chore(findings): avocado/orchestrator/avocado-vip
Summary
avocado/orchestrator/avocado-vip has 207 new findings discovered during continuous monitoring.
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=avocado/orchestrator/avocado-vip&tag=3.2.18&branch=master
EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.
KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.
id | source | severity | package | impact | workaround | epss_score | kev |
---|---|---|---|---|---|---|---|
CVE-2023-44487 | Twistlock CVE | High | tomcat-embed-core-10.1.5 | 0.94379 | true | ||
CVE-2023-44487 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.94379 | true | ||
CVE-2023-44487 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.94379 | true | ||
CVE-2025-24813 | Anchore CVE | Critical | tomcat-embed-el-10.1.5 | 0.94157 | true | ||
CVE-2025-24813 | Anchore CVE | Critical | tomcat-embed-websocket-10.1.5 | 0.94157 | true | ||
CVE-2025-24813 | Twistlock CVE | Critical | tomcat-embed-core-10.1.5 | 0.94157 | true | ||
CVE-2022-1471 | Twistlock CVE | Critical | org.yaml_snakeyaml-1.33 | 0.93849 | false | ||
CVE-2024-38816 | Twistlock CVE | High | spring-webmvc-6.0.4 | 0.93097 | false | ||
CVE-2024-50379 | Anchore CVE | Critical | tomcat-embed-websocket-10.1.5 | 0.85716 | false | ||
CVE-2024-50379 | Anchore CVE | Critical | tomcat-embed-el-10.1.5 | 0.85716 | false | ||
CVE-2024-50379 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.85716 | false | ||
CVE-2024-38819 | Twistlock CVE | High | spring-webmvc-6.0.4 | 0.64445 | false | ||
CVE-2023-20860 | Twistlock CVE | High | spring-web-6.0.4 | 0.55534 | false | ||
CVE-2023-20860 | Twistlock CVE | High | spring-core-6.0.4 | 0.55534 | false | ||
CVE-2023-20860 | Anchore CVE | High | spring-core-6.0.4 | 0.55534 | false | ||
CVE-2024-22243 | Twistlock CVE | High | spring-web-6.0.4 | 0.48232 | false | ||
CVE-2024-24549 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.42098 | false | ||
CVE-2024-24549 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.42098 | false | ||
CVE-2024-24549 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.42098 | false | ||
CVE-2023-46589 | Twistlock CVE | High | tomcat-embed-core-10.1.5 | 0.37658 | false | ||
CVE-2023-46589 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.37658 | false | ||
CVE-2023-46589 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.37658 | false | ||
CVE-2024-22259 | Twistlock CVE | Low | spring-web-6.0.4 | 0.30512 | false | ||
CVE-2024-22259 | Twistlock CVE | Low | spring-core-6.0.4 | 0.30512 | false | ||
CVE-2024-22259 | Anchore CVE | High | spring-core-6.0.4 | 0.30512 | false | ||
CVE-2024-34750 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.17458 | false | ||
CVE-2024-34750 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.17458 | false | ||
CVE-2024-34750 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.17458 | false | ||
CVE-2023-41080 | Twistlock CVE | Medium | tomcat-embed-core-10.1.5 | 0.10593 | false | ||
CVE-2023-41080 | Anchore CVE | Medium | tomcat-embed-el-10.1.5 | 0.10593 | false | ||
CVE-2023-41080 | Anchore CVE | Medium | tomcat-embed-websocket-10.1.5 | 0.10593 | false | ||
CVE-2024-56337 | Anchore CVE | Critical | tomcat-embed-el-10.1.5 | 0.10366 | false | ||
CVE-2024-56337 | Anchore CVE | Critical | tomcat-embed-websocket-10.1.5 | 0.10366 | false | ||
CVE-2024-56337 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.10366 | false | ||
CVE-2024-22262 | Twistlock CVE | High | spring-web-6.0.4 | 0.04703 | false | ||
CVE-2024-54677 | Anchore CVE | Medium | tomcat-embed-el-10.1.5 | 0.03412 | false | ||
