chore(findings): domino/nucleus
Summary
domino/nucleus has 786 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
CVE-2021-22137 | Anchore CVE | Medium | elasticsearch-1.15.2 |
CVE-2021-21295 | Anchore CVE | Medium | netty-3.8-1.0 |
GHSA-6mjq-h674-j845 | Anchore CVE | Medium | netty-handler-4.1.79.Final |
CVE-2021-37137 | Anchore CVE | High | netty-3.8-1.0 |
CVE-2019-20444 | Anchore CVE | Critical | netty-3.4-1.0 |
GHSA-r48q-9g5r-8q2h | Anchore CVE | Critical | github.com/emicklei/go-restful-v2.9.5+incompatible |
CVE-2019-20445 | Anchore CVE | Critical | netty-3.8-1.0 |
GHSA-cgp8-4m63-fhh5 | Anchore CVE | Medium | commons-net-3.6 |
CVE-2023-34478 | Anchore CVE | Critical | shiro-event-1.11.0 |
CVE-2019-20444 | Anchore CVE | Critical | netty-3.8-1.0 |
GHSA-69ch-w2m2-3vjp | Anchore CVE | High | golang.org/x/text-v0.3.7 |
CVE-2023-28867 | Anchore CVE | High | graphql-java-16.2-1.0 |
GHSA-pwcw-6f5g-gxf8 | Anchore CVE | Medium | helm.sh/helm/v3-v3.9.0 |
CVE-2023-33953 | Anchore CVE | High | grpc-1.30.0-1.0 |
CVE-2023-27538 | Anchore CVE | Low | libcurl-devel-7.61.1-30.el8_8.3 |
CVE-2020-7021 | Anchore CVE | Medium | elasticsearch-1.15.2 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-client-9.4.48.v20220622 |
CVE-2023-33953 | Anchore CVE | High | grpc-1.4.0-1.0 |
CVE-2019-12728 | Anchore CVE | High | grails-1.3-1.0 |
CVE-2021-21290 | Anchore CVE | Medium | netty-3.4-1.0 |
CVE-2019-16869 | Anchore CVE | High | netty-3.8-1.0 |
GHSA-hmfx-3pcx-653p | Anchore CVE | Medium | github.com/containerd/containerd-v1.6.3 |
GHSA-vvpx-j8f3-3w6h | Anchore CVE | High | golang.org/x/net-v0.0.0-20220225172249-27dd8689420f |
CVE-2021-43797 | Anchore CVE | Medium | netty-3.8-1.0 |
CVE-2020-7019 | Anchore CVE | Medium | elasticsearch-1.15.2 |
GHSA-6wrf-mxfj-pf5p | Anchore CVE | Medium | github.com/docker/docker-v20.10.14+incompatible |
GHSA-p782-xgp4-8hr8 | Anchore CVE | Medium | golang.org/x/sys-v0.0.0-20220209214540-3681064d5158 |
CVE-2022-23525 | Anchore CVE | High | helm-3.9.4 |
CVE-2019-7611 | Anchore CVE | High | elasticsearch-1.15.2 |
CVE-2023-28320 | Anchore CVE | Low | libcurl-devel-7.61.1-30.el8_8.3 |
GHSA-jm77-qphf-c4w8 | Anchore CVE | Low | cryptography-40.0.2 |
CVE-2023-34453 | Anchore CVE | High | snappy-java-1.1.8.4 |
GHSA-53c4-hhmh-vw5q | Anchore CVE | Medium | helm.sh/helm/v3-v3.9.0 |
CVE-2022-23524 | Anchore CVE | High | helm-3.9.4 |
CVE-2023-34478 | Anchore CVE | Critical | shiro-config-core-1.11.0 |
GHSA-69ch-w2m2-3vjp | Anchore CVE | High | golang.org/x/text-v0.3.7 |
CVE-2021-21295 | Anchore CVE | Medium | netty-4.0.8-1.0 |
CVE-2022-40896 | Anchore CVE | Medium | Pygments-2.15.0 |
GHSA-gp7f-rwcx-9369 | Anchore CVE | Medium | jsoup-1.14.2 |
GHSA-5ffw-gxpp-mxpf | Anchore CVE | Medium | github.com/containerd/containerd-v1.6.3 |
CVE-2023-20863 | Anchore CVE | Medium | spring-core-5.3.25 |
CVE-2021-21290 | Anchore CVE | Medium | netty-4.0.8-1.0 |
CVE-2023-32732 | Anchore CVE | Medium | grpc-1.22.0-1.0 |
CVE-2021-43797 | Anchore CVE | Medium | netty-3.4-1.0 |
CVE-2023-34478 | Anchore CVE | Critical | shiro-crypto-hash-1.11.0 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-31.1-jre |
CVE-2021-21409 | Anchore CVE | Medium | netty-3.4-1.0 |
CVE-2022-24823 | Anchore CVE | Medium | netty-3.4-1.0 |
GHSA-6wrf-mxfj-pf5p | Anchore CVE | Medium | github.com/docker/docker-v20.10.17+incompatible |
CVE-2021-21409 | Anchore CVE | Medium | netty-3.8-1.0 |
CVE-2023-20861 | Anchore CVE | Medium | spring-core-5.3.25 |
CVE-2018-18700 | Anchore CVE | Low | binutils-2.30-119.el8 |
GHSA-4gg5-vx3j-xwc7 | Anchore CVE | High | protobuf-java-3.19.4 |
CVE-2023-28322 | Anchore CVE | Low | libcurl-devel-7.61.1-30.el8_8.3 |
CVE-2020-7768 | Anchore CVE | Critical | grpc-1.4.0-1.0 |
CVE-2014-3488 | Anchore CVE | Medium | netty-3.8-1.0 |
CVE-2023-33953 | Anchore CVE | High | grpc-1.40.0-1.0 |
CVE-2021-37136 | Anchore CVE | High | netty-3.8-1.0 |
GHSA-v436-q368-hvgg | Anchore CVE | Medium | keycloak-core-18.0.2 |
CVE-2021-37137 | Anchore CVE | High | netty-3.4-1.0 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-util-9.4.48.v20220622 |
GHSA-g5ww-5jh7-63cx | Anchore CVE | High | protobuf-java-3.19.4 |
CVE-2019-16869 | Anchore CVE | High | netty-4.0.0-1.0 |
CVE-2022-4285 | Anchore CVE | Medium | binutils-2.30-119.el8 |
GHSA-p5pg-wm9q-8v6r | Anchore CVE | Medium | metadata-extractor-2.16.0 |
CVE-2021-21409 | Anchore CVE | Medium | netty-4.0.0-1.0 |
CVE-2019-16869 | Anchore CVE | High | netty-3.4-1.0 |
CVE-2021-43797 | Anchore CVE | Medium | netty-4.0.8-1.0 |
CVE-2023-3138 | Anchore CVE | Medium | libX11-1.6.8-5.el8 |
GHSA-6rx9-889q-vv2r | Anchore CVE | Medium | helm.sh/helm/v3-v3.9.0 |
CVE-2023-34478 | Twistlock CVE | Critical | org.apache.shiro_shiro-core-1.11.0 |
CVE-2023-29405 | Twistlock CVE | Critical | go-1.17.12 |
CVE-2023-29405 | Twistlock CVE | Critical | go-1.17.13 |
CVE-2023-29404 | Twistlock CVE | Critical | go-1.17.12 |
CVE-2023-29404 | Twistlock CVE | Critical | go-1.17.13 |
CVE-2023-29402 | Twistlock CVE | Critical | go-1.17.12 |
CVE-2023-29402 | Twistlock CVE | Critical | go-1.17.13 |
CVE-2023-26119 | Twistlock CVE | Critical | htmlunit-2.65.1 |
CVE-2023-24540 | Twistlock CVE | Critical | go-1.17.12 |
CVE-2023-24540 | Twistlock CVE | Critical | go-1.17.13 |
CVE-2023-24538 | Twistlock CVE | Critical | go-1.17.12 |
CVE-2023-24538 | Twistlock CVE | Critical | go-1.17.13 |
CVE-2022-36944 | Twistlock CVE | Critical | scala-library-2.13.6 |
CVE-2022-1996 | Twistlock CVE | Critical | github.com/emicklei/go-restful-v2.9.5 |
CVE-2019-10202 | Twistlock CVE | Critical | jackson-mapper-asl-1.9.2 |
PRISMA-2022-0168 | Twistlock CVE | High | pip-22.3.1 |
CVE-2023-29403 | Twistlock CVE | High | go-1.17.13 |
CVE-2023-29403 | Twistlock CVE | High | go-1.17.12 |
PRISMA-2022-0227 | Twistlock CVE | High | github.com/emicklei/go-restful/v3-v3.8.0 |
CVE-2023-39533 | Twistlock CVE | High | go-1.17.13 |
CVE-2023-39533 | Twistlock CVE | High | go-1.17.12 |
CVE-2023-38325 | Twistlock CVE | High | cryptography-40.0.2 |
CVE-2023-2798 | Twistlock CVE | High | htmlunit-2.65.1 |
CVE-2023-24537 | Twistlock CVE | High | go-1.17.12 |
CVE-2023-24537 | Twistlock CVE | High | go-1.17.13 |
CVE-2023-24536 | Twistlock CVE | High | go-1.17.12 |
CVE-2023-24536 | Twistlock CVE | High | go-1.17.13 |
CVE-2023-24534 | Twistlock CVE | High | go-1.17.13 |
CVE-2023-24534 | Twistlock CVE | High | go-1.17.12 |
CVE-2023-20860 | Twistlock CVE | High | spring-core-5.3.25 |
