UNCLASSIFIED - NO CUI

Skip to content

chore(findings): adl-ousd/ecc-openlxp/ecc-openlxp-xds

Summary

adl-ousd/ecc-openlxp/ecc-openlxp-xds has 32 new findings discovered during continuous monitoring.

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=adl-ousd/ecc-openlxp/ecc-openlxp-xds&tag=1.0.7&branch=master

EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.

KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.

id source severity package impact workaround epss_score kev
CVE-2025-61783 Twistlock CVE Medium social-auth-app-django-5.4.3 0.00091 false
CVE-2025-11495 Anchore CVE Low binutils-gold-2.35.2-63.el9 0.00020 false
CVE-2025-11495 Anchore CVE Low binutils-2.35.2-63.el9 0.00020 false
CVE-2025-11495 Twistlock CVE Low binutils-2.35.2-63.el9 0.00020 false
CVE-2025-11494 Anchore CVE Low binutils-gold-2.35.2-63.el9 0.00020 false
CVE-2025-11494 Anchore CVE Low binutils-2.35.2-63.el9 0.00020 false
CVE-2025-11494 Twistlock CVE Low binutils-2.35.2-63.el9 0.00020 false
CVE-2025-11414 Anchore CVE Low binutils-gold-2.35.2-63.el9 0.00020 false
CVE-2025-11414 Anchore CVE Low binutils-2.35.2-63.el9 0.00020 false
CVE-2025-11414 Twistlock CVE Low binutils-2.35.2-63.el9 0.00020 false
CVE-2025-11413 Anchore CVE Low binutils-2.35.2-63.el9 0.00020 false
CVE-2025-11413 Anchore CVE Low binutils-gold-2.35.2-63.el9 0.00020 false
CVE-2025-11413 Twistlock CVE Low binutils-2.35.2-63.el9 0.00020 false
CVE-2025-11412 Anchore CVE Low binutils-2.35.2-63.el9 0.00020 false
CVE-2025-11412 Anchore CVE Low binutils-gold-2.35.2-63.el9 0.00020 false
CVE-2025-11412 Twistlock CVE Low binutils-2.35.2-63.el9 0.00020 false
CVE-2025-11083 Twistlock CVE Medium binutils-2.35.2-63.el9 0.00020 false
CVE-2025-11083 Anchore CVE Medium binutils-gold-2.35.2-63.el9 0.00020 false
CVE-2025-11083 Anchore CVE Medium binutils-2.35.2-63.el9 0.00020 false
CVE-2025-11081 Twistlock CVE Medium binutils-2.35.2-63.el9 0.00020 false
CVE-2025-11081 Anchore CVE Medium binutils-gold-2.35.2-63.el9 0.00020 false
CVE-2025-11081 Anchore CVE Medium binutils-2.35.2-63.el9 0.00020 false
CVE-2025-11082 Twistlock CVE Medium binutils-2.35.2-63.el9 0.00018 false
CVE-2025-11082 Anchore CVE Medium binutils-2.35.2-63.el9 0.00018 false
CVE-2025-11082 Anchore CVE Medium binutils-gold-2.35.2-63.el9 0.00018 false
CVE-2025-11840 Twistlock CVE Low binutils-2.35.2-63.el9 0.00013 false
CVE-2025-11840 Anchore CVE Low binutils-2.35.2-63.el9 0.00013 false
CVE-2025-11840 Anchore CVE Low binutils-gold-2.35.2-63.el9 0.00013 false
CVE-2025-11839 Twistlock CVE Low binutils-2.35.2-63.el9 0.00013 false
CVE-2025-11839 Anchore CVE Low binutils-gold-2.35.2-63.el9 0.00013 false
CVE-2025-11839 Anchore CVE Low binutils-2.35.2-63.el9 0.00013 false
GHSA-wv4w-6qv2-qqfg Anchore CVE Medium social-auth-app-django-5.4.3 N/A N/A

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=adl-ousd/ecc-openlxp/ecc-openlxp-xds&tag=1.0.7&branch=master

Tasks

Contributor:

  • Apply the StatusReview label to this issue for a merge request review and wait for feedback

OR

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue for a VAT justifications review and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Review or Verification label will be removed and the issue will be sent back to To-Do. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Review or Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by CHORE_TOKEN
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information