CVE-2024-54677 | Anchore CVE | Medium | tomcat-embed-websocket-10.1.5 | 0.03412 | false | ||
CVE-2024-54677 | Anchore CVE | Medium | tomcat-embed-core-10.1.5 | 0.03412 | false | ||
CVE-2024-54677 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.03412 | false | ||
CVE-2023-21939 | Twistlock CVE | Low | java-17.0.5 | 0.01490 | false | ||
CVE-2023-21939 | Anchore CVE | Medium | jdk-17.0.5 | 0.01490 | false | ||
CVE-2024-38286 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.01287 | false | ||
CVE-2024-38286 | Anchore CVE | High | tomcat-embed-core-10.1.5 | 0.01287 | false | ||
CVE-2024-38286 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.01287 | false | ||
CVE-2024-38286 | Twistlock CVE | High | tomcat-embed-core-10.1.5 | 0.01287 | false | ||
CVE-2023-20863 | Twistlock CVE | High | spring-expression-6.0.4 | 0.00756 | false | ||
CVE-2023-20863 | Twistlock CVE | Medium | spring-core-6.0.4 | 0.00756 | false | ||
CVE-2023-20863 | Twistlock CVE | Medium | spring-web-6.0.4 | 0.00756 | false | ||
CVE-2023-20863 | Anchore CVE | Medium | spring-core-6.0.4 | 0.00756 | false | ||
CVE-2024-21147 | Anchore CVE | High | jdk-17.0.5 | 0.00721 | false | ||
CVE-2023-34053 | Twistlock CVE | High | spring-webmvc-6.0.4 | 0.00625 | false | ||
CVE-2023-34053 | Twistlock CVE | High | spring-web-6.0.4 | 0.00625 | false | ||
CVE-2023-34053 | Twistlock CVE | High | spring-core-6.0.4 | 0.00625 | false | ||
CVE-2023-34053 | Anchore CVE | High | spring-core-6.0.4 | 0.00625 | false | ||
CVE-2024-52316 | Anchore CVE | Critical | tomcat-embed-el-10.1.5 | 0.00614 | false | ||
CVE-2024-52316 | Anchore CVE | Critical | tomcat-embed-core-10.1.5 | 0.00614 | false | ||
CVE-2024-52316 | Anchore CVE | Critical | tomcat-embed-websocket-10.1.5 | 0.00614 | false | ||
CVE-2024-52316 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.00614 | false | ||
CVE-2023-7272 | Twistlock CVE | Critical | org.eclipse.parsson_parsson-1.0.0 | 0.00566 | false | ||
CVE-2023-45648 | Twistlock CVE | Medium | tomcat-embed-core-10.1.5 | 0.00511 | false | ||
CVE-2023-45648 | Anchore CVE | Medium | tomcat-embed-el-10.1.5 | 0.00511 | false | ||
CVE-2023-45648 | Anchore CVE | Medium | tomcat-embed-websocket-10.1.5 | 0.00511 | false | ||
CVE-2024-23672 | Twistlock CVE | Medium | tomcat-embed-websocket-10.1.5 | 0.00464 | false | ||
CVE-2024-23672 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.00464 | false | ||
CVE-2024-23672 | Anchore CVE | Medium | tomcat-embed-core-10.1.5 | 0.00464 | false | ||
CVE-2024-23672 | Anchore CVE | Medium | tomcat-embed-el-10.1.5 | 0.00464 | false | ||
CVE-2024-21217 | Anchore CVE | Low | jdk-17.0.5 | 0.00425 | false | ||
CVE-2024-21140 | Anchore CVE | Medium | jdk-17.0.5 | 0.00419 | false | ||
CVE-2023-20883 | Twistlock CVE | High | spring-boot-autoconfigure-3.0.2 | 0.00409 | false | ||
CVE-2024-21068 | Anchore CVE | Low | jdk-17.0.5 | 0.00398 | false | ||
CVE-2023-20861 | Twistlock CVE | Medium | spring-expression-6.0.4 | 0.00373 | false | ||
CVE-2023-20861 | Twistlock CVE | Medium | spring-core-6.0.4 | 0.00373 | false | ||
CVE-2023-20861 | Twistlock CVE | Medium | spring-web-6.0.4 | 0.00373 | false | ||
CVE-2023-20861 | Anchore CVE | Medium | spring-core-6.0.4 | 0.00373 | false | ||
CVE-2024-20952 | Anchore CVE | High | jdk-17.0.5 | 0.00347 | false | ||
CVE-2024-20952 | Twistlock CVE | High | java-17.0.5 | 0.00347 | false | ||
CVE-2024-21145 | Anchore CVE | Medium | jdk-17.0.5 | 0.00331 | false | ||
CVE-2024-21131 | Anchore CVE | Low | jdk-17.0.5 | 0.00326 | false | ||