CVE-2022-41725 | Twistlock CVE | High | go-1.17.13 |
CVE-2022-41725 | Twistlock CVE | High | go-1.17.12 |
CVE-2022-41724 | Twistlock CVE | High | go-1.17.13 |
CVE-2022-41724 | Twistlock CVE | High | go-1.17.12 |
CVE-2022-41723 | Twistlock CVE | High | go-1.17.12 |
CVE-2022-41723 | Twistlock CVE | High | go-1.17.13 |
CVE-2022-41716 | Twistlock CVE | High | go-1.17.12 |
CVE-2022-41716 | Twistlock CVE | High | go-1.17.13 |
CVE-2022-41715 | Twistlock CVE | High | go-1.17.12 |
CVE-2022-41715 | Twistlock CVE | High | go-1.17.13 |
CVE-2022-32189 | Twistlock CVE | High | go-1.17.12 |
CVE-2022-2880 | Twistlock CVE | High | go-1.17.13 |
CVE-2022-2880 | Twistlock CVE | High | go-1.17.12 |
CVE-2022-2879 | Twistlock CVE | High | go-1.17.12 |
CVE-2022-2879 | Twistlock CVE | High | go-1.17.13 |
CVE-2022-27664 | Twistlock CVE | High | go-1.17.13 |
CVE-2022-27664 | Twistlock CVE | High | go-1.17.12 |
CVE-2019-10172 | Twistlock CVE | High | jackson-mapper-asl-1.9.2 |
CVE-2023-29400 | Twistlock CVE | High | go-1.17.12 |
CVE-2023-29400 | Twistlock CVE | High | go-1.17.13 |
CVE-2023-24539 | Twistlock CVE | High | go-1.17.12 |
CVE-2023-24539 | Twistlock CVE | High | go-1.17.13 |
CVE-2023-2976 | Twistlock CVE | High | com.google.guava_guava-31.1 |
CVE-2023-34455 | Twistlock CVE | High | org.xerial.snappy_snappy-java-1.1.8.4 |
CVE-2023-28840 | Twistlock CVE | High | github.com/docker/docker-v20.10.14 |
CVE-2023-28840 | Twistlock CVE | High | github.com/docker/docker-v20.10.17 |
CVE-2023-2253 | Twistlock CVE | High | github.com/docker/distribution-v2.8.1 |
CVE-2022-41723 | Twistlock CVE | High | golang.org/x/net-v0.0.0-20220127200216-cd36cc0744dd |
CVE-2022-41723 | Twistlock CVE | High | golang.org/x/net-v0.0.0-20220225172249-27dd8689420f |
CVE-2022-3510 | Twistlock CVE | High | com.google.protobuf_protobuf-java-3.19.4 |
CVE-2022-3509 | Twistlock CVE | High | com.google.protobuf_protobuf-java-3.19.4 |
CVE-2022-29546 | Twistlock CVE | High | neko-htmlunit-2.36.0 |
CVE-2022-27664 | Twistlock CVE | High | golang.org/x/net-v0.0.0-20220127200216-cd36cc0744dd |
CVE-2022-27664 | Twistlock CVE | High | golang.org/x/net-v0.0.0-20220225172249-27dd8689420f |
CVE-2022-25647 | Twistlock CVE | High | com.google.code.gson_gson-2.8.6 |
CVE-2020-13790 | Twistlock CVE | Medium | libjpeg-turbo-1.5.3-12.el8 |
CVE-2021-45078 | Twistlock CVE | Medium | binutils-2.30-119.el8 |
CVE-2019-2201 | Twistlock CVE | Medium | libjpeg-turbo-1.5.3-12.el8 |
CVE-2018-1000876 | Twistlock CVE | Medium | binutils-2.30-119.el8 |
CVE-2023-25193 | Twistlock CVE | Medium | harfbuzz-1.7.5-3.el8 |
CVE-2023-3138 | Twistlock CVE | Medium | libX11-common-1.6.8-5.el8 |
CVE-2023-3138 | Twistlock CVE | Medium | libX11-1.6.8-5.el8 |
CVE-2023-1579 | Twistlock CVE | Medium | binutils-2.30-119.el8 |
CVE-2022-44638 | Twistlock CVE | Medium | pixman-0.38.4-2.el8 |
CVE-2021-20328 | Twistlock CVE | Medium | mongo-java-driver-3.11.2 |
CVE-2023-29406 | Twistlock CVE | Medium | go-1.17.12 |
CVE-2023-29406 | Twistlock CVE | Medium | go-1.17.13 |
CVE-2023-20863 | Twistlock CVE | Medium | spring-core-5.3.25 |
CVE-2023-20861 | Twistlock CVE | Medium | spring-core-5.3.25 |
CVE-2021-32256 | Twistlock CVE | Medium | binutils-2.30-119.el8 |
CVE-2018-18064 | Twistlock CVE | Medium | cairo-1.15.12-6.el8 |
PRISMA-2023-0056 | Twistlock CVE | Medium | github.com/sirupsen/logrus-v1.8.1 |
CVE-2022-4361 | Twistlock CVE | Medium | org.keycloak_keycloak-core-18.0.2 |
CVE-2022-36033 | Twistlock CVE | Medium | org.jsoup_jsoup-1.14.2 |
CVE-2023-24056 | Twistlock CVE | Medium | pkgconf-pkg-config-1.4.2-1.el8 |
CVE-2023-24056 | Twistlock CVE | Medium | pkgconf-m4-1.4.2-1.el8 |
CVE-2023-24056 | Twistlock CVE | Medium | libpkgconf-1.4.2-1.el8 |
CVE-2023-24056 | Twistlock CVE | Medium | pkgconf-1.4.2-1.el8 |
CVE-2022-4285 | Twistlock CVE | Medium | binutils-2.30-119.el8 |
PRISMA-2022-0270 | Twistlock CVE | Medium | github.com/golang-jwt/jwt/v4-v4.2.0 |
CVE-2022-1274 | Twistlock CVE | Medium | org.keycloak_keycloak-core-18.0.2 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.17.13 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.17.12 |
CVE-2023-27043 | Twistlock CVE | Medium | python3.11-libs-3.11.2-2.el8_8.1 |
CVE-2023-27043 | Twistlock CVE | Medium | python3.11-3.11.2-2.el8_8.1 |
CVE-2023-24532 | Twistlock CVE | Medium | go-1.17.13 |
CVE-2023-24532 | Twistlock CVE | Medium | go-1.17.12 |
CVE-2022-41717 | Twistlock CVE | Medium | go-1.17.12 |
CVE-2022-41717 | Twistlock CVE | Medium | go-1.17.13 |
CVE-2020-13956 | Twistlock CVE | Medium | org.apache.httpcomponents_httpclient-4.5.6 |
CVE-2020-13956 | Twistlock CVE | Medium | org.apache.httpcomponents_httpclient-4.0 |
CVE-2019-9077 | Twistlock CVE | Medium | binutils-2.30-119.el8 |
CVE-2019-9075 | Twistlock CVE | Medium | binutils-2.30-119.el8 |
CVE-2019-9074 | Twistlock CVE | Medium | binutils-2.30-119.el8 |
CVE-2018-20671 | Twistlock CVE | Medium | binutils-2.30-119.el8 |
CVE-2018-20623 | Twistlock CVE | Medium | binutils-2.30-119.el8 |
CVE-2023-0264 | Twistlock CVE | Medium | org.keycloak_keycloak-core-18.0.2 |
CVE-2021-29425 | Twistlock CVE | Medium | commons-io_commons-io-2.5 |
CVE-2022-23708 | Twistlock CVE | Medium | elasticsearch-7.16.2 |
GHSA-755v-r4x4-qf7m | Twistlock CVE | Medium | org.keycloak_keycloak-core-18.0.2 |
CVE-2023-35887 | Twistlock CVE | Medium | org.apache.sshd_sshd-sftp-2.9.2 |
CVE-2023-34454 | Twistlock CVE | Medium | org.xerial.snappy_snappy-java-1.1.8.4 |
CVE-2023-34453 | Twistlock CVE | Medium | org.xerial.snappy_snappy-java-1.1.8.4 |
CVE-2023-33201 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk18on-1.72 |
CVE-2023-28842 | Twistlock CVE | Medium | github.com/docker/docker-v20.10.14 |
CVE-2023-28842 | Twistlock CVE | Medium | github.com/docker/docker-v20.10.17 |
CVE-2023-28841 | Twistlock CVE | Medium | github.com/docker/docker-v20.10.14 |
CVE-2023-28841 | Twistlock CVE | Medium | github.com/docker/docker-v20.10.17 |
CVE-2023-25173 | Twistlock CVE | Medium | github.com/containerd/containerd-v1.6.3 |
CVE-2023-25173 | Twistlock CVE | Medium | github.com/containerd/containerd-v1.6.6 |
CVE-2023-25165 | Twistlock CVE | Medium | helm.sh/helm/v3-v3.9.0 |
CVE-2023-25153 | Twistlock CVE | Medium | github.com/containerd/containerd-v1.6.6 |
CVE-2023-25153 | Twistlock CVE | Medium | github.com/containerd/containerd-v1.6.3 |
CVE-2023-1664 | Twistlock CVE | Medium | org.keycloak_keycloak-core-18.0.2 |
