chore(findings): cypress/included
Summary
cypress/included has 296 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
CVE-2023-0645 | Twistlock CVE | Low | jpeg-xl-0.7.0-10 |
CVE-2022-33065 | Twistlock CVE | Low | libsndfile-1.2.0-1 |
CVE-2022-33064 | Twistlock CVE | Low | libsndfile-1.2.0-1 |
CVE-2021-3575 | Twistlock CVE | Low | openjpeg2-2.5.0-2 |
CVE-2023-52355 | Twistlock CVE | Low | tiff-4.5.0-6+deb12u1 |
CVE-2023-41105 | Twistlock CVE | Low | python3.11-3.11.2-6 |
CVE-2023-39616 | Twistlock CVE | Low | aom-3.6.0-1 |
CVE-2023-35790 | Twistlock CVE | Low | jpeg-xl-0.7.0-10 |
CVE-2023-25193 | Twistlock CVE | Low | harfbuzz-6.0.0+dfsg-3 |
CVE-2023-24329 | Twistlock CVE | Low | python3.11-3.11.2-6 |
CVE-2022-4055 | Twistlock CVE | Low | xdg-utils-1.1.3-4.1 |
CVE-2023-7104 | Twistlock CVE | Low | sqlite3-3.40.1-2 |
CVE-2023-6277 | Twistlock CVE | Low | tiff-4.5.0-6+deb12u1 |
CVE-2023-38858 | Twistlock CVE | Low | faad2-2.10.1-1 |
CVE-2023-3618 | Twistlock CVE | Low | tiff-4.5.0-6+deb12u1 |
CVE-2023-3316 | Twistlock CVE | Low | tiff-4.5.0-6+deb12u1 |
CVE-2020-27748 | Twistlock CVE | Low | xdg-utils-1.1.3-4.1 |
CVE-2021-31879 | Twistlock CVE | Low | wget-1.21.3-1 |
CVE-2023-38857 | Twistlock CVE | Low | faad2-2.10.1-1 |
CVE-2023-38473 | Twistlock CVE | Low | avahi-0.8-10 |
CVE-2023-38472 | Twistlock CVE | Low | avahi-0.8-10 |
CVE-2023-38471 | Twistlock CVE | Low | avahi-0.8-10 |
CVE-2023-38470 | Twistlock CVE | Low | avahi-0.8-10 |
CVE-2023-38469 | Twistlock CVE | Low | avahi-0.8-10 |
CVE-2023-35789 | Twistlock CVE | Low | librabbitmq-0.11.0-1 |
CVE-2023-2908 | Twistlock CVE | Low | tiff-4.5.0-6+deb12u1 |
CVE-2023-26966 | Twistlock CVE | Low | tiff-4.5.0-6+deb12u1 |
CVE-2023-26965 | Twistlock CVE | Low | tiff-4.5.0-6+deb12u1 |
CVE-2023-27043 | Twistlock CVE | Low | python3.11-3.11.2-6 |
CVE-2018-14628 | Twistlock CVE | Low | samba-2:4.17.12+dfsg-0+deb12u1 |
CVE-2024-28755 | Twistlock CVE | Low | mbedtls-2.28.3-1 |
CVE-2024-25062 | Twistlock CVE | Low | libxml2-2.9.14+dfsg-1.3~deb12u1 |
CVE-2023-5388 | Twistlock CVE | Low | nss-2:3.87.1-1 |
CVE-2023-49528 | Twistlock CVE | Low | ffmpeg-7:5.1.4-0+deb12u1 |
CVE-2023-51794 | Anchore CVE | Low | libavutil57-7:5.1.4-0+deb12u1 |
CVE-2024-23744 | Anchore CVE | High | libmbedcrypto7-2.28.3-1 |
CVE-2023-50010 | Anchore CVE | Low | libswscale6-7:5.1.4-0+deb12u1 |
CVE-2024-31585 | Anchore CVE | Low | libswresample4-7:5.1.4-0+deb12u1 |
CVE-2024-31582 | Anchore CVE | Low | libavutil57-7:5.1.4-0+deb12u1 |