CVE-2023-42795 | Twistlock CVE | Medium | tomcat-embed-core-10.1.5 | 0.00312 | false | ||
CVE-2023-42795 | Anchore CVE | Medium | tomcat-embed-websocket-10.1.5 | 0.00312 | false | ||
CVE-2023-42795 | Anchore CVE | Medium | tomcat-embed-el-10.1.5 | 0.00312 | false | ||
CVE-2024-21094 | Anchore CVE | Low | jdk-17.0.5 | 0.00307 | false | ||
CVE-2024-21235 | Anchore CVE | Medium | jdk-17.0.5 | 0.00304 | false | ||
CVE-2024-20918 | Anchore CVE | High | jdk-17.0.5 | 0.00255 | false | ||
CVE-2024-21011 | Anchore CVE | Low | jdk-17.0.5 | 0.00250 | false | ||
CVE-2024-38809 | Twistlock CVE | Medium | spring-web-6.0.4 | 0.00244 | false | ||
CVE-2024-21208 | Anchore CVE | Low | jdk-17.0.5 | 0.00212 | false | ||
CVE-2024-20921 | Anchore CVE | Medium | jdk-17.0.5 | 0.00199 | false | ||
CVE-2023-28708 | Twistlock CVE | Medium | tomcat-embed-core-10.1.5 | 0.00183 | false | ||
CVE-2023-28708 | Anchore CVE | Medium | tomcat-embed-websocket-10.1.5 | 0.00183 | false | ||
CVE-2023-28708 | Anchore CVE | Medium | tomcat-embed-core-10.1.5 | 0.00183 | false | ||
CVE-2023-28708 | Anchore CVE | Medium | tomcat-embed-el-10.1.5 | 0.00183 | false | ||
CVE-2025-53506 | Anchore CVE | High | tomcat-embed-core-10.1.5 | 0.00182 | false | ||
CVE-2025-53506 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.00182 | false | ||
CVE-2025-53506 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.00182 | false | ||
CVE-2025-53506 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.00182 | false | ||
CVE-2025-48989 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.00177 | false | ||
CVE-2025-48989 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.00177 | false | ||
CVE-2025-48989 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.00177 | false | ||
CVE-2025-50106 | Anchore CVE | High | jdk-17.0.5 | 0.00174 | false | ||
CVE-2025-30749 | Anchore CVE | High | jdk-17.0.5 | 0.00174 | false | ||
CVE-2024-21138 | Anchore CVE | Low | jdk-17.0.5 | 0.00170 | false | ||
CVE-2023-22044 | Anchore CVE | Low | jdk-17.0.5 | 0.00156 | false | ||
CVE-2025-52520 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.00153 | false | ||
CVE-2025-52520 | Anchore CVE | High | tomcat-embed-core-10.1.5 | 0.00153 | false | ||
CVE-2025-52520 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.00153 | false | ||
CVE-2025-52520 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.00153 | false | ||
CVE-2024-20919 | Anchore CVE | Medium | jdk-17.0.5 | 0.00141 | false | ||
CVE-2023-22025 | Anchore CVE | Low | jdk-17.0.5 | 0.00140 | false | ||
CVE-2023-21930 | Twistlock CVE | Low | java-17.0.5 | 0.00134 | false | ||
CVE-2023-21930 | Anchore CVE | High | jdk-17.0.5 | 0.00134 | false | ||
CVE-2024-20932 | Anchore CVE | High | jdk-17.0.5 | 0.00126 | false | ||
CVE-2023-22045 | Anchore CVE | Low | jdk-17.0.5 | 0.00123 | false | ||
CVE-2023-22006 | Anchore CVE | Low | jdk-17.0.5 | 0.00123 | false | ||
CVE-2024-21210 | Anchore CVE | Low | jdk-17.0.5 | 0.00109 | false | ||
CVE-2024-21012 | Anchore CVE | Low | jdk-17.0.5 | 0.00099 | false | ||
CVE-2023-21938 | Twistlock CVE | Low | java-17.0.5 | 0.00095 | false | ||
CVE-2023-21938 | Anchore CVE | Low | jdk-17.0.5 | 0.00095 | false | ||
CVE-2023-21937 | Twistlock CVE | Low | java-17.0.5 | 0.00095 | false | ||
CVE-2023-21937 | Anchore CVE | Low | jdk-17.0.5 | 0.00095 | false | ||
CVE-2023-21830 | Twistlock CVE | Low | java-17.0.5 | 0.00089 | false | ||
CVE-2023-21968 | Twistlock CVE | Low | java-17.0.5 | 0.00086 | false | ||
CVE-2023-21968 | Anchore CVE | Low | jdk-17.0.5 | 0.00086 | false | ||
CVE-2023-21843 | Twistlock CVE | Low | java-17.0.5 | 0.00086 | false | ||
