chore(findings): elastic/ent-search/ent-search
Summary
elastic/ent-search/ent-search has 970 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
CVE-2023-6597 | Anchore CVE | High | python3-libs-3.6.8-56.el8_9.3 |
GHSA-xqfj-vm6h-2x34 | Anchore CVE | High | commons-compress-1.20 |
CVE-2024-2398 | Anchore CVE | Medium | libcurl-7.61.1-33.el8_9.5 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-continuation-9.4.43.v20210629 |
CVE-2021-22696 | Anchore CVE | High | cxf-rt-frontend-jaxrs-3.3.6 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-continuation-9.4.43.v20210629 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-util-ajax-9.4.43.v20210629 |
GHSA-m425-mq94-257g | Anchore CVE | High | google.golang.org/grpc-v1.41.0 |
CVE-2022-48560 | Anchore CVE | Medium | python2-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2023-41900 | Anchore CVE | Medium | jetty-webapp-9.4.43.v20210629 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-server-9.4.43.v20210629 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-servlet-9.4.43.v20210629 |
CVE-2023-36478 | Anchore CVE | High | jetty-servlets-9.4.43.v20210629 |
CVE-2022-25169 | Anchore CVE | Medium | tika-parsers-1.24.1 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-jmx-9.4.43.v20210629 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-io-9.4.43.v20210629 |
GHSA-579w-22j4-4749 | Anchore CVE | High | activerecord-5.2.8.1 |
GHSA-hp87-p4gw-j4gq | Anchore CVE | High | gopkg.in/yaml.v3-v3.0.0-20210107192922-496545a6307b |
GHSA-2qjp-425j-52j9 | Anchore CVE | Medium | github.com/containerd/containerd-v1.5.7 |
GHSA-4v6p-cxf9-98rf | Anchore CVE | Medium | metadata-extractor-2.13.0 |
GHSA-59gp-qqm7-cw4j | Anchore CVE | High | nokogiri-1.12.5 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-security-9.4.43.v20210629 |
CVE-2023-44487 | Anchore CVE | High | jetty-util-ajax-9.4.43.v20210629 |
GHSA-v6gp-9mmm-c6p5 | Anchore CVE | High | nokogiri-1.12.5 |
GHSA-xxx9-3xcr-gjj3 | Anchore CVE | Medium | nokogiri-1.12.5 |
GHSA-hmr7-m48g-48f6 | Anchore CVE | Medium | jetty-http-9.4.43.v20210629 |
CVE-2023-44487 | Anchore CVE | High | jetty-util-9.4.43.v20210629 |
GHSA-mvff-h3cj-wj9c | Anchore CVE | High | github.com/containerd/containerd-v1.5.7 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-util-ajax-9.4.43.v20210629 |
CVE-2023-7008 | Anchore CVE | Medium | systemd-239-78.el8 |
GHSA-2wrh-6pvc-2jm9 | Anchore CVE | Medium | golang.org/x/net-v0.0.0-20211020060615-d418f374d309 |
GHSA-54rr-7fvw-6x8f | Anchore CVE | Low | rack-2.1.4.3 |
GHSA-69ch-w2m2-3vjp | Anchore CVE | High | golang.org/x/text-v0.3.6 |
CVE-2023-43787 | Anchore CVE | Medium | libX11-1.6.8-6.el8 |
GHSA-gwrp-pvrq-jmwv | Anchore CVE | Medium | commons-io-2.4 |
CVE-2022-2048 | Anchore CVE | High | jetty-webapp-9.4.43.v20210629 |
GHSA-5j5w-g665-5m35 | Anchore CVE | Low | github.com/containerd/containerd-v1.5.7 |
GHSA-45x7-px36-x8w8 | Anchore CVE | Medium | golang.org/x/crypto-v0.0.0-20210616213533-5ff15b29337e |
CVE-2023-26048 | Anchore CVE | Medium | jetty-xml-9.4.43.v20210629 |
GHSA-3x8x-79m2-3w2w | Anchore CVE | High | jackson-databind-2.10.3 |
GHSA-259w-8hf6-59c2 | Anchore CVE | Medium | github.com/containerd/containerd-v1.5.7 |
GHSA-vvpx-j8f3-3w6h | Anchore CVE | High | golang.org/x/net-v0.0.0-20211020060615-d418f374d309 |