CVE-2023-2908 | Anchore CVE | Medium | libtiffxx6-4.5.0-6+deb12u1 |
CVE-2023-50010 | Anchore CVE | Low | libpostproc56-7:5.1.4-0+deb12u1 |
CVE-2023-38469 | Anchore CVE | Medium | libavahi-client3-0.8-10 |
CVE-2023-38473 | Anchore CVE | Medium | libavahi-common3-0.8-10 |
CVE-2023-50007 | Anchore CVE | Low | libswresample4-7:5.1.4-0+deb12u1 |
CVE-2023-50009 | Anchore CVE | Low | libswscale6-7:5.1.4-0+deb12u1 |
CVE-2024-31578 | Anchore CVE | Low | libavutil57-7:5.1.4-0+deb12u1 |
CVE-2023-51796 | Anchore CVE | Low | libswresample4-7:5.1.4-0+deb12u1 |
CVE-2023-50010 | Anchore CVE | Low | libavcodec59-7:5.1.4-0+deb12u1 |
CVE-2023-51793 | Anchore CVE | Low | libavutil57-7:5.1.4-0+deb12u1 |
CVE-2024-26462 | Anchore CVE | Low | libkrb5support0-1.20.1-2+deb12u1 |
CVE-2018-18064 | Anchore CVE | Low | libcairo2-1.16.0-7 |
CVE-2024-2398 | Anchore CVE | Low | libcurl3-gnutls-7.88.1-10+deb12u5 |
CVE-2023-24329 | Anchore CVE | High | python3.11-minimal-3.11.2-6 |
CVE-2024-31581 | Anchore CVE | Low | libavformat59-7:5.1.4-0+deb12u1 |
CVE-2023-2953 | Anchore CVE | High | libldap-2.5-0-2.5.13+dfsg-5 |
CVE-2023-26965 | Anchore CVE | Medium | libtiff6-4.5.0-6+deb12u1 |
CVE-2023-27043 | Anchore CVE | Medium | python3.11-minimal-3.11.2-6 |
CVE-2023-38472 | Anchore CVE | Medium | libavahi-common3-0.8-10 |
CVE-2024-26461 | Anchore CVE | Low | libkrb5support0-1.20.1-2+deb12u1 |
CVE-2019-6461 | Anchore CVE | Low | libcairo2-1.16.0-7 |
CVE-2023-4016 | Anchore CVE | Low | procps-2:4.0.2-3 |
CVE-2023-51795 | Anchore CVE | Low | libpostproc56-7:5.1.4-0+deb12u1 |
CVE-2023-6277 | Anchore CVE | Medium | libtiff6-4.5.0-6+deb12u1 |
CVE-2023-49501 | Anchore CVE | Low | libavcodec59-7:5.1.4-0+deb12u1 |
CVE-2023-50868 | Anchore CVE | Low | libpam-systemd-252.22-1~deb12u1 |
CVE-2023-38471 | Anchore CVE | Medium | libavahi-common3-0.8-10 |
CVE-2023-50008 | Anchore CVE | Low | libavutil57-7:5.1.4-0+deb12u1 |
CVE-2023-49528 | Anchore CVE | Low | libavutil57-7:5.1.4-0+deb12u1 |
CVE-2023-41105 | Anchore CVE | High | libpython3.11-stdlib-3.11.2-6 |
CVE-2020-27748 | Anchore CVE | Medium | xdg-utils-1.1.3-4.1 |
CVE-2023-38470 | Anchore CVE | Medium | libavahi-common3-0.8-10 |
CVE-2023-24329 | Anchore CVE | High | libpython3.11-minimal-3.11.2-6 |
CVE-2023-45853 | Anchore CVE | Critical | zlib1g-dev-1:1.2.13.dfsg-1 |
CVE-2023-6879 | Anchore CVE | Critical | libaom3-3.6.0-1 |
CVE-2023-51797 | Anchore CVE | Low | libswscale6-7:5.1.4-0+deb12u1 |
CVE-2024-31578 | Anchore CVE | Low | libavformat59-7:5.1.4-0+deb12u1 |
CVE-2023-2908 | Anchore CVE | Medium | libtiff6-4.5.0-6+deb12u1 |
