404

[ Avaa Bypassed ]




Upload:

Command:

botdev@3.149.253.148: ~ $
**To describe the scan findings for an image**

The following ``describe-image-scan-findings`` example returns the image scan findings for an image using the image digest in the specified repository in the default registry for an account. ::

    aws ecr describe-image-scan-findings \
        --repository-name sample-repo \
        --image-id imageDigest=sha256:74b2c688c700ec95a93e478cdb959737c148df3fbf5ea706abe0318726e885e6

Output::

    {
        "imageScanFindings": {
          "findings": [
              {
                  "name": "CVE-2019-5188",
                  "description": "A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.",
                  "uri": "http://people.ubuntu.com/~ubuntu-security/cve/CVE-2019-5188",
                  "severity": "MEDIUM",
                  "attributes": [
                      {
                          "key": "package_version",
                          "value": "1.44.1-1ubuntu1.1"
                      },
                      {
                          "key": "package_name",
                          "value": "e2fsprogs"
                      },
                      {
                          "key": "CVSS2_VECTOR",
                          "value": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
                      },
                      {
                          "key": "CVSS2_SCORE",
                          "value": "4.6"
                      }
                  ]
              }
          ],
          "imageScanCompletedAt": 1579839105.0,
          "vulnerabilitySourceUpdatedAt": 1579811117.0,
          "findingSeverityCounts": {
              "MEDIUM": 1
          }
      },
      "registryId": "123456789012",
      "repositoryName": "sample-repo",
      "imageId": {
          "imageDigest": "sha256:74b2c688c700ec95a93e478cdb959737c148df3fbf5ea706abe0318726e885e6"
      },
      "imageScanStatus": {
          "status": "COMPLETE",
          "description": "The scan was completed successfully."
      }
    }

For more information, see `Image Scanning <https://docs.aws.amazon.com/AmazonECR/latest/userguide/image-scanning.html>`__ in the *Amazon ECR User Guide*.

Filemanager

Name Type Size Permission Actions
batch-check-layer-availability.rst File 836 B 0644
batch-delete-image.rst File 1.29 KB 0644
batch-get-image.rst File 3.1 KB 0644
complete-layer-upload.rst File 664 B 0644
create-repository.rst File 2.25 KB 0644
delete-lifecycle-policy.rst File 647 B 0644
delete-repository-policy.rst File 675 B 0644
delete-repository.rst File 702 B 0644
describe-image-scan-findings.rst File 2.32 KB 0644
describe-images.rst File 767 B 0644
describe-repositories.rst File 612 B 0644
get-authorization-token.rst File 491 B 0644
get-download-url-for-layer.rst File 1 KB 0644
get-lifecycle-policy-preview.rst File 1.22 KB 0644
get-lifecycle-policy.rst File 888 B 0644
get-login-password.rst File 894 B 0644
get-login-password_description.rst File 914 B 0644
get-login_description.rst File 1.06 KB 0644
get-repository-policy.rst File 686 B 0644
initiate-layer-upload.rst File 344 B 0644
list-images.rst File 798 B 0644
list-tags-for-resource.rst File 433 B 0644
put-image-scanning-configuration.rst File 672 B 0644
put-image-tag-mutability.rst File 686 B 0644
put-image.rst File 6.26 KB 0644
put-lifecycle-policy.rst File 1.35 KB 0644
set-repository-policy.rst File 1.16 KB 0644
start-image-scan.rst File 810 B 0644
start-lifecycle-policy-preview.rst File 1.45 KB 0644
tag-resource.rst File 334 B 0644
untag-resource.rst File 319 B 0644
upload-layer-part.rst File 680 B 0644