CVE-2025-21587 | Anchore CVE | High | jdk-17.0.5 | 0.00085 | false | ||
CVE-2023-22049 | Anchore CVE | Low | jdk-17.0.5 | 0.00083 | false | ||
CVE-2025-30698 | Anchore CVE | Medium | jdk-17.0.5 | 0.00082 | false | ||
CVE-2023-21967 | Twistlock CVE | Low | java-17.0.5 | 0.00076 | false | ||
CVE-2023-21967 | Anchore CVE | Medium | jdk-17.0.5 | 0.00076 | false | ||
CVE-2023-28709 | Twistlock CVE | High | tomcat-embed-core-10.1.5 | 0.00075 | false | ||
CVE-2023-28709 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.00075 | false | ||
CVE-2023-28709 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.00075 | false | ||
CVE-2025-52999 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-core-2.14.1 | 0.00072 | false | ||
CVE-2024-38820 | Twistlock CVE | Medium | spring-web-6.0.4 | 0.00070 | false | ||
CVE-2024-38820 | Twistlock CVE | Medium | spring-core-6.0.4 | 0.00070 | false | ||
CVE-2024-38820 | Twistlock CVE | Medium | spring-context-6.0.4 | 0.00070 | false | ||
CVE-2024-38820 | Anchore CVE | Medium | spring-core-6.0.4 | 0.00070 | false | ||
CVE-2023-22081 | Anchore CVE | Medium | jdk-17.0.5 | 0.00067 | false | ||
CVE-2025-22233 | Twistlock CVE | Low | spring-context-6.0.4 | 0.00063 | false | ||
CVE-2024-20945 | Anchore CVE | Medium | jdk-17.0.5 | 0.00059 | false | ||
CVE-2023-22036 | Anchore CVE | Low | jdk-17.0.5 | 0.00059 | false | ||
CVE-2023-22041 | Anchore CVE | Medium | jdk-17.0.5 | 0.00058 | false | ||
CVE-2025-49125 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.00055 | false | ||
CVE-2025-49125 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.00055 | false | ||
CVE-2025-49125 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.00055 | false | ||
CVE-2023-25193 | Anchore CVE | High | jdk-17.0.5 | 0.00055 | false | ||
CVE-2025-50059 | Anchore CVE | High | jdk-17.0.5 | 0.00054 | false | ||
CVE-2023-21954 | Twistlock CVE | Low | java-17.0.5 | 0.00053 | false | ||
CVE-2023-21954 | Anchore CVE | Medium | jdk-17.0.5 | 0.00053 | false | ||
CVE-2025-48988 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.00052 | false | ||
CVE-2025-48988 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.00052 | false | ||
CVE-2025-48988 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.00052 | false | ||
CVE-2025-31651 | Anchore CVE | Critical | tomcat-embed-core-10.1.5 | 0.00051 | false | ||
CVE-2025-31651 | Anchore CVE | Critical | tomcat-embed-websocket-10.1.5 | 0.00051 | false | ||
CVE-2025-31651 | Anchore CVE | Critical | tomcat-embed-el-10.1.5 | 0.00051 | false | ||
CVE-2025-31651 | Twistlock CVE | Critical | tomcat-embed-core-10.1.5 | 0.00051 | false | ||
CVE-2025-41242 | Twistlock CVE | Medium | spring-webmvc-6.0.4 | 0.00048 | false | ||
CVE-2023-4043 | Anchore CVE | High | parsson-1.0.0 | 0.00044 | false | ||
CVE-2023-21835 | Twistlock CVE | Low | java-17.0.5 | 0.00041 | false | ||
CVE-2025-30754 | Anchore CVE | Medium | jdk-17.0.5 | 0.00036 | false | ||
CVE-2025-46701 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.00030 | false | ||
CVE-2025-46701 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.00030 | false | ||
CVE-2025-46701 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.00030 | false | ||
CVE-2025-21502 | Anchore CVE | Medium | jdk-17.0.5 | 0.00024 | false | ||
CVE-2025-49124 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.00016 | false | ||
CVE-2025-49124 | Anchore CVE | High | tomcat-embed-core-10.1.5 | 0.00016 | false | ||
CVE-2025-49124 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.00016 | false | ||
