL Pointer Dereference 
<br/>[SNYK-DEBIAN10-SUBVERSION-1071814](https://snyk.io/vuln/SNYK-DEBIAN10-SUBVERSION-1071814)
   | No Known Exploit   |
   
   
   
   ---
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]



---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to