{
  "_class" : "io.jenkins.plugins.analysis.core.restapi.ReportApi",
  "issues" : [
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-c9a061fe",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2025-13151: OsPackageVulnerability\u000a\u000alibtasn1: libtasn1: Denial of Service via stack-based buffer overflow in asn1_expend_octet_string\u000a\u000aFor additional help see: **Vulnerability CVE-2025-13151**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|MEDIUM|libtasn1|4.21.0-r0|[CVE-2025-13151](https://avd.aquasec.com/nvd/cve-2025-13151)|\u000a\u000aStack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.\u000a\u000aPackage: libtasn1\u000aInstalled Version: 4.20.0-r0\u000aVulnerability CVE-2025-13151\u000aSeverity: MEDIUM\u000aFixed Version: 4.21.0-r0\u000aLink: [CVE-2025-13151](https://avd.aquasec.com/nvd/cve-2025-13151)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1357",
      "severity" : "NORMAL",
      "toString" : "govway(1,0): CVE-2025-13151: : CVE-2025-13151: OsPackageVulnerability\u000a\u000alibtasn1: libtasn1: Denial of Service via stack-based buffer overflow in asn1_expend_octet_string\u000a\u000aFor additional help see: **Vulnerability CVE-2025-13151**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|MEDIUM|libtasn1|4.21.0-r0|[CVE-2025-13151](https://avd.aquasec.com/nvd/cve-2025-13151)|\u000a\u000aStack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.\u000a\u000aPackage: libtasn1\u000aInstalled Version: 4.20.0-r0\u000aVulnerability CVE-2025-13151\u000aSeverity: MEDIUM\u000aFixed Version: 4.21.0-r0\u000aLink: [CVE-2025-13151](https://avd.aquasec.com/nvd/cve-2025-13151)",
      "type" : "CVE-2025-13151"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-c72f0d29",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2026-22695: OsPackageVulnerability\u000a\u000alibpng: libpng: Denial of service and information disclosure via heap buffer over-read in png_image_finish_read\u000a\u000aFor additional help see: **Vulnerability CVE-2026-22695**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|HIGH|libpng|1.6.54-r0|[CVE-2026-22695](https://avd.aquasec.com/nvd/cve-2026-22695)|\u000a\u000aLIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.51 to 1.6.53, there is a heap buffer over-read in the libpng simplified API function png_image_finish_read when processing interlaced 16-bit PNGs with 8-bit output format and non-minimal row stride. This is a regression introduced by the fix for CVE-2025-65018. This vulnerability is fixed in 1.6.54.\u000a\u000aPackage: libpng\u000aInstalled Version: 1.6.53-r0\u000aVulnerability CVE-2026-22695\u000aSeverity: HIGH\u000aFixed Version: 1.6.54-r0\u000aLink: [CVE-2026-22695](https://avd.aquasec.com/nvd/cve-2026-22695)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1357",
      "severity" : "HIGH",
      "toString" : "govway(1,0): CVE-2026-22695: : CVE-2026-22695: OsPackageVulnerability\u000a\u000alibpng: libpng: Denial of service and information disclosure via heap buffer over-read in png_image_finish_read\u000a\u000aFor additional help see: **Vulnerability CVE-2026-22695**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|HIGH|libpng|1.6.54-r0|[CVE-2026-22695](https://avd.aquasec.com/nvd/cve-2026-22695)|\u000a\u000aLIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.51 to 1.6.53, there is a heap buffer over-read in the libpng simplified API function png_image_finish_read when processing interlaced 16-bit PNGs with 8-bit output format and non-minimal row stride. This is a regression introduced by the fix for CVE-2025-65018. This vulnerability is fixed in 1.6.54.\u000a\u000aPackage: libpng\u000aInstalled Version: 1.6.53-r0\u000aVulnerability CVE-2026-22695\u000aSeverity: HIGH\u000aFixed Version: 1.6.54-r0\u000aLink: [CVE-2026-22695](https://avd.aquasec.com/nvd/cve-2026-22695)",
      "type" : "CVE-2026-22695"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "govway",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/linkitaly/govway",
      "fingerprint" : "FALLBACK-7e463c20",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2026-22801: OsPackageVulnerability\u000a\u000alibpng: libpng: Information disclosure and denial of service via integer truncation in simplified write API\u000a\u000aFor additional help see: **Vulnerability CVE-2026-22801**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|HIGH|libpng|1.6.54-r0|[CVE-2026-22801](https://avd.aquasec.com/nvd/cve-2026-22801)|\u000a\u000aLIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.26 to 1.6.53, there is an integer truncation in the libpng simplified write API functions png_write_image_16bit and png_write_image_8bit causes heap buffer over-read when the caller provides a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes. The bug was introduced in libpng 1.6.26 (October 2016) by casts added to silence compiler warnings on 16-bit systems. This vulnerability is fixed in 1.6.54.\u000a\u000aPackage: libpng\u000aInstalled Version: 1.6.53-r0\u000aVulnerability CVE-2026-22801\u000aSeverity: HIGH\u000aFixed Version: 1.6.54-r0\u000aLink: [CVE-2026-22801](https://avd.aquasec.com/nvd/cve-2026-22801)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1357",
      "severity" : "HIGH",
      "toString" : "govway(1,0): CVE-2026-22801: : CVE-2026-22801: OsPackageVulnerability\u000a\u000alibpng: libpng: Information disclosure and denial of service via integer truncation in simplified write API\u000a\u000aFor additional help see: **Vulnerability CVE-2026-22801**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|HIGH|libpng|1.6.54-r0|[CVE-2026-22801](https://avd.aquasec.com/nvd/cve-2026-22801)|\u000a\u000aLIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.26 to 1.6.53, there is an integer truncation in the libpng simplified write API functions png_write_image_16bit and png_write_image_8bit causes heap buffer over-read when the caller provides a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes. The bug was introduced in libpng 1.6.26 (October 2016) by casts added to silence compiler warnings on 16-bit systems. This vulnerability is fixed in 1.6.54.\u000a\u000aPackage: libpng\u000aInstalled Version: 1.6.53-r0\u000aVulnerability CVE-2026-22801\u000aSeverity: HIGH\u000aFixed Version: 1.6.54-r0\u000aLink: [CVE-2026-22801](https://avd.aquasec.com/nvd/cve-2026-22801)",
      "type" : "CVE-2026-22801"
    }
  ],
  "size" : 3,
  "toString" : "3 warnings (high: 2, normal: 1)"
}