CVE-2025-49124 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.00016 | false | ||
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.14.1 | 0.00015 | false | ||
CVE-2025-55668 | Anchore CVE | Medium | tomcat-embed-core-10.1.5 | 0.00012 | false | ||
CVE-2025-55668 | Anchore CVE | Medium | tomcat-embed-websocket-10.1.5 | 0.00012 | false | ||
CVE-2025-55668 | Anchore CVE | Medium | tomcat-embed-el-10.1.5 | 0.00012 | false | ||
CVE-2025-55668 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.00012 | false | ||
PRISMA-2023-0067 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-core-2.14.1 | N/A | N/A | ||
GHSA-xf96-w227-r7c4 | Anchore CVE | High | spring-boot-autoconfigure-3.0.2 | N/A | N/A | ||
GHSA-wxqc-pxw9-g2p8 | Anchore CVE | High | spring-expression-6.0.4 | N/A | N/A | ||
GHSA-wm9w-rjj3-j356 | Anchore CVE | High | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-wc4r-xq3c-5cf3 | Anchore CVE | Medium | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-v94h-hvhg-mf9h | Anchore CVE | High | spring-webmvc-6.0.4 | N/A | N/A | ||
GHSA-v682-8vv8-vpwr | Anchore CVE | Medium | tomcat-embed-websocket-10.1.5 | N/A | N/A | ||
GHSA-r936-gwx5-v52f | Anchore CVE | Medium | spring-webmvc-6.0.4 | N/A | N/A | ||
GHSA-r6j3-px5g-cq3x | Anchore CVE | Medium | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-qppj-fm5r-hxr3 | Anchore CVE | Medium | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-q3mw-pvr8-9ggc | Anchore CVE | Medium | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-mjmj-j48q-9wg2 | Anchore CVE | High | snakeyaml-1.33 | N/A | N/A | ||
GHSA-hgjh-9rj2-g67j | Anchore CVE | High | spring-web-6.0.4 | N/A | N/A | ||
GHSA-h46c-h94j-95f3 | Anchore CVE | High | jackson-core-2.14.1 | N/A | N/A | ||
GHSA-h3gc-qfqq-6h8f | Anchore CVE | High | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-h2fw-rfh5-95r3 | Anchore CVE | Low | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-gqp3-2cvr-x8m3 | Anchore CVE | High | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-g8pj-r55q-5c2v | Anchore CVE | Medium | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-g5vr-rgqm-vf78 | Anchore CVE | High | spring-webmvc-6.0.4 | N/A | N/A | ||
GHSA-fccv-jmmp-qg76 | Anchore CVE | High | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-cx7f-g6mp-7hqm | Anchore CVE | High | spring-webmvc-6.0.4 | N/A | N/A | ||
GHSA-cx6h-86xw-9x34 | Anchore CVE | High | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-ccgv-vj62-xf9h | Anchore CVE | High | spring-web-6.0.4 | N/A | N/A | ||
GHSA-83qj-6fr2-vhqg | Anchore CVE | Critical | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-7w75-32cg-r6g2 | Anchore CVE | Medium | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-5j33-cvvr-w245 | Anchore CVE | High | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-564r-hj7v-mcr5 | Anchore CVE | Medium | spring-expression-6.0.4 | N/A | N/A | ||
GHSA-4wp7-92pw-q264 | Anchore CVE | Low | spring-context-6.0.4 | N/A | N/A | ||
GHSA-4gc7-5j7h-4qph | Anchore CVE | Medium | spring-context-6.0.4 | N/A | N/A | ||
GHSA-4gc7-5j7h-4qph | Anchore CVE | Medium | spring-web-6.0.4 | N/A | N/A | ||
GHSA-2wrp-6fg6-hmc5 | Anchore CVE | High | spring-web-6.0.4 | N/A | N/A | ||
GHSA-2rwm-xv5j-777p | Anchore CVE | Critical | parsson-1.0.0 | N/A | N/A | ||
GHSA-2rmj-mq67-h97g | Anchore CVE | Medium | spring-web-6.0.4 | N/A | N/A | ||
GHSA-27hp-xhwr-wr2m | Anchore CVE | High | tomcat-embed-core-10.1.5 | N/A | N/A |
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=avocado/orchestrator/avocado-vip&tag=3.2.18&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.