CVE-2023-50868 | Anchore CVE | Low | libsystemd-shared-252.22-1~deb12u1 |
CVE-2023-32570 | Anchore CVE | Medium | libdav1d6-1.0.0-2 |
CVE-2023-50495 | Anchore CVE | Medium | libncursesw6-6.4-4 |
CVE-2023-50008 | Anchore CVE | Low | libavcodec59-7:5.1.4-0+deb12u1 |
CVE-2023-5388 | Anchore CVE | Low | libnss3-2:3.87.1-1 |
CVE-2023-49501 | Anchore CVE | Low | libavformat59-7:5.1.4-0+deb12u1 |
CVE-2023-51795 | Anchore CVE | Low | libavutil57-7:5.1.4-0+deb12u1 |
CVE-2024-26458 | Anchore CVE | Low | libkrb5-3-1.20.1-2+deb12u1 |
CVE-2023-4039 | Anchore CVE | Medium | cpp-12-12.2.0-14 |
CVE-2024-31578 | Anchore CVE | Low | libswresample4-7:5.1.4-0+deb12u1 |
CVE-2023-51793 | Anchore CVE | Low | libswresample4-7:5.1.4-0+deb12u1 |
CVE-2023-3618 | Anchore CVE | Medium | libtiffxx6-4.5.0-6+deb12u1 |
CVE-2024-31585 | Anchore CVE | Low | libavcodec59-7:5.1.4-0+deb12u1 |
CVE-2023-31484 | Anchore CVE | High | perl-modules-5.36-5.36.0-7+deb12u1 |
CVE-2023-50387 | Anchore CVE | High | libsystemd-shared-252.22-1~deb12u1 |
CVE-2024-28755 | Anchore CVE | Low | libmbedcrypto7-2.28.3-1 |
CVE-2023-35790 | Anchore CVE | High | libjxl0.7-0.7.0-10 |
CVE-2023-51793 | Anchore CVE | Low | libavformat59-7:5.1.4-0+deb12u1 |
CVE-2024-31585 | Anchore CVE | Low | libpostproc56-7:5.1.4-0+deb12u1 |
CVE-2023-45918 | Anchore CVE | Low | libncursesw6-6.4-4 |
CVE-2024-31581 | Anchore CVE | Low | libswscale6-7:5.1.4-0+deb12u1 |
CVE-2023-50387 | Anchore CVE | High | libpam-systemd-252.22-1~deb12u1 |
CVE-2023-50007 | Anchore CVE | Low | libpostproc56-7:5.1.4-0+deb12u1 |
CVE-2024-31581 | Anchore CVE | Low | libpostproc56-7:5.1.4-0+deb12u1 |
CVE-2023-49528 | Anchore CVE | Low | libswresample4-7:5.1.4-0+deb12u1 |
CVE-2024-31852 | Anchore CVE | Low | libllvm15-1:15.0.6-4+b1 |
CVE-2023-49501 | Anchore CVE | Low | libavutil57-7:5.1.4-0+deb12u1 |
CVE-2024-31578 | Anchore CVE | Low | libpostproc56-7:5.1.4-0+deb12u1 |
CVE-2023-3316 | Anchore CVE | Medium | libtiff6-4.5.0-6+deb12u1 |
CVE-2023-39616 | Anchore CVE | High | libaom3-3.6.0-1 |
CVE-2023-25193 | Anchore CVE | High | libharfbuzz0b-6.0.0+dfsg-3 |
CVE-2023-39615 | Anchore CVE | Medium | libxml2-2.9.14+dfsg-1.3~deb12u1 |
CVE-2023-51798 | Anchore CVE | Low | libavcodec59-7:5.1.4-0+deb12u1 |
CVE-2023-50009 | Anchore CVE | Low | libswresample4-7:5.1.4-0+deb12u1 |
CVE-2023-51797 | Anchore CVE | Low | libavutil57-7:5.1.4-0+deb12u1 |
CVE-2023-52353 | Anchore CVE | High | libmbedcrypto7-2.28.3-1 |
CVE-2023-52356 | Anchore CVE | High | libtiffxx6-4.5.0-6+deb12u1 |
