chore(findings): ccj2-a3im/datahub/datahub-frontend-react
Summary
ccj2-a3im/datahub/datahub-frontend-react has 30 new findings discovered during continuous monitoring.
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=ccj2-a3im/datahub/datahub-frontend-react&tag=1.0.0&branch=master
EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.
KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.
id | source | severity | package | impact | workaround | epss_score | kev |
---|---|---|---|---|---|---|---|
CVE-2021-26291 | Anchore CVE | Critical | maven-artifact-3.6.3 | 0.45481 | false | ||
CVE-2023-28115 | Twistlock CVE | Critical | snappy-1.2.2-r0 | 0.19850 | false | ||
CVE-2023-41330 | Twistlock CVE | Critical | snappy-1.2.2-r0 | 0.01021 | false | ||
CVE-2012-5783 | Anchore CVE | Medium | commons-httpclient-commons-httpclient-3.1 | 0.00557 | false | ||
CVE-2020-13956 | Anchore CVE | Medium | commons-httpclient-commons-httpclient-3.1 | 0.00505 | false | ||
CVE-2025-48924 | Twistlock CVE | Medium | commons-lang_commons-lang-2.6 | 0.00309 | false | ||
CVE-2025-48924 | Twistlock CVE | Medium | org.apache.commons_commons-lang3-3.17.0 | 0.00309 | false | ||
CVE-2025-48924 | Twistlock CVE | Medium | org.apache.commons_commons-lang3-3.12.0 | 0.00309 | false | ||
CVE-2024-36124 | Twistlock CVE | Medium | org.iq80.snappy_snappy-0.4 | 0.00180 | false | ||
CVE-2024-12798 | Twistlock CVE | Medium | ch.qos.logback_logback-core-1.4.14 | 0.00175 | false | ||
CVE-2024-43126 | Anchore CVE | High | opentelemetry-opentelemetry-exporter-sender-okhttp-1.45.0 | 0.00141 | false | ||
CVE-2025-1948 | Anchore CVE | High | jetty-http-12.0.16 | 0.00059 | false | ||
CVE-2025-1948 | Anchore CVE | High | jetty-util-12.0.16 | 0.00059 | false | ||
CVE-2025-1948 | Anchore CVE | High | jetty-io-12.0.16 | 0.00059 | false | ||
CVE-2025-1948 | Anchore CVE | High | jetty-server-12.0.16 | 0.00059 | false | ||
CVE-2025-1948 | Anchore CVE | High | jetty-security-12.0.16 | 0.00059 | false | ||
CVE-2025-1948 | Twistlock CVE | Low | org.eclipse.jetty_jetty-io-12.0.16 | 0.00059 | false | ||
CVE-2025-48734 | Twistlock CVE | Low | commons-beanutils_commons-beanutils-1.9.4 | 0.00056 | false | ||
CVE-2025-55163 | Twistlock CVE | High | io.netty_netty-codec-http2-4.1.118.Final | 0.00055 | false | ||
CVE-2024-39657 | Anchore CVE | High | opentelemetry-opentelemetry-exporter-sender-okhttp-1.45.0 | 0.00048 | false | ||
CVE-2024-12801 | Twistlock CVE | Low | ch.qos.logback_logback-core-1.4.14 | 0.00046 | false | ||
d33cd1c56d51b8a0593f5ec64f2fc68e | Anchore Compliance | Critical | N/A | N/A | |||
GHSA-wxr5-93ph-8wr9 | Anchore CVE | High | commons-beanutils-1.9.4 | N/A | N/A | ||
GHSA-prj3-ccx8-p6x4 | Anchore CVE | High | netty-codec-http2-4.1.118.Final | N/A | N/A | ||
GHSA-pr98-23f8-jwxv | Anchore CVE | Medium | logback-core-1.4.14 | N/A | N/A | ||
GHSA-j288-q9x7-2f5v | Anchore CVE | Medium | commons-lang3-3.12.0 | N/A | N/A | ||
GHSA-j288-q9x7-2f5v | Anchore CVE | Medium | commons-lang-2.6 | N/A | N/A | ||
GHSA-j288-q9x7-2f5v | Anchore CVE | Medium | commons-lang3-3.17.0 | N/A | N/A | ||
GHSA-8wh2-6qhj-h7j9 | Anchore CVE | Medium | snappy-0.4 | N/A | N/A | ||
GHSA-6v67-2wr5-gvf4 | Anchore CVE | Low | logback-core-1.4.14 | N/A | N/A |
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=ccj2-a3im/datahub/datahub-frontend-react&tag=1.0.0&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.