GHSA-mqvp-7rrg-9jxc | Anchore CVE | Medium | poi-scratchpad-4.1.2 |
CVE-2022-48565 | Twistlock CVE | Critical | python-2.7.18 |
CVE-2022-48565 | Twistlock CVE | Critical | python-2.7.18 |
CVE-2022-46364 | Twistlock CVE | Critical | org.apache.cxf_cxf-core-3.3.13 |
CVE-2022-1471 | Twistlock CVE | Critical | org.yaml_snakeyaml-1.26 |
CVE-2021-30560 | Twistlock CVE | High | nokogiri-1.12.5 |
CVE-2022-29181 | Twistlock CVE | High | nokogiri-1.12.5 |
CVE-2020-28052 | Twistlock CVE | High | org.bouncycastle_bcprov-jdk15on-1.65 |
CVE-2021-43816 | Twistlock CVE | High | github.com/containerd/containerd-v1.5.7 |
CVE-2022-25647 | Twistlock CVE | High | gson-2.2.2 |
CVE-2022-25647 | Twistlock CVE | High | com.google.code.gson_gson-2.8.6 |
CVE-2023-44487 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-9.4.43.v20210629 |
CVE-2023-39325 | Twistlock CVE | High | golang.org/x/net/http2-v0.0.0-20211020060615-d418f374d309 |
CVE-2023-36478 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-9.4.43.v20210629 |
CVE-2023-24329 | Twistlock CVE | High | python-2.7.18 |
CVE-2023-24329 | Twistlock CVE | High | python-2.7.18 |
CVE-2022-48560 | Twistlock CVE | High | python-2.7.18 |
CVE-2022-48560 | Twistlock CVE | High | python-2.7.18 |
CVE-2022-46363 | Twistlock CVE | High | org.apache.cxf_cxf-core-3.3.13 |
CVE-2022-45061 | Twistlock CVE | High | python-2.7.18 |
CVE-2022-45061 | Twistlock CVE | High | python-2.7.18 |
CVE-2022-42004 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.10.3 |
CVE-2022-42003 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.10.3 |
CVE-2022-41723 | Twistlock CVE | High | golang.org/x/net/http2-v0.0.0-20211020060615-d418f374d309 |
CVE-2022-32149 | Twistlock CVE | High | golang.org/x/text/language-v0.3.6 |
CVE-2022-32149 | Twistlock CVE | High | golang.org/x/text/language-v0.3.7 |
CVE-2022-28948 | Twistlock CVE | High | gopkg.in/yaml.v3-v3.0.0-20210107192922-496545a6307b |
CVE-2022-27664 | Twistlock CVE | High | golang.org/x/net/http2-v0.0.0-20211020060615-d418f374d309 |
CVE-2022-25857 | Twistlock CVE | High | org.yaml_snakeyaml-1.26 |
CVE-2022-24839 | Twistlock CVE | High | nokogiri-1.12.5 |
CVE-2022-24839 | Twistlock CVE | High | nekohtml-1.9.21 |
CVE-2022-24836 | Twistlock CVE | High | nokogiri-1.12.5 |
CVE-2022-23648 | Twistlock CVE | High | github.com/containerd/containerd-v1.5.7 |
CVE-2022-23596 | Twistlock CVE | High | com.github.junrar_junrar-4.0.0 |
CVE-2022-23517 | Twistlock CVE | High | rails-html-sanitizer-1.3.0 |
CVE-2022-23516 | Twistlock CVE | High | loofah-2.9.1 |
CVE-2022-23514 | Twistlock CVE | High | loofah-2.9.1 |
CVE-2022-2048 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-9.4.43.v20210629 |
CVE-2022-0391 | Twistlock CVE | High | python-2.7.18 |
CVE-2022-0391 | Twistlock CVE | High | python-2.7.18 |
CVE-2021-46877 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.10.3 |
CVE-2021-44716 | Twistlock CVE | High | golang.org/x/net/http2-v0.0.0-20211020060615-d418f374d309 |
CVE-2021-38561 | Twistlock CVE | High | golang.org/x/text/language-v0.3.6 |
CVE-2021-37714 | Twistlock CVE | High | org.jsoup_jsoup-1.13.1 |
CVE-2021-36090 | Twistlock CVE | High | org.apache.commons_commons-compress-1.20 |
