nagarajmmu opened a new issue, #24490:
URL: https://github.com/apache/superset/issues/24490

   Hi Team
   
   I wanted use superset for my application, I am planning to deploy Superset 
using helm in Kubernetes. 
   Before installing superset, I have scanned superset images by Trivy tool, 
Trivy listed below vulnerability, please let me know, how to resolve these 
vulnerebility to use superset. I am listing only CRITICAL and HIGH severity 
vulnerability. 
   
   Imaage Name: apache/superset
   CRITICAL: 
        cve-2019-1010022
        cve-2019-8457
   HIGH:                                              
        CVE-2022-3715                                  
        CVE-2018-12934                                 
           CVE-2018-18483                                 
          CVE-2021-3530                                  
          CVE-2021-3549                                  
          CVE-2021-3826                                  
          CVE-2021-45078                                 
          CVE-2022-42916                                 
          CVE-2022-43551                                 
           CVE-2022-1304                                  
        CVE-2018-20796                                 
           CVE-2019-1010023                               
           CVE-2019-9192                                  
           CVE-2018-6829                                  
           CVE-2021-33560                                 
        CVE-2018-5709                                  
        CVE-2017-17740                                 
        CVE-2022-27385                                 
        CVE-2022-29458                                 
           CVE-2017-11164                                 
           CVE-2017-7245                                  
           CVE-2017-7246                                  
           CVE-2019-20838                                 
        CVE-2011-4116                                  
           CVE-2020-16156                                 
        CVE-2021-36690                                 
           CVE-2022-35737                                 
        CVE-2022-1304                                  
        CVE-2022-29458 
           CVE-2008-4609 
       CVE-2013-7445 
       CVE-2019-12456
       CVE-2019-19070
       CVE-2019-19378
       CVE-2019-19449
       CVE-2019-19814
       CVE-2020-11725
       CVE-2020-12362
       CVE-2021-26934
       CVE-2021-32078
       CVE-2021-3714 
       CVE-2021-3847 
       CVE-2021-3864 
       CVE-2021-39686
       CVE-2021-4204 
       CVE-2022-0400 
       CVE-2022-0500 
       CVE-2022-1247 
       CVE-2022-2196 
       CVE-2022-25265
       CVE-2022-2961 
       CVE-2022-3424 
       CVE-2022-3566
       CVE-2022-3567
       CVE-2022-39189
       CVE-2022-4379 
       CVE-2022-43945
       CVE-2022-45884
       CVE-2022-45885
       CVE-2022-45886
       CVE-2022-45919
       CVE-2023-23559
   
   Image Name: jwilder/dockerize:latest
   HIGH:
      CVE-2017-16544
      CVE-2017-15650
   
   Imaage Name:  postgres:14
   CRITICAL: 
        CVE-2019-1010022
        cve-2019-8457
   HIGH:                                              
        CVE-2022-3715  
       CVE-2018-20796   
       CVE-2019-1010023 
       CVE-2019-9192    
       CVE-2022-1304     
       CVE-2018-6829    
       CVE-2021-33560   
       CVE-2018-5709      
       CVE-2017-17740   
       CVE-2022-29458   
       CVE-2017-11164   
       CVE-2017-7245    
       CVE-2017-7246    
       CVE-2019-20838   
       CVE-2011-4116    
       CVE-2020-16156   
       CVE-2021-36690   
       CVE-2022-35737  
       CVE-2019-19882 
       CVE-2005-2541    
       CVE-2022-48303   
   
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to