CVE-2023-26965 | Anchore CVE | Medium | libtiffxx6-4.5.0-6+deb12u1 |
CVE-2023-3316 | Anchore CVE | Medium | libtiffxx6-4.5.0-6+deb12u1 |
CVE-2023-50010 | Anchore CVE | Low | libswresample4-7:5.1.4-0+deb12u1 |
CVE-2023-38471 | Anchore CVE | Medium | libavahi-common-data-0.8-10 |
CVE-2024-31582 | Anchore CVE | Low | libpostproc56-7:5.1.4-0+deb12u1 |
CVE-2023-3618 | Anchore CVE | Medium | libtiff6-4.5.0-6+deb12u1 |
CVE-2023-51795 | Anchore CVE | Low | libavcodec59-7:5.1.4-0+deb12u1 |
CVE-2023-51791 | Anchore CVE | Low | libswscale6-7:5.1.4-0+deb12u1 |
CVE-2024-31585 | Anchore CVE | Low | libavutil57-7:5.1.4-0+deb12u1 |
CVE-2023-51798 | Anchore CVE | Low | libavutil57-7:5.1.4-0+deb12u1 |
CVE-2023-50007 | Anchore CVE | Low | libavutil57-7:5.1.4-0+deb12u1 |
CVE-2024-31582 | Anchore CVE | Low | libswresample4-7:5.1.4-0+deb12u1 |
CVE-2019-19814 | Anchore CVE | High | linux-libc-dev-6.1.85-1 |
CVE-2019-19449 | Anchore CVE | High | linux-libc-dev-6.1.85-1 |
CVE-2019-16089 | Anchore CVE | Medium | linux-libc-dev-6.1.85-1 |
CVE-2023-50007 | Anchore CVE | Low | libavcodec59-7:5.1.4-0+deb12u1 |
CVE-2023-4016 | Anchore CVE | Low | libproc2-0-2:4.0.2-3 |
CVE-2023-51793 | Anchore CVE | Low | libpostproc56-7:5.1.4-0+deb12u1 |
CVE-2023-50007 | Anchore CVE | Low | libavformat59-7:5.1.4-0+deb12u1 |
CVE-2020-14304 | Anchore CVE | Medium | linux-libc-dev-6.1.85-1 |
CVE-2023-38470 | Anchore CVE | Medium | libavahi-common-data-0.8-10 |
CVE-2023-50009 | Anchore CVE | Low | libpostproc56-7:5.1.4-0+deb12u1 |
CVE-2023-25433 | Anchore CVE | Medium | libtiffxx6-4.5.0-6+deb12u1 |
CVE-2023-49528 | Anchore CVE | Low | libpostproc56-7:5.1.4-0+deb12u1 |
CVE-2023-38858 | Anchore CVE | Medium | libfaad2-2.10.1-1 |
CVE-2024-31578 | Anchore CVE | Low | libswscale6-7:5.1.4-0+deb12u1 |
CVE-2023-26965 | Anchore CVE | Medium | libtiff-dev-4.5.0-6+deb12u1 |
CVE-2024-31585 | Anchore CVE | Low | libavformat59-7:5.1.4-0+deb12u1 |
CVE-2023-49502 | Anchore CVE | Low | libswscale6-7:5.1.4-0+deb12u1 |
CVE-2023-52356 | Anchore CVE | High | libtiff-dev-4.5.0-6+deb12u1 |
CVE-2023-49528 | Anchore CVE | Low | libavformat59-7:5.1.4-0+deb12u1 |
CVE-2024-0232 | Anchore CVE | Medium | libsqlite3-0-3.40.1-2 |
CVE-2023-51796 | Anchore CVE | Low | libavformat59-7:5.1.4-0+deb12u1 |
CVE-2023-51798 | Anchore CVE | Low | libswscale6-7:5.1.4-0+deb12u1 |
CVE-2023-52356 | Anchore CVE | High | libtiff6-4.5.0-6+deb12u1 |
CVE-2024-31582 | Anchore CVE | Low | libswscale6-7:5.1.4-0+deb12u1 |
CVE-2024-26461 | Anchore CVE | Low | libk5crypto3-1.20.1-2+deb12u1 |