CVE-2021-35517 | Twistlock CVE | High | org.apache.commons_commons-compress-1.20 |
CVE-2021-35516 | Twistlock CVE | High | org.apache.commons_commons-compress-1.20 |
CVE-2021-35515 | Twistlock CVE | High | org.apache.commons_commons-compress-1.20 |
CVE-2021-32740 | Twistlock CVE | High | addressable-2.5.2 |
CVE-2020-25649 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.10.3 |
CVE-2019-9674 | Twistlock CVE | High | python-2.7.18 |
CVE-2019-9674 | Twistlock CVE | High | python-2.7.18 |
CVE-2018-25032 | Twistlock CVE | High | nokogiri-1.12.5 |
CVE-2021-43809 | Twistlock CVE | High | bundler-2.2.29 |
CVE-2015-5652 | Twistlock CVE | High | python-2.7.18 |
CVE-2015-5652 | Twistlock CVE | High | python-2.7.18 |
CVE-2023-2976 | Twistlock CVE | High | com.google.guava_guava-28.2-jre |
CVE-2022-26488 | Twistlock CVE | High | python-2.7.18 |
CVE-2022-26488 | Twistlock CVE | High | python-2.7.18 |
CVE-2023-44487 | Twistlock CVE | High | golang.org/x/net-v0.0.0-20211020060615-d418f374d309 |
CVE-2023-44487 | Twistlock CVE | High | google.golang.org/grpc-v1.41.0 |
CVE-2023-43787 | Twistlock CVE | Medium | libX11-common-1.6.8-6.el8 |
CVE-2023-43787 | Twistlock CVE | Medium | libX11-1.6.8-6.el8 |
CVE-2022-48565 | Twistlock CVE | Medium | python2-libs-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2022-48565 | Twistlock CVE | Medium | python2-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2024-3205 | Twistlock CVE | Medium | libyaml-0.1.7-5.el8 |
CVE-2024-27316 | Twistlock CVE | Medium | libnghttp2-1.33.0-5.el8_9 |
CVE-2024-25062 | Twistlock CVE | Medium | libxml2-2.9.7-18.el8_9 |
CVE-2024-25062 | Twistlock CVE | Medium | python3-libxml2-2.9.7-18.el8_9 |
CVE-2024-2398 | Twistlock CVE | Medium | libcurl-7.61.1-33.el8_9.5 |
CVE-2024-2398 | Twistlock CVE | Medium | curl-7.61.1-33.el8_9.5 |
CVE-2022-48560 | Twistlock CVE | Medium | python2-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2022-48560 | Twistlock CVE | Medium | python2-libs-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2020-10735 | Twistlock CVE | Medium | python2-libs-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2020-10735 | Twistlock CVE | Medium | python2-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2020-11023 | Twistlock CVE | Medium | jquery-1.12.4 |
CVE-2020-11022 | Twistlock CVE | Medium | jquery-1.12.4 |
CVE-2023-5455 | Twistlock CVE | Medium | krb5-libs-1.18.2-26.el8_9 |
CVE-2023-43785 | Twistlock CVE | Medium | libX11-common-1.6.8-6.el8 |
CVE-2023-43785 | Twistlock CVE | Medium | libX11-1.6.8-6.el8 |
CVE-2023-34246 | Twistlock CVE | Medium | doorkeeper-4.4.3 |
CVE-2022-48564 | Twistlock CVE | Medium | python-2.7.18 |
CVE-2022-48564 | Twistlock CVE | Medium | python-2.7.18 |
CVE-2022-41854 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.26 |
CVE-2022-40152 | Twistlock CVE | Medium | com.fasterxml.woodstox_woodstox-core-5.0.3 |
CVE-2022-38752 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.26 |
CVE-2022-38751 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.26 |
CVE-2022-38749 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.26 |
CVE-2022-23990 | Twistlock CVE | Medium | expat-devel-2.2.5-11.el8_9.1 |
CVE-2022-23990 | Twistlock CVE | Medium | expat-2.2.5-11.el8_9.1 |
CVE-2022-23437 | Twistlock CVE | Medium | xerces_xercesImpl-2.12.0 |