CVE-2023-0105 | Twistlock CVE | Medium | org.keycloak_keycloak-core-18.0.2 |
CVE-2023-0091 | Twistlock CVE | Medium | org.keycloak_keycloak-core-18.0.2 |
CVE-2022-45787 | Twistlock CVE | Medium | org.apache.james_apache-mime4j-0.6 |
CVE-2022-40152 | Twistlock CVE | Medium | com.fasterxml.woodstox_woodstox-core-6.2.7 |
CVE-2022-36055 | Twistlock CVE | Medium | helm.sh/helm/v3-v3.9.0 |
CVE-2022-3171 | Twistlock CVE | Medium | com.google.protobuf_protobuf-java-3.19.4 |
CVE-2022-31030 | Twistlock CVE | Medium | github.com/containerd/containerd-v1.6.3 |
CVE-2022-29526 | Twistlock CVE | Medium | golang.org/x/sys-v0.0.0-20220209214540-3681064d5158 |
CVE-2022-24614 | Twistlock CVE | Medium | com.drewnoakes_metadata-extractor-2.16.0 |
CVE-2022-24613 | Twistlock CVE | Medium | com.drewnoakes_metadata-extractor-2.16.0 |
CVE-2022-23526 | Twistlock CVE | Medium | helm.sh/helm/v3-v3.9.0 |
CVE-2022-23525 | Twistlock CVE | Medium | helm.sh/helm/v3-v3.9.0 |
CVE-2022-23524 | Twistlock CVE | Medium | helm.sh/helm/v3-v3.9.0 |
CVE-2022-23471 | Twistlock CVE | Medium | github.com/containerd/containerd-v1.6.6 |
CVE-2022-23471 | Twistlock CVE | Medium | github.com/containerd/containerd-v1.6.3 |
CVE-2021-3754 | Twistlock CVE | Medium | org.keycloak_keycloak-core-18.0.2 |
CVE-2021-37533 | Twistlock CVE | Medium | commons-net_commons-net-3.6 |
CVE-2023-2222 | Twistlock CVE | Medium | binutils-2.30-119.el8 |
CVE-2021-3826 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2023-2650 | Twistlock CVE | Low | openssl-1.1.1k-9.el8_7 |
CVE-2023-25584 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2020-35494 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2023-0464 | Twistlock CVE | Low | openssl-1.1.1k-9.el8_7 |
CVE-2018-19876 | Twistlock CVE | Low | cairo-1.15.12-6.el8 |
CVE-2022-38533 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-27943 | Twistlock CVE | Low | gcc-gfortran-8.5.0-18.el8 |
CVE-2022-27943 | Twistlock CVE | Low | libgfortran-8.5.0-18.el8 |
CVE-2022-27943 | Twistlock CVE | Low | libstdc++-devel-8.5.0-18.el8 |
CVE-2022-27943 | Twistlock CVE | Low | gcc-c++-8.5.0-18.el8 |
CVE-2022-27943 | Twistlock CVE | Low | cpp-8.5.0-18.el8 |
CVE-2022-27943 | Twistlock CVE | Low | libquadmath-8.5.0-18.el8 |
CVE-2022-27943 | Twistlock CVE | Low | libgomp-8.5.0-18.el8 |
CVE-2022-27943 | Twistlock CVE | Low | gcc-8.5.0-18.el8 |
CVE-2022-27943 | Twistlock CVE | Low | libquadmath-devel-8.5.0-18.el8 |
CVE-2022-0530 | Twistlock CVE | Low | unzip-6.0-46.el8 |
CVE-2022-0529 | Twistlock CVE | Low | unzip-6.0-46.el8 |
CVE-2020-35538 | Twistlock CVE | Low | libjpeg-turbo-1.5.3-12.el8 |
CVE-2020-35507 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2020-35496 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2020-35495 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2020-35493 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2019-12972 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2018-12934 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2023-3817 | Twistlock CVE | Low | openssl-1.1.1k-9.el8_7 |
CVE-2023-3446 | Twistlock CVE | Low | openssl-1.1.1k-9.el8_7 |
CVE-2023-0466 | Twistlock CVE | Low | openssl-1.1.1k-9.el8_7 |
CVE-2023-0465 | Twistlock CVE | Low | openssl-1.1.1k-9.el8_7 |
CVE-2018-20673 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2023-25588 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2023-25585 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2018-17985 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2018-18701 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2018-18700 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2018-18484 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2018-18483 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2019-12900 | Twistlock CVE | Low | bzip2-devel-1.0.6-26.el8 |
CVE-2023-28322 | Twistlock CVE | Low | libcurl-devel-7.61.1-30.el8_8.3 |
CVE-2023-27534 | Twistlock CVE | Low | libcurl-devel-7.61.1-30.el8_8.3 |
CVE-2021-4217 | Twistlock CVE | Low | unzip-6.0-46.el8 |
CVE-2020-8908 | Twistlock CVE | Low | com.google.guava_guava-31.1 |
CVE-2019-9071 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2019-14250 | Twistlock CVE | Low | cpp-8.5.0-18.el8 |
CVE-2019-14250 | Twistlock CVE | Low | gcc-gfortran-8.5.0-18.el8 |
CVE-2019-14250 | Twistlock CVE | Low | libquadmath-8.5.0-18.el8 |
CVE-2019-14250 | Twistlock CVE | Low | libstdc++-devel-8.5.0-18.el8 |
CVE-2019-14250 | Twistlock CVE | Low | gcc-8.5.0-18.el8 |
CVE-2019-14250 | Twistlock CVE | Low | libgomp-8.5.0-18.el8 |
CVE-2019-14250 | Twistlock CVE | Low | libgfortran-8.5.0-18.el8 |
CVE-2019-14250 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2019-14250 | Twistlock CVE | Low | gcc-c++-8.5.0-18.el8 |
CVE-2019-14250 | Twistlock CVE | Low | libquadmath-devel-8.5.0-18.el8 |
CVE-2018-6872 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2018-20657 | Twistlock CVE | Low | cpp-8.5.0-18.el8 |
CVE-2018-20657 | Twistlock CVE | Low | gcc-c++-8.5.0-18.el8 |
CVE-2018-20657 | Twistlock CVE | Low | libquadmath-8.5.0-18.el8 |
CVE-2018-20657 | Twistlock CVE | Low | gcc-gfortran-8.5.0-18.el8 |
CVE-2018-20657 | Twistlock CVE | Low | libgfortran-8.5.0-18.el8 |
CVE-2018-20657 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2018-20657 | Twistlock CVE | Low | libstdc++-devel-8.5.0-18.el8 |
CVE-2018-20657 | Twistlock CVE | Low | libgomp-8.5.0-18.el8 |
CVE-2018-20657 | Twistlock CVE | Low | libquadmath-devel-8.5.0-18.el8 |
CVE-2018-20657 | Twistlock CVE | Low | gcc-8.5.0-18.el8 |
CVE-2018-20651 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2018-20002 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2018-19932 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2018-18607 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2018-18606 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2018-18605 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2018-18309 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2018-17794 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2018-17360 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2018-12699 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2018-12698 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2018-12697 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2018-12641 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2023-1972 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2019-6462 | Twistlock CVE | Low | cairo-1.15.12-6.el8 |