CVE-2023-38473 | Anchore CVE | Medium | libavahi-common-data-0.8-10 |
CVE-2024-31755 | Twistlock CVE | Low | cjson-1.7.15-1 |
CVE-2024-31585 | Twistlock CVE | Low | ffmpeg-7:5.1.4-0+deb12u1 |
CVE-2024-31582 | Twistlock CVE | Low | ffmpeg-7:5.1.4-0+deb12u1 |
CVE-2024-31581 | Twistlock CVE | Low | ffmpeg-7:5.1.4-0+deb12u1 |
CVE-2024-31578 | Twistlock CVE | Low | ffmpeg-7:5.1.4-0+deb12u1 |
CVE-2023-51798 | Twistlock CVE | Low | ffmpeg-7:5.1.4-0+deb12u1 |
CVE-2023-51797 | Twistlock CVE | Low | ffmpeg-7:5.1.4-0+deb12u1 |
CVE-2023-51796 | Twistlock CVE | Low | ffmpeg-7:5.1.4-0+deb12u1 |
CVE-2023-51795 | Twistlock CVE | Low | ffmpeg-7:5.1.4-0+deb12u1 |
CVE-2023-51794 | Twistlock CVE | Low | ffmpeg-7:5.1.4-0+deb12u1 |
CVE-2023-51793 | Twistlock CVE | Low | ffmpeg-7:5.1.4-0+deb12u1 |
CVE-2023-51791 | Twistlock CVE | Low | ffmpeg-7:5.1.4-0+deb12u1 |
CVE-2023-50010 | Twistlock CVE | Low | ffmpeg-7:5.1.4-0+deb12u1 |
CVE-2023-50009 | Twistlock CVE | Low | ffmpeg-7:5.1.4-0+deb12u1 |
CVE-2023-50008 | Twistlock CVE | Low | ffmpeg-7:5.1.4-0+deb12u1 |
CVE-2023-50007 | Twistlock CVE | Low | ffmpeg-7:5.1.4-0+deb12u1 |
CVE-2023-49502 | Twistlock CVE | Low | ffmpeg-7:5.1.4-0+deb12u1 |
CVE-2023-49501 | Twistlock CVE | Low | ffmpeg-7:5.1.4-0+deb12u1 |
CVE-2023-51795 | Anchore CVE | Low | libswscale6-7:5.1.4-0+deb12u1 |
CVE-2024-26458 | Anchore CVE | Low | libkrb5support0-1.20.1-2+deb12u1 |
CVE-2023-49502 | Anchore CVE | Low | libswresample4-7:5.1.4-0+deb12u1 |
CVE-2023-50009 | Anchore CVE | Low | libavcodec59-7:5.1.4-0+deb12u1 |
CVE-2023-27043 | Anchore CVE | Medium | libpython3.11-minimal-3.11.2-6 |
CVE-2023-50008 | Anchore CVE | Low | libswscale6-7:5.1.4-0+deb12u1 |
CVE-2018-14628 | Anchore CVE | Medium | samba-libs-2:4.17.12+dfsg-0+deb12u1 |
CVE-2023-27043 | Anchore CVE | Medium | python3.11-3.11.2-6 |
CVE-2023-51797 | Anchore CVE | Low | libpostproc56-7:5.1.4-0+deb12u1 |
CVE-2023-38857 | Anchore CVE | Medium | libfaad2-2.10.1-1 |
CVE-2023-49502 | Anchore CVE | Low | libavcodec59-7:5.1.4-0+deb12u1 |
CVE-2023-27043 | Anchore CVE | Medium | libpython3.11-stdlib-3.11.2-6 |
CVE-2023-51793 | Anchore CVE | Low | libswscale6-7:5.1.4-0+deb12u1 |
CVE-2023-2908 | Anchore CVE | Medium | libtiff-dev-4.5.0-6+deb12u1 |
CVE-2023-51796 | Anchore CVE | Low | libavutil57-7:5.1.4-0+deb12u1 |
CVE-2023-45918 | Anchore CVE | Low | libncurses6-6.4-4 |
CVE-2023-38471 | Anchore CVE | Medium | libavahi-client3-0.8-10 |
CVE-2023-51795 | Anchore CVE | Low | libswresample4-7:5.1.4-0+deb12u1 |