CVE-2022-23437 | Twistlock CVE | Medium | nokogiri-1.12.5 |
CVE-2021-3733 | Twistlock CVE | Medium | python-2.7.18 |
CVE-2021-3733 | Twistlock CVE | Medium | python-2.7.18 |
CVE-2020-8492 | Twistlock CVE | Medium | python2-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2020-8492 | Twistlock CVE | Medium | python2-libs-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2022-36033 | Twistlock CVE | Medium | org.jsoup_jsoup-1.13.1 |
CVE-2022-32209 | Twistlock CVE | Medium | rails-html-sanitizer-1.3.0 |
CVE-2022-23520 | Twistlock CVE | Medium | rails-html-sanitizer-1.3.0 |
CVE-2022-23519 | Twistlock CVE | Medium | rails-html-sanitizer-1.3.0 |
CVE-2022-23518 | Twistlock CVE | Medium | rails-html-sanitizer-1.3.0 |
CVE-2022-23515 | Twistlock CVE | Medium | loofah-2.9.1 |
CVE-2020-23064 | Twistlock CVE | Medium | jquery-1.12.4 |
CVE-2019-11358 | Twistlock CVE | Medium | jquery-1.12.4 |
CVE-2015-9251 | Twistlock CVE | Medium | jquery-1.12.4 |
CVE-2024-2236 | Twistlock CVE | Medium | libgcrypt-1.8.5-7.el8_6 |
CVE-2024-1931 | Twistlock CVE | Medium | unbound-libs-1.16.2-5.el8_9.6 |
CVE-2024-1931 | Twistlock CVE | Medium | python3-unbound-1.16.2-5.el8_9.6 |
CVE-2023-7008 | Twistlock CVE | Medium | systemd-pam-239-78.el8 |
CVE-2023-7008 | Twistlock CVE | Medium | systemd-239-78.el8 |
CVE-2023-7008 | Twistlock CVE | Medium | systemd-libs-239-78.el8 |
CVE-2022-48566 | Twistlock CVE | Medium | python-2.7.18 |
CVE-2022-48566 | Twistlock CVE | Medium | python-2.7.18 |
CVE-2022-40897 | Twistlock CVE | Medium | python2-setuptools-39.0.1-13.module+el8.9.0+19487+7dc18407 |
CVE-2022-40897 | Twistlock CVE | Medium | python2-setuptools-wheel-39.0.1-13.module+el8.9.0+19487+7dc18407 |
CVE-2021-23336 | Twistlock CVE | Medium | python-2.7.18 |
CVE-2021-23336 | Twistlock CVE | Medium | python-2.7.18 |
CVE-2020-14422 | Twistlock CVE | Medium | python2-pip-wheel-9.0.3-19.module+el8.9.0+19487+7dc18407 |
CVE-2020-14422 | Twistlock CVE | Medium | python2-pip-9.0.3-19.module+el8.9.0+19487+7dc18407 |
CVE-2022-23471 | Twistlock CVE | Medium | github.com/containerd/containerd-v1.5.7 |
CVE-2024-25710 | Twistlock CVE | Medium | org.apache.commons_commons-compress-1.20 |
CVE-2024-22365 | Twistlock CVE | Medium | pam-1.3.1-27.el8 |
CVE-2023-52426 | Twistlock CVE | Medium | expat-2.2.5-11.el8_9.1 |
CVE-2023-52426 | Twistlock CVE | Medium | expat-devel-2.2.5-11.el8_9.1 |
CVE-2023-43786 | Twistlock CVE | Medium | libX11-common-1.6.8-6.el8 |
CVE-2023-43786 | Twistlock CVE | Medium | libX11-1.6.8-6.el8 |
CVE-2023-33202 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.65 |
CVE-2023-33202 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.62 |
CVE-2022-38750 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.26 |
CVE-2022-31030 | Twistlock CVE | Medium | github.com/containerd/containerd-v1.5.7 |
CVE-2022-30973 | Twistlock CVE | Medium | org.apache.tika_tika-core-1.24.1 |
CVE-2022-30126 | Twistlock CVE | Medium | org.apache.tika_tika-core-1.24.1 |
CVE-2022-26336 | Twistlock CVE | Medium | org.apache.poi_poi-scratchpad-4.1.2 |
CVE-2022-26336 | Twistlock CVE | Medium | org.apache.poi_poi-ooxml-4.1.2 |
CVE-2022-25169 | Twistlock CVE | Medium | org.apache.tika_tika-core-1.24.1 |