CVE-2019-6461 | Twistlock CVE | Low | cairo-1.15.12-6.el8 |
GHSA-jm77-qphf-c4w8 | Twistlock CVE | Low | cryptography-40.0.2 |
GHSA-5cpq-8wj7-hf2v | Twistlock CVE | Low | cryptography-40.0.2 |
PRISMA-2021-0055 | Twistlock CVE | Low | commons-codec_commons-codec-1.10 |
PRISMA-2021-0055 | Twistlock CVE | Low | commons-codec_commons-codec-1.11 |
4541e28e53461027ae648c2c9594f308 | Anchore Compliance | Critical | |
fa7d6fd4665e2b9dccedf23e294dcb22 | Anchore Compliance | Critical | |
CVE-2023-34455 | Anchore CVE | High | snappy-java-1.1.8.4 |
CVE-2022-24823 | Anchore CVE | Medium | netty-4.0.8-1.0 |
GHSA-69cg-p879-7622 | Anchore CVE | High | golang.org/x/net-v0.0.0-20220127200216-cd36cc0744dd |
CVE-2021-43797 | Anchore CVE | Medium | netty-4.0.0-1.0 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-http-9.4.48.v20220622 |
CVE-2021-37137 | Anchore CVE | High | netty-4.0.8-1.0 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.15.0 |
GHSA-4jrv-ppp4-jm57 | Anchore CVE | High | gson-2.8.6 |
CVE-2019-20444 | Anchore CVE | Critical | netty-4.0.8-1.0 |
CVE-2022-24823 | Anchore CVE | Medium | netty-4.0.0-1.0 |
GHSA-7r82-7xv7-xcpj | Anchore CVE | Medium | httpclient-4.5.6 |
CVE-2023-34478 | Anchore CVE | Critical | shiro-crypto-cipher-1.11.0 |
CVE-2023-34478 | Anchore CVE | Critical | shiro-core-1.11.0 |
CVE-2019-16869 | Anchore CVE | High | netty-4.0.8-1.0 |
CVE-2022-23708 | Anchore CVE | Medium | elasticsearch-7.16.2 |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-31.1-jre |
GHSA-67fx-wx78-jx33 | Anchore CVE | Medium | helm.sh/helm/v3-v3.9.0 |
CVE-2021-22135 | Anchore CVE | Medium | elasticsearch-1.15.2 |
CVE-2023-2222 | Anchore CVE | Medium | binutils-2.30-119.el8 |
CVE-2023-20860 | Anchore CVE | High | spring-core-5.3.25 |
CVE-2021-21295 | Anchore CVE | Medium | netty-4.0.0-1.0 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-io-9.4.48.v20220622 |
CVE-2023-32732 | Anchore CVE | Medium | grpc-1.40.0-1.0 |
GHSA-2qjp-425j-52j9 | Anchore CVE | Medium | github.com/containerd/containerd-v1.6.6 |
CVE-2015-2156 | Anchore CVE | High | netty-3.4-1.0 |
CVE-2019-20445 | Anchore CVE | Critical | netty-4.0.0-1.0 |
CVE-2023-34462 | Anchore CVE | Medium | netty-4.0.0-1.0 |
CVE-2022-41881 | Anchore CVE | High | netty-3.8-1.0 |
CVE-2023-33953 | Anchore CVE | High | grpc-1.22.0-1.0 |
CVE-2023-34462 | Anchore CVE | Medium | reactor-netty-core-1.0.21 |
CVE-2021-37136 | Anchore CVE | High | netty-4.0.0-1.0 |
GHSA-hmfx-3pcx-653p | Anchore CVE | Medium | github.com/containerd/containerd-v1.6.6 |
CVE-2007-4559 | Anchore CVE | Medium | python3.11-libs-3.11.2-2.el8_8.1 |
CVE-2023-34478 | Anchore CVE | Critical | shiro-lang-1.11.0 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-30.1.1-android |
CVE-2023-26049 | Anchore CVE | Medium | jetty-io-9.4.48.v20220622 |
GHSA-j9xq-j329-2xvg | Anchore CVE | Medium | keycloak-core-18.0.2 |
CVE-2021-37137 | Anchore CVE | High | netty-4.0.0-1.0 |
CVE-2020-7020 | Anchore CVE | Low | elasticsearch-1.15.2 |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-30.1.1-android |
CVE-2023-26049 | Anchore CVE | Medium | jetty-util-9.4.48.v20220622 |
CVE-2022-41881 | Anchore CVE | High | netty-4.0.0-1.0 |
CVE-2019-20444 | Anchore CVE | Critical | netty-4.0.0-1.0 |
GHSA-3f7h-mf4q-vrm4 | Anchore CVE | Medium | woodstox-core-6.2.7 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-http-9.4.48.v20220622 |
GHSA-259w-8hf6-59c2 | Anchore CVE | Medium | github.com/containerd/containerd-v1.6.3 |
CVE-2020-7768 | Anchore CVE | Critical | grpc-1.22.0-1.0 |
GHSA-5cc8-pgp5-7mpm | Anchore CVE | Medium | keycloak-core-18.0.2 |
GHSA-q84x-3476-8ff2 | Anchore CVE | Medium | apache-mime4j-0.6 |
GHSA-vvpx-j8f3-3w6h | Anchore CVE | High | golang.org/x/net-v0.0.0-20220127200216-cd36cc0744dd |
CVE-2023-3635 | Anchore CVE | High | okio-jvm-3.2.0 |
CVE-2023-0687 | Anchore CVE | Medium | glibc-devel-2.28-225.el8 |
CVE-2019-7614 | Anchore CVE | Medium | elasticsearch-1.15.2 |
CVE-2023-32732 | Anchore CVE | Medium | grpc-1.30.0-1.0 |
CVE-2019-12728 | Anchore CVE | High | grails-2-1.0 |
CVE-2021-21409 | Anchore CVE | Medium | netty-4.0.8-1.0 |
CVE-2007-1157 | Anchore CVE | High | jboss-7-1.0 |
GHSA-c7xw-p58w-h6fj | Anchore CVE | Medium | keycloak-core-18.0.2 |
CVE-2023-34478 | Anchore CVE | Critical | shiro-crypto-core-1.11.0 |
CVE-2022-24823 | Anchore CVE | Medium | netty-3.8-1.0 |
CVE-2022-23526 | Anchore CVE | High | helm-3.9.4 |
GHSA-4v6p-cxf9-98rf | Anchore CVE | Medium | metadata-extractor-2.16.0 |
CVE-2007-4559 | Anchore CVE | Medium | python3.11-3.11.2-2.el8_8.1 |
CVE-2023-3446 | Anchore CVE | Low | openssl-1:1.1.1k-9.el8_7 |
GHSA-cf7p-gm2m-833m | Anchore CVE | High | cryptography-40.0.2 |
GHSA-259w-8hf6-59c2 | Anchore CVE | Medium | github.com/containerd/containerd-v1.6.6 |
CVE-2021-22144 | Anchore CVE | Medium | elasticsearch-1.15.2 |
CVE-2014-3488 | Anchore CVE | Medium | netty-3.4-1.0 |
CVE-2021-21290 | Anchore CVE | Medium | netty-4.0.0-1.0 |
CVE-2023-34478 | Anchore CVE | Critical | shiro-cache-1.11.0 |
GHSA-33pg-m6jh-5237 | Anchore CVE | Medium | github.com/docker/docker-v20.10.14+incompatible |
CVE-2021-37136 | Anchore CVE | High | netty-3.4-1.0 |
CVE-2023-0687 | Anchore CVE | Medium | glibc-headers-2.28-225.el8 |
GHSA-755v-r4x4-qf7m | Anchore CVE | Medium | keycloak-core-18.0.2 |
GHSA-hqxw-f8mx-cpmw | Anchore CVE | High | github.com/docker/distribution-v2.8.1+incompatible |
CVE-2023-34462 | Anchore CVE | Medium | netty-4.0.8-1.0 |
GHSA-2qjp-425j-52j9 | Anchore CVE | Medium | github.com/containerd/containerd-v1.6.3 |
CVE-2007-1157 | Anchore CVE | High | jboss-logging-1.0 |
CVE-2021-21295 | Anchore CVE | Medium | netty-3.4-1.0 |
GHSA-33pg-m6jh-5237 | Anchore CVE | Medium | github.com/docker/docker-v20.10.17+incompatible |
CVE-2023-34462 | Anchore CVE | Medium | netty-3.8-1.0 |
CVE-2023-34462 | Anchore CVE | Medium | reactor-netty-http-1.0.21 |
CVE-2017-1000034 | Anchore CVE | High | akka-2.2-1.0 |
CVE-2023-34462 | Anchore CVE | Medium | netty-3.4-1.0 |
CVE-2023-32732 | Anchore CVE | Medium | grpc-1.4.0-1.0 |
CVE-2021-21290 | Anchore CVE | Medium | netty-3.8-1.0 |
CVE-2019-20445 | Anchore CVE | Critical | netty-4.0.8-1.0 |
CVE-2022-41881 | Anchore CVE | High | netty-3.4-1.0 |
CVE-2023-34454 | Anchore CVE | High | snappy-java-1.1.8.4 |
CVE-2022-41881 | Anchore CVE | High | netty-4.0.8-1.0 |
GHSA-7hfp-qfw3-5jxh | Anchore CVE | Medium | helm.sh/helm/v3-v3.9.0 |
GHSA-5cpq-8wj7-hf2v | Anchore CVE | Low | cryptography-40.0.2 |