CVE-2023-51793 | Anchore CVE | Low | libavcodec59-7:5.1.4-0+deb12u1 |
CVE-2024-31582 | Anchore CVE | Low | libavcodec59-7:5.1.4-0+deb12u1 |
CVE-2019-15213 | Anchore CVE | Medium | linux-libc-dev-6.1.85-1 |
CVE-2023-51794 | Anchore CVE | Low | libpostproc56-7:5.1.4-0+deb12u1 |
CVE-2022-4055 | Anchore CVE | High | xdg-utils-1.1.3-4.1 |
CVE-2023-7104 | Anchore CVE | High | libsqlite3-0-3.40.1-2 |
CVE-2023-3618 | Anchore CVE | Medium | libtiff-dev-4.5.0-6+deb12u1 |
CVE-2024-31581 | Anchore CVE | Low | libswresample4-7:5.1.4-0+deb12u1 |
CVE-2023-4039 | Anchore CVE | Medium | libgomp1-12.2.0-14 |
CVE-2023-50007 | Anchore CVE | Low | libswscale6-7:5.1.4-0+deb12u1 |
CVE-2023-51796 | Anchore CVE | Low | libpostproc56-7:5.1.4-0+deb12u1 |
CVE-2023-50387 | Anchore CVE | High | systemd-sysv-252.22-1~deb12u1 |
CVE-2024-2004 | Anchore CVE | Low | libcurl3-gnutls-7.88.1-10+deb12u5 |
CVE-2024-25062 | Anchore CVE | High | libxml2-2.9.14+dfsg-1.3~deb12u1 |
CVE-2021-3575 | Anchore CVE | High | libopenjp2-7-2.5.0-2 |
CVE-2023-49501 | Anchore CVE | Low | libpostproc56-7:5.1.4-0+deb12u1 |
CVE-2023-50868 | Anchore CVE | Low | systemd-sysv-252.22-1~deb12u1 |
CVE-2023-51791 | Anchore CVE | Low | libavformat59-7:5.1.4-0+deb12u1 |
CVE-2024-26462 | Anchore CVE | Low | libk5crypto3-1.20.1-2+deb12u1 |
CVE-2024-31581 | Anchore CVE | Low | libavcodec59-7:5.1.4-0+deb12u1 |
CVE-2023-49502 | Anchore CVE | Low | libavformat59-7:5.1.4-0+deb12u1 |
CVE-2023-6277 | Anchore CVE | Medium | libtiff-dev-4.5.0-6+deb12u1 |
CVE-2023-50010 | Anchore CVE | Low | libavutil57-7:5.1.4-0+deb12u1 |
CVE-2023-26966 | Anchore CVE | Medium | libtiff6-4.5.0-6+deb12u1 |
CVE-2023-51791 | Anchore CVE | Low | libavutil57-7:5.1.4-0+deb12u1 |
CVE-2023-50868 | Anchore CVE | Low | systemd-252.22-1~deb12u1 |
CVE-2018-14628 | Anchore CVE | Medium | libldb2-2:2.6.2+samba4.17.12+dfsg-0+deb12u1 |
CVE-2023-24329 | Anchore CVE | High | python3.11-3.11.2-6 |
CVE-2023-49502 | Anchore CVE | Low | libpostproc56-7:5.1.4-0+deb12u1 |
CVE-2023-51798 | Anchore CVE | Low | libpostproc56-7:5.1.4-0+deb12u1 |
CVE-2018-14628 | Anchore CVE | Medium | libsmbclient-2:4.17.12+dfsg-0+deb12u1 |
CVE-2023-51794 | Anchore CVE | Low | libswresample4-7:5.1.4-0+deb12u1 |
CVE-2023-51794 | Anchore CVE | Low | libavcodec59-7:5.1.4-0+deb12u1 |
CVE-2023-50009 | Anchore CVE | Low | libavformat59-7:5.1.4-0+deb12u1 |
CVE-2023-38469 | Anchore CVE | Medium | libavahi-common3-0.8-10 |
CVE-2023-26966 | Anchore CVE | Medium | libtiffxx6-4.5.0-6+deb12u1 |
CVE-2023-41105 | Anchore CVE | High | python3.11-minimal-3.11.2-6 |
