chore(findings): cloudfit/cfs/cfs-api
Summary
cloudfit/cfs/cfs-api has 52 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
GHSA-whph-446h-6m9v | Anchore CVE | Medium | Microsoft.Rest.ClientRuntime-2.3.20 |
GHSA-6qmf-mmc7-6c2p | Anchore CVE | High | NuGet.Protocol-5.11.0.10 |
GHSA-g3q9-xf95-8hp5 | Anchore CVE | High | NuGet.Protocol-5.11.0.10 |
GHSA-cmhx-cq75-c4mj | Anchore CVE | High | System.Text.RegularExpressions-4.3.0 |
GHSA-555c-2p6r-68mm | Anchore CVE | High | System.Security.Cryptography.Pkcs-6.0.1 |
GHSA-98g6-xh36-x2p7 | Anchore CVE | High | Microsoft.Data.SqlClient-3.0.1+b86b61bf676163639795b163d8d753b20aad6207 |
GHSA-555c-2p6r-68mm | Anchore CVE | High | System.Security.Cryptography.Pkcs-6.0.1 |
GHSA-xhfc-gr8f-ffwc | Anchore CVE | High | System.Private.Uri-4.3.0 |
GHSA-x5qj-9vmx-7g6g | Anchore CVE | Medium | System.Private.Uri-4.3.0 |
CVE-2024-0948 | Anchore CVE | Medium | NetBox-2.5.3 |
GHSA-g3q9-xf95-8hp5 | Anchore CVE | High | NuGet.Protocol-5.11.0 |
CVE-2024-0948 | Anchore CVE | Medium | NetBox-2.5.3 |
GHSA-xhfc-gr8f-ffwc | Anchore CVE | High | System.Private.Uri-4.3.0 |
GHSA-5f2m-466j-3848 | Anchore CVE | High | System.Private.Uri-4.3.0 |
GHSA-98g6-xh36-x2p7 | Anchore CVE | High | System.Data.SqlClient-4.5.1 |
GHSA-x5qj-9vmx-7g6g | Anchore CVE | Medium | System.Private.Uri-4.3.0 |
GHSA-rxg9-xrhp-64gj | Anchore CVE | Critical | System.Drawing.Common-4.7.0 |
CVE-2019-25011 | Anchore CVE | Medium | NetBox-2.5.3 |
GHSA-6qmf-mmc7-6c2p | Anchore CVE | High | NuGet.Common-6.2.1.2 |
GHSA-8g2p-5pqh-5jmc | Anchore CVE | Medium | System.Data.SqlClient-4.6.26606.05 |
GHSA-6qmf-mmc7-6c2p | Anchore CVE | High | NuGet.Common-6.2.1 |
GHSA-98g6-xh36-x2p7 | Anchore CVE | High | Microsoft.Data.SqlClient-2.1.4+7ea7e630ac26dee3a9ceb4e322637a05a47e4854 |
GHSA-x9vc-6hfv-hg8c | Anchore CVE | High | Npgsql-6.0.1.0 |
GHSA-8g2p-5pqh-5jmc | Anchore CVE | Medium | System.Data.SqlClient-4.5.1 |
CVE-2019-25011 | Anchore CVE | Medium | NetBox-2.5.3 |
GHSA-98g6-xh36-x2p7 | Anchore CVE | High | Microsoft.Data.SqlClient-2.1.4 |
GHSA-6qmf-mmc7-6c2p | Anchore CVE | High | NuGet.Protocol-5.11.0 |
GHSA-98g6-xh36-x2p7 | Anchore CVE | High | System.Data.SqlClient-4.6.26606.05 |
GHSA-3fx3-85r4-8j3w | Anchore CVE | Medium | Microsoft.AspNetCore.Components-6.0.16 |
GHSA-x9vc-6hfv-hg8c | Anchore CVE | High | Npgsql-6.0.1 |
GHSA-5f2m-466j-3848 | Anchore CVE | High | System.Private.Uri-4.3.0 |
GHSA-98g6-xh36-x2p7 | Anchore CVE | High | Microsoft.Data.SqlClient-3.0.1 |
CVE-2021-24112 | Twistlock CVE | Critical | system.drawing.common-4.7.0 |
CVE-2024-0056 | Twistlock CVE | High | system.data.sqlclient-4.5.1 |
CVE-2024-0056 | Twistlock CVE | High | microsoft.data.sqlclient-2.1.4 |
CVE-2024-0056 | Twistlock CVE | High | microsoft.data.sqlclient-3.0.1 |
CVE-2024-32655 | Twistlock CVE | High | npgsql-6.0.1 |
CVE-2022-41032 | Twistlock CVE | High | nuget.protocol-5.11.0 |
CVE-2023-29331 | Twistlock CVE | High | system.security.cryptography.pkcs-6.0.1 |
CVE-2023-29331 | Twistlock CVE | High | system.security.cryptography.pkcs-6.0.1 |
CVE-2019-0981 | Twistlock CVE | High | system.private.uri-4.3.0 |
CVE-2019-0981 | Twistlock CVE | High | system.private.uri-4.3.0 |
CVE-2019-0980 | Twistlock CVE | High | system.private.uri-4.3.0 |
CVE-2019-0980 | Twistlock CVE | High | system.private.uri-4.3.0 |
CVE-2019-0820 | Twistlock CVE | High | system.text.regularexpressions-4.3.0 |
CVE-2023-29337 | Twistlock CVE | High | nuget.common-6.2.1 |
CVE-2023-29337 | Twistlock CVE | High | nuget.protocol-5.11.0 |
CVE-2023-36558 | Twistlock CVE | Medium | microsoft.aspnetcore.components-6.0.16 |
CVE-2019-0657 | Twistlock CVE | Medium | system.private.uri-4.3.0 |
CVE-2019-0657 | Twistlock CVE | Medium | system.private.uri-4.3.0 |
CVE-2022-41064 | Twistlock CVE | Medium | system.data.sqlclient-4.5.1 |
CVE-2022-26907 | Twistlock CVE | Medium | microsoft.rest.clientruntime-2.3.20 |
VAT: https://vat.dso.mil/vat/image?imageName=cloudfit/cfs/cfs-api&tag=2024.05.14.12&branch=master
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=cloudfit/cfs/cfs-api&tag=2024.02.27.4&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.