CVE-2021-37136 | Anchore CVE | High | netty-4.0.8-1.0 |
GHSA-69cg-p879-7622 | Anchore CVE | High | golang.org/x/net-v0.0.0-20220225172249-27dd8689420f |
GHSA-h4h5-3hr4-j3g2 | Anchore CVE | Medium | protobuf-java-3.19.4 |
CVE-2023-3138 | Anchore CVE | Medium | libX11-common-1.6.8-5.el8 |
GHSA-232p-vwff-86mp | Anchore CVE | High | github.com/docker/docker-v20.10.17+incompatible |
GHSA-hqxw-f8mx-cpmw | Anchore CVE | High | github.com/docker/distribution-v2.8.1+incompatible |
CVE-2023-34478 | Anchore CVE | Critical | shiro-config-ogdl-1.11.0 |
CVE-2023-25165 | Anchore CVE | Medium | helm-3.9.4 |
GHSA-232p-vwff-86mp | Anchore CVE | High | github.com/docker/docker-v20.10.14+incompatible |
CVE-2023-28867 | Anchore CVE | High | graphql-java-17.0-1.0 |
CVE-2015-2156 | Anchore CVE | High | netty-3.8-1.0 |
CVE-2019-20445 | Anchore CVE | Critical | netty-3.4-1.0 |
GHSA-gwrp-pvrq-jmwv | Anchore CVE | Medium | commons-io-2.5 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-client-9.4.48.v20220622 |
GHSA-mjmq-gwgm-5qhm | Anchore CVE | Medium | sshd-sftp-2.9.2 |
CVE-2022-47008 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2020-19724 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-45703 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-48065 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47673 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47010 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2021-46174 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47696 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-48063 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-44840 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47011 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-48064 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2020-35342 | Anchore CVE | Medium | binutils-2.30-119.el8 |
CVE-2020-19726 | Anchore CVE | Medium | binutils-2.30-119.el8 |
CVE-2022-47695 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-35206 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47007 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2020-21490 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-35205 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2020-22916 | Anchore CVE | Low | xz-devel-5.2.4-4.el8_6 |
GHSA-hp87-p4gw-j4gq | Anchore CVE | High | gopkg.in/yaml.v3-v3.0.0-20210107192922-496545a6307b |
CVE-2023-40217 | Anchore CVE | High | python3.11-libs-3.11.2-2.el8_8.1 |
CVE-2023-41105 | Anchore CVE | Medium | python3.11-3.11.2-2.el8_8.1 |
CVE-2021-29390 | Anchore CVE | Medium | libjpeg-turbo-1.5.3-12.el8 |
CVE-2023-40217 | Anchore CVE | High | python3.11-3.11.2-2.el8_8.1 |
CVE-2023-41105 | Anchore CVE | Medium | python3.11-libs-3.11.2-2.el8_8.1 |
GHSA-6xv5-86q9-7xr8 | Anchore CVE | Medium | github.com/cyphar/filepath-securejoin-v0.2.3 |
GHSA-6xv5-86q9-7xr8 | Anchore CVE | Medium | github.com/cyphar/filepath-securejoin-v0.2.3 |
CVE-2023-4806 | Anchore CVE | Medium | glibc-headers-2.28-225.el8 |
CVE-2023-4813 | Anchore CVE | Medium | glibc-headers-2.28-225.el8 |
CVE-2023-4806 | Anchore CVE | Medium | glibc-devel-2.28-225.el8 |
CVE-2023-4813 | Anchore CVE | Medium | glibc-devel-2.28-225.el8 |
CVE-2023-4527 | Anchore CVE | Medium | glibc-devel-2.28-225.el8 |
CVE-2023-4527 | Anchore CVE | Medium | glibc-headers-2.28-225.el8 |
CVE-2023-4039 | Anchore CVE | Medium | gcc-8.5.0-18.el8 |
CVE-2023-4039 | Anchore CVE | Medium | libquadmath-8.5.0-18.el8 |
CVE-2023-4039 | Anchore CVE | Medium | libquadmath-devel-8.5.0-18.el8 |
CVE-2023-4039 | Anchore CVE | Medium | libgomp-8.5.0-18.el8 |
CVE-2023-4039 | Anchore CVE | Medium | gcc-c++-8.5.0-18.el8 |
CVE-2023-4039 | Anchore CVE | Medium | libgfortran-8.5.0-18.el8 |
CVE-2023-4039 | Anchore CVE | Medium | libstdc++-devel-8.5.0-18.el8 |
CVE-2023-4039 | Anchore CVE | Medium | gcc-gfortran-8.5.0-18.el8 |
CVE-2023-4039 | Anchore CVE | Medium | cpp-8.5.0-18.el8 |
GHSA-hmr7-m48g-48f6 | Anchore CVE | Medium | jetty-http-9.4.48.v20220622 |
GHSA-3p86-9955-h393 | Anchore CVE | High | org.eclipse.jgit-6.5.0.202303070854-r |
CVE-2022-3594 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2020-29374 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-3567 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-4001 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-3141 | Anchore CVE | Low | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-3534 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-3611 | Anchore CVE | High | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-34556 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-29657 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-4133 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-io-9.4.48.v20220622 |
CVE-2020-25645 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-3772 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-4244 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2020-12656 | Anchore CVE | Low | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-4135 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-28388 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-3773 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-4785 | Anchore CVE | High | grpc-1.40.0-1.0 |
CVE-2021-45402 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-1118 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-4010 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-2513 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-20569 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-2163 | Anchore CVE | High | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-20154 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-45886 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-4379 | Anchore CVE | High | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-3812 | Anchore CVE | High | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-21102 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-http-9.4.48.v20220622 |
CVE-2021-3714 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-4459 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2019-19535 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-4159 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-3212 | Anchore CVE | Low | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-1079 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2020-28097 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-38457 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-25775 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-40283 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-1665 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-28327 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-io-9.4.48.v20220622 |