CVE-2023-51798 | Anchore CVE | Low | libswresample4-7:5.1.4-0+deb12u1 |
CVE-2023-49528 | Anchore CVE | Low | libavcodec59-7:5.1.4-0+deb12u1 |
CVE-2023-24329 | Anchore CVE | High | libpython3.11-stdlib-3.11.2-6 |
CVE-2023-51797 | Anchore CVE | Low | libswresample4-7:5.1.4-0+deb12u1 |
CVE-2019-20794 | Anchore CVE | Medium | linux-libc-dev-6.1.85-1 |
CVE-2023-38472 | Anchore CVE | Medium | libavahi-common-data-0.8-10 |
CVE-2023-38472 | Anchore CVE | Medium | libavahi-client3-0.8-10 |
CVE-2023-50868 | Anchore CVE | Low | udev-252.22-1~deb12u1 |
CVE-2019-6461 | Anchore CVE | Low | libcairo-gobject2-1.16.0-7 |
CVE-2018-14628 | Anchore CVE | Medium | libwbclient0-2:4.17.12+dfsg-0+deb12u1 |
CVE-2024-31585 | Anchore CVE | Low | libswscale6-7:5.1.4-0+deb12u1 |
CVE-2023-38473 | Anchore CVE | Medium | libavahi-client3-0.8-10 |
CVE-2023-51791 | Anchore CVE | Low | libswresample4-7:5.1.4-0+deb12u1 |
CVE-2017-7475 | Anchore CVE | Low | libcairo-gobject2-1.16.0-7 |
CVE-2023-50008 | Anchore CVE | Low | libswresample4-7:5.1.4-0+deb12u1 |
CVE-2023-51797 | Anchore CVE | Low | libavcodec59-7:5.1.4-0+deb12u1 |
CVE-2023-49502 | Anchore CVE | Low | libavutil57-7:5.1.4-0+deb12u1 |
CVE-2019-6462 | Anchore CVE | Low | libcairo-gobject2-1.16.0-7 |
CVE-2023-38470 | Anchore CVE | Medium | libavahi-client3-0.8-10 |
CVE-2018-18064 | Anchore CVE | Low | libcairo-gobject2-1.16.0-7 |
CVE-2023-52355 | Anchore CVE | High | libtiff-dev-4.5.0-6+deb12u1 |
CVE-2023-25433 | Anchore CVE | Medium | libtiff6-4.5.0-6+deb12u1 |
CVE-2023-51794 | Anchore CVE | Low | libavformat59-7:5.1.4-0+deb12u1 |
CVE-2024-31581 | Anchore CVE | Low | libavutil57-7:5.1.4-0+deb12u1 |
CVE-2023-5574 | Anchore CVE | High | xserver-common-2:21.1.7-3+deb12u7 |
CVE-2023-51797 | Anchore CVE | Low | libavformat59-7:5.1.4-0+deb12u1 |
CVE-2023-41105 | Anchore CVE | High | libpython3.11-minimal-3.11.2-6 |
CVE-2023-5574 | Anchore CVE | High | xvfb-2:21.1.7-3+deb12u7 |
CVE-2024-31578 | Anchore CVE | Low | libavcodec59-7:5.1.4-0+deb12u1 |
CVE-2023-50387 | Anchore CVE | High | udev-252.22-1~deb12u1 |
CVE-2023-50010 | Anchore CVE | Low | libavformat59-7:5.1.4-0+deb12u1 |
CVE-2019-6462 | Anchore CVE | Low | libcairo2-1.16.0-7 |
CVE-2017-7475 | Anchore CVE | Low | libcairo2-1.16.0-7 |
CVE-2024-26461 | Anchore CVE | Low | libkrb5-3-1.20.1-2+deb12u1 |
CVE-2023-38469 | Anchore CVE | Medium | libavahi-common-data-0.8-10 |
CVE-2023-51791 | Anchore CVE | Low | libpostproc56-7:5.1.4-0+deb12u1 |
CVE-2023-52355 | Anchore CVE | High | libtiff6-4.5.0-6+deb12u1 |
