Skip to main content
New to Testkube? Unleash the power of cloud native testing in Kubernetes with Testkube. Get Started >

testkube-tw-toolkit-2.1.150_linux_arm64

digestsha256:02a4d1202694fb7f0f18170306cafe9d50b8a5af92c0a2dc37c57f8d433f90cb
vulnerabilitiescritical: 0 high: 3 medium: 5 low: 0
platformlinux/arm64
size45 MB
packages173
critical: 0 high: 1 medium: 0 low: 0 libexpat 2.6.4-r0 (apk)

pkg:apk/alpine/libexpat@2.6.4-r0?arch=aarch64&distro=alpine-3.20.3&upstream=expat

# tw-toolkit.Dockerfile (25:25)
RUN apk --no-cache add ca-certificates libssl3 git openssh-client

high : CVE--2024--8176

Affected range<2.7.0-r0
Fixed version2.7.0-r0
EPSS Score0.358%
EPSS Percentile57th percentile
Description
critical: 0 high: 1 medium: 0 low: 0 golang.org/x/oauth2 0.26.0 (golang)

pkg:golang/golang.org/x/oauth2@0.26.0

# tw-toolkit.Dockerfile (28:28)
COPY --from=build /app/testworkflow-init /init

high : CVE--2025--22868

Affected range<0.27.0
Fixed version0.27.0
EPSS Score0.056%
EPSS Percentile18th percentile
Description

An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.

critical: 0 high: 1 medium: 0 low: 0 musl 1.2.5-r0 (apk)

pkg:apk/alpine/musl@1.2.5-r0?arch=aarch64&distro=alpine-3.20.3

# tw-toolkit.Dockerfile (24:24)
FROM ${ALPINE_IMAGE}

high : CVE--2025--26519

Affected range<1.2.5-r1
Fixed version1.2.5-r1
EPSS Score0.010%
EPSS Percentile1st percentile
Description
critical: 0 high: 0 medium: 3 low: 0 libssl3 3.3.2-r0 (apk)

pkg:apk/alpine/libssl3@3.3.2-r0?arch=aarch64&distro=alpine-3.20.3&upstream=openssl

# tw-toolkit.Dockerfile (24:24)
FROM ${ALPINE_IMAGE}

medium : CVE--2024--12797

Affected range<3.3.3-r0
Fixed version3.3.3-r0
EPSS Score0.130%
EPSS Percentile34th percentile
Description

medium : CVE--2024--9143

Affected range<3.3.2-r1
Fixed version3.3.2-r1
EPSS Score0.372%
EPSS Percentile58th percentile
Description

medium : CVE--2024--13176

Affected range<3.3.2-r2
Fixed version3.3.2-r2
EPSS Score0.033%
EPSS Percentile8th percentile
Description
critical: 0 high: 0 medium: 2 low: 0 golang.org/x/net 0.34.0 (golang)

pkg:golang/golang.org/x/net@0.34.0

# tw-toolkit.Dockerfile (28:28)
COPY --from=build /app/testworkflow-init /init

medium 5.3: CVE--2025--22872 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Affected range<0.38.0
Fixed version0.38.0
CVSS Score5.3
CVSS VectorCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
EPSS Score0.016%
EPSS Percentile2nd percentile
Description

The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).

medium 4.4: CVE--2025--22870 Misinterpretation of Input

Affected range<0.36.0
Fixed version0.36.0
CVSS Score4.4
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
EPSS Score0.008%
EPSS Percentile0th percentile
Description

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.