CVE-2023-20583 | Anchore CVE | Low | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2020-3702 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-3565 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-41858 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2020-14416 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-4204 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-36280 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2019-15505 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-33203 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-4881 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-38096 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-31085 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-4387 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-46778 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-1073 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-1382 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-26545 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-31084 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-1972 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-1855 | Anchore CVE | Low | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-4207 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2020-36311 | Anchore CVE | Low | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-0597 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2020-27170 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-4194 | Anchore CVE | Low | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-3753 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-38409 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-client-9.4.48.v20220622 |
CVE-2022-4543 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-2176 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-23222 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-28464 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-0458 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-34866 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2020-15802 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2019-20794 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-35824 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-client-9.4.48.v20220622 |
CVE-2022-45884 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-util-9.4.48.v20220622 |
CVE-2022-2785 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-35477 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-31083 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-33952 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2020-27418 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-35825 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-42895 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-0459 | Anchore CVE | Low | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-3640 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-1074 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-4206 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-37453 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-3161 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-31082 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-1998 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
GHSA-v8gr-m533-ghj9 | Anchore CVE | Low | cryptography-40.0.2 |
CVE-2023-1989 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-4132 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-40133 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-4785 | Anchore CVE | High | grpc-1.30.0-1.0 |
CVE-2021-38206 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-3268 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-2503 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-43975 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-3545 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-23908 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2019-19530 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2020-10135 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-23824 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CCE-86519-6 | OSCAP Compliance | Medium | |
CCE-80806-3 | OSCAP Compliance | Medium | |
CCE-83497-8 | OSCAP Compliance | Medium | |
CVE-2022-48065 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-48064 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-48063 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47696 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47695 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47673 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47011 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47010 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47008 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47007 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-45703 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-44840 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-35206 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-35205 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2021-46174 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2020-35342 | Twistlock CVE | Medium | binutils-2.30-119.el8 |
CVE-2020-21490 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2020-19726 | Twistlock CVE | Medium | binutils-2.30-119.el8 |
CVE-2020-19724 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2023-40217 | Twistlock CVE | Critical | python3.11-libs-3.11.2-2.el8_8.1 |
CVE-2023-40217 | Twistlock CVE | Critical | python3.11-3.11.2-2.el8_8.1 |
CVE-2022-28948 | Twistlock CVE | High | gopkg.in/yaml.v3-v3.0.0-20210107192922-496545a6307b |
CVE-2023-41105 | Twistlock CVE | Medium | python3.11-libs-3.11.2-2.el8_8.1 |
CVE-2023-41105 | Twistlock CVE | Medium | python3.11-3.11.2-2.el8_8.1 |
CVE-2021-29390 | Twistlock CVE | Medium | libjpeg-turbo-1.5.3-12.el8 |
CVE-2023-33201 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.67 |
