Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6gxw-85q2-q646 | Grype has a credential disclosure vulnerability in its JSON output |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 27 Nov 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anchore
Anchore grype |
|
| Vendors & Products |
Anchore
Anchore grype |
Tue, 25 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 25 Nov 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Grype is a vulnerability scanner for container images and filesystems. A credential disclosure vulnerability was found in Grype, affecting versions 0.68.0 through 0.104.0. If registry credentials are defined and the output of grype is written using the --file or --output json=<file> option, the registry credentials will be included unsanitized in the output file. This issue has been patched in version 0.104.1. Users running affected versions of grype can work around this vulnerability by redirecting stdout to a file instead of using the --file or --output options. | |
| Title | Grype has a credential disclosure vulnerability in Grype JSON output | |
| Weaknesses | CWE-212 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-25T20:08:48.709Z
Reserved: 2025-11-18T16:14:56.694Z
Link: CVE-2025-65965
Updated: 2025-11-25T20:08:45.795Z
Status : Awaiting Analysis
Published: 2025-11-25T20:16:00.453
Modified: 2025-11-25T22:16:16.690
Link: CVE-2025-65965
No data.
OpenCVE Enrichment
Updated: 2025-11-27T09:45:47Z
Github GHSA