CVE-2022-4543 | Anchore CVE | Medium | linux-libc-dev-6.1.85-1 |
CVE-2024-31582 | Anchore CVE | Low | libavformat59-7:5.1.4-0+deb12u1 |
CVE-2022-33064 | Anchore CVE | High | libsndfile1-1.2.0-1 |
CVE-2023-51795 | Anchore CVE | Low | libavformat59-7:5.1.4-0+deb12u1 |
CVE-2023-51796 | Anchore CVE | Low | libswscale6-7:5.1.4-0+deb12u1 |
CVE-2023-50008 | Anchore CVE | Low | libavformat59-7:5.1.4-0+deb12u1 |
CVE-2023-51796 | Anchore CVE | Low | libavcodec59-7:5.1.4-0+deb12u1 |
CVE-2013-7445 | Anchore CVE | High | linux-libc-dev-6.1.85-1 |
CVE-2023-50009 | Anchore CVE | Low | libavutil57-7:5.1.4-0+deb12u1 |
CVE-2023-41105 | Anchore CVE | High | python3.11-3.11.2-6 |
CVE-2023-0645 | Anchore CVE | Critical | libjxl0.7-0.7.0-10 |
CVE-2023-49501 | Anchore CVE | Low | libswscale6-7:5.1.4-0+deb12u1 |
CVE-2022-33065 | Anchore CVE | High | libsndfile1-1.2.0-1 |
CVE-2018-12928 | Anchore CVE | Low | linux-libc-dev-6.1.85-1 |
CVE-2023-45322 | Anchore CVE | Medium | libxml2-2.9.14+dfsg-1.3~deb12u1 |
CVE-2023-51791 | Anchore CVE | Low | libavcodec59-7:5.1.4-0+deb12u1 |
CVE-2023-49528 | Anchore CVE | Low | libswscale6-7:5.1.4-0+deb12u1 |
CVE-2023-3316 | Anchore CVE | Medium | libtiff-dev-4.5.0-6+deb12u1 |
CVE-2023-26966 | Anchore CVE | Medium | libtiff-dev-4.5.0-6+deb12u1 |
CVE-2023-31484 | Anchore CVE | High | libperl5.36-5.36.0-7+deb12u1 |
CVE-2023-50008 | Anchore CVE | Low | libpostproc56-7:5.1.4-0+deb12u1 |
CVE-2023-50387 | Anchore CVE | High | systemd-252.22-1~deb12u1 |
CVE-2023-50495 | Anchore CVE | Medium | libncurses6-6.4-4 |
CVE-2024-26458 | Anchore CVE | Low | libk5crypto3-1.20.1-2+deb12u1 |
CVE-2023-51794 | Anchore CVE | Low | libswscale6-7:5.1.4-0+deb12u1 |
CVE-2021-31879 | Anchore CVE | Medium | wget-1.21.3-1+b2 |
CVE-2023-25433 | Anchore CVE | Medium | libtiff-dev-4.5.0-6+deb12u1 |
CVE-2024-26462 | Anchore CVE | Low | libkrb5-3-1.20.1-2+deb12u1 |
CVE-2023-35789 | Anchore CVE | Medium | librabbitmq4-0.11.0-1+b1 |
CVE-2023-49501 | Anchore CVE | Low | libswresample4-7:5.1.4-0+deb12u1 |
CVE-2023-6277 | Anchore CVE | Medium | libtiffxx6-4.5.0-6+deb12u1 |
CVE-2023-51798 | Anchore CVE | Low | libavformat59-7:5.1.4-0+deb12u1 |
CVE-2023-52355 | Anchore CVE | High | libtiffxx6-4.5.0-6+deb12u1 |
CVE-2019-6988 | Anchore CVE | Low | libopenjp2-7-2.5.0-2 |
VAT: https://vat.dso.mil/vat/image?imageName=cypress/included&tag=13.8.1&branch=master
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=cypress/included&tag=13.8.1&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.