GHSA-6xv5-86q9-7xr8 | Twistlock CVE | Medium | github.com/cyphar/filepath-securejoin-v0.2.3 |
CVE-2023-4527 | Twistlock CVE | Medium | glibc-devel-2.28-225.el8 |
CVE-2023-4527 | Twistlock CVE | Medium | glibc-headers-2.28-225.el8 |
CVE-2023-4813 | Twistlock CVE | Medium | glibc-devel-2.28-225.el8 |
CVE-2023-4813 | Twistlock CVE | Medium | glibc-headers-2.28-225.el8 |
CVE-2023-4806 | Twistlock CVE | Medium | glibc-headers-2.28-225.el8 |
CVE-2023-4806 | Twistlock CVE | Medium | glibc-devel-2.28-225.el8 |
CVE-2023-4039 | Twistlock CVE | Medium | libgfortran-8.5.0-18.el8 |
CVE-2023-4039 | Twistlock CVE | Medium | libstdc++-devel-8.5.0-18.el8 |
CVE-2023-4039 | Twistlock CVE | Medium | libgomp-8.5.0-18.el8 |
CVE-2023-4039 | Twistlock CVE | Medium | cpp-8.5.0-18.el8 |
CVE-2023-4039 | Twistlock CVE | Medium | gcc-gfortran-8.5.0-18.el8 |
CVE-2023-4039 | Twistlock CVE | Medium | gcc-8.5.0-18.el8 |
CVE-2023-4039 | Twistlock CVE | Medium | libquadmath-devel-8.5.0-18.el8 |
CVE-2023-4039 | Twistlock CVE | Medium | libquadmath-8.5.0-18.el8 |
CVE-2023-4039 | Twistlock CVE | Medium | gcc-c++-8.5.0-18.el8 |
CVE-2023-39319 | Twistlock CVE | Medium | go-1.17.13 |
CVE-2023-39319 | Twistlock CVE | Medium | go-1.17.12 |
CVE-2023-39318 | Twistlock CVE | Medium | go-1.17.13 |
CVE-2023-39318 | Twistlock CVE | Medium | go-1.17.12 |
CVE-2023-4759 | Twistlock CVE | High | org.eclipse.jgit_org.eclipse.jgit-6.5.0.202303070854 |
CVE-2022-3916 | Twistlock CVE | Medium | org.keycloak_keycloak-core-18.0.2 |
CVE-2023-41900 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.48 |
GHSA-v8gr-m533-ghj9 | Twistlock CVE | Low | cryptography-40.0.2 |
CVE-2023-31436 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-util-9.4.48.v20220622 |
CVE-2022-20166 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-3178 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-0047 | Anchore CVE | Low | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-1838 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-3609 | Anchore CVE | High | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-0264 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2020-25656 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-4128 | Anchore CVE | High | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-1075 | Anchore CVE | Low | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2019-19536 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2019-19529 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2020-26555 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-2248 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-1252 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-20566 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2019-13631 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-util-9.4.48.v20220622 |
CVE-2023-4155 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-33951 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-4622 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-0590 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2019-15213 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-2905 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-0886 | Anchore CVE | High | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-4563 | Anchore CVE | Low | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-2162 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2020-10741 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-0500 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-3640 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-45885 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-1513 | Anchore CVE | Low | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-3444 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2019-15794 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-2166 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-34693 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-45934 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-42432 | Anchore CVE | Low | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-28972 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-40982 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-1380 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-2483 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-2269 | Anchore CVE | Low | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-30456 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-0171 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-io-9.4.48.v20220622 |
CVE-2023-1077 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-20320 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-45869 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-1206 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-38198 | Anchore CVE | Low | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-38166 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2019-20095 | Anchore CVE | Low | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2020-14390 | Anchore CVE | Low | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-28772 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-35823 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-23455 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-3006 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-4744 | Anchore CVE | High | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-36402 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-3896 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2020-27171 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-34981 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-40490 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-3327 | Anchore CVE | Low | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-33624 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-45887 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-28410 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-client-9.4.48.v20220622 |
CVE-2019-15219 | Anchore CVE | Low | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-1192 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-28328 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-45919 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-3655 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2019-14283 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-3424 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2020-35501 | Anchore CVE | Low | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-http-9.4.48.v20220622 |
CVE-2023-3159 | Anchore CVE | Low | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2023-24056 | Anchore CVE | Medium | pkgconf-1.4.2-1.el8 |
CVE-2023-27043 | Anchore CVE | Medium | python3.11-3.11.2-2.el8_8.1 |
CVE-2023-1579 | Anchore CVE | Medium | binutils-2.30-119.el8 |
CVE-2022-44638 | Anchore CVE | Medium | pixman-0.38.4-2.el8 |
CVE-2023-24056 | Anchore CVE | Medium | libpkgconf-1.4.2-1.el8 |
CVE-2023-37454 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2021-32256 | Anchore CVE | Medium | binutils-2.30-119.el8 |
CVE-2023-36632 | Anchore CVE | Medium | python3.11-libs-3.11.2-2.el8_8.1 |
CVE-2023-24056 | Anchore CVE | Medium | pkgconf-pkg-config-1.4.2-1.el8 |
CVE-2023-24056 | Anchore CVE | Medium | pkgconf-m4-1.4.2-1.el8 |
CVE-2023-27043 | Anchore CVE | Medium | python3.11-libs-3.11.2-2.el8_8.1 |
CVE-2023-36632 | Anchore CVE | Medium | python3.11-3.11.2-2.el8_8.1 |
CVE-2023-5156 | Anchore CVE | Medium | glibc-devel-2.28-225.el8 |
CVE-2023-5156 | Anchore CVE | Medium | glibc-headers-2.28-225.el8 |
CVE-2023-25193 | Anchore CVE | Medium | harfbuzz-1.7.5-3.el8 |
CVE-2023-42753 | Anchore CVE | High | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-40897 | Anchore CVE | Medium | python3.11-setuptools-wheel-65.5.1-2.el8 |
CVE-2023-42755 | Anchore CVE | Medium | kernel-headers-4.18.0-477.27.1.el8_8 |
CVE-2022-4645 | Anchore CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-30774 | Anchore CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-41175 | Anchore CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-1916 | Anchore CVE | Low | libtiff-4.0.9-29.el8_8 |
CVE-2022-40090 | Anchore CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-30775 | Anchore CVE | Medium | libtiff-4.0.9-29.el8_8 |
GHSA-xhw6-hjc9-679m | Anchore CVE | High | pac4j-oidc-4.0.1 |
CVE-2023-43642 | Anchore CVE | High | snappy-java-1.1.8.4 |
CVE-2023-25433 | Anchore CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-38289 | Anchore CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-38288 | Anchore CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2022-40897 | Anchore CVE | Medium | python3.11-setuptools-65.5.1-2.el8 |
CVE-2023-3576 | Anchore CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2022-1056 | Anchore CVE | Low | libtiff-4.0.9-29.el8_8 |
CVE-2022-3570 | Anchore CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2020-18768 | Anchore CVE | Low | libtiff-4.0.9-29.el8_8 |
CVE-2023-26966 | Anchore CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-40745 | Anchore CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-40167 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.48 |
CVE-2023-40167 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-http-9.4.48 |
CVE-2023-26049 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.48 |
CVE-2023-26048 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.48 |
CVE-2023-36479 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.48 |
CVE-2023-43642 | Twistlock CVE | High | org.xerial.snappy_snappy-java-1.1.8.4 |
CVE-2022-41881 | Twistlock CVE | High | io.netty_netty-codec-4.1.79 |
CVE-2023-34462 | Twistlock CVE | Medium | io.netty_netty-handler-4.1.79 |
CVE-2023-34462 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.79 |
CVE-2021-44878 | Twistlock CVE | High | org.pac4j_pac4j-oidc-4.0.1 |
CVE-2017-17095 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-41175 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-40745 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-3618 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2022-40090 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2022-3599 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2022-3598 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-30775 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-30774 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-0804 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-0803 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-0802 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-0801 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-0800 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-0798 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-0797 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-0796 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-0795 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2022-40897 | Twistlock CVE | Medium | python3.11-setuptools-wheel-65.5.1-2.el8 |
CVE-2022-40897 | Twistlock CVE | Medium | python3.11-setuptools-65.5.1-2.el8 |
CVE-2022-4645 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-3576 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-3316 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-3164 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-30086 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-26966 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-26965 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-25435 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-25434 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-25433 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2023-0799 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2022-3570 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2018-16335 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2018-15209 | Twistlock CVE | Medium | libtiff-4.0.9-29.el8_8 |
CVE-2019-6128 | Twistlock CVE | Low | libtiff-4.0.9-29.el8_8 |
CVE-2023-1916 | Twistlock CVE | Low | libtiff-4.0.9-29.el8_8 |
CVE-2022-1354 | Twistlock CVE | Low | libtiff-4.0.9-29.el8_8 |
CVE-2022-1056 | Twistlock CVE | Low | libtiff-4.0.9-29.el8_8 |
CVE-2020-18768 | Twistlock CVE | Low | libtiff-4.0.9-29.el8_8 |
CVE-2018-10779 | Twistlock CVE | Low | libtiff-4.0.9-29.el8_8 |
CVE-2018-17101 | Twistlock CVE | Low | libtiff-4.0.9-29.el8_8 |
CVE-2018-5360 | Twistlock CVE | Low | libtiff-4.0.9-29.el8_8 |
CVE-2018-19210 | Twistlock CVE | Low | libtiff-4.0.9-29.el8_8 |
CVE-2018-10801 | Twistlock CVE | Low | libtiff-4.0.9-29.el8_8 |
VAT: https://vat.dso.mil/vat/image?imageName=domino/nucleus&tag=5.7.0&branch=master
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=domino/nucleus&tag=5.7.0&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.