CVE-2022-24614 | Twistlock CVE | Medium | com.drewnoakes_metadata-extractor-2.13.0 |
CVE-2022-24613 | Twistlock CVE | Medium | com.drewnoakes_metadata-extractor-2.13.0 |
CVE-2021-28657 | Twistlock CVE | Medium | org.apache.tika_tika-core-1.24.1 |
GHSA-3m87-5598-2v4f | Twistlock CVE | Medium | github.com/prometheus/prometheus-v2.5.0 |
CVE-2024-28182 | Twistlock CVE | Medium | libnghttp2-1.33.0-5.el8_9 |
CVE-2023-40217 | Twistlock CVE | Medium | python-2.7.18 |
CVE-2023-40217 | Twistlock CVE | Medium | python-2.7.18 |
CVE-2023-40167 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-http-9.4.43.v20210629 |
CVE-2023-40167 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.43.v20210629 |
CVE-2023-33201 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.65 |
CVE-2023-33201 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.62 |
CVE-2023-27043 | Twistlock CVE | Medium | python2-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2023-27043 | Twistlock CVE | Medium | python2-libs-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2023-27043 | Twistlock CVE | Medium | python-2.7.18 |
CVE-2023-27043 | Twistlock CVE | Medium | python-2.7.18 |
CVE-2023-26049 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.43.v20210629 |
CVE-2023-26048 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.43.v20210629 |
CVE-2023-26048 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.43.v20210629 |
CVE-2022-41717 | Twistlock CVE | Medium | golang.org/x/net/http2-v0.0.0-20211020060615-d418f374d309 |
CVE-2022-29526 | Twistlock CVE | Medium | golang.org/x/sys/unix-v0.0.0-20211007075335-d3039528d8ac |
CVE-2022-29526 | Twistlock CVE | Medium | golang.org/x/sys/unix-v0.0.0-20211102192858-4dd72447c267 |
CVE-2020-14338 | Twistlock CVE | Medium | xerces_xercesImpl-2.12.0 |
CVE-2020-13956 | Twistlock CVE | Medium | org.apache.httpcomponents_httpclient-4.5.2 |
CVE-2020-15522 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.65 |
CVE-2020-15522 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.62 |
CVE-2021-29425 | Twistlock CVE | Medium | commons-io_commons-io-2.4 |
CVE-2023-41900 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.43.v20210629 |
CVE-2023-36479 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.43.v20210629 |
CVE-2024-28752 | Twistlock CVE | Medium | org.apache.cxf_cxf-core-3.3.13 |
CVE-2024-21742 | Twistlock CVE | Medium | org.apache.james_apache-mime4j-core-0.8.3 |
CVE-2023-45288 | Twistlock CVE | Medium | golang.org/x/net/http2-v0.0.0-20211020060615-d418f374d309 |
CVE-2019-9674 | Twistlock CVE | Low | platform-python-3.6.8-56.el8_9.3 |
CVE-2019-9674 | Twistlock CVE | Low | python2-libs-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2019-9674 | Twistlock CVE | Low | python3-libs-3.6.8-56.el8_9.3 |
CVE-2019-9674 | Twistlock CVE | Low | python2-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2019-19244 | Twistlock CVE | Low | sqlite-libs-3.26.0-19.el8_9 |
CVE-2023-50495 | Twistlock CVE | Low | ncurses-base-6.1-10.20180224.el8 |
CVE-2023-50495 | Twistlock CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
CVE-2023-2650 | Twistlock CVE | Low | openssl-libs-1.1.1k-12.el8_9 |
CVE-2023-2650 | Twistlock CVE | Low | openssl-1.1.1k-12.el8_9 |
CVE-2021-4209 | Twistlock CVE | Low | gnutls-3.6.16-8.el8_9.3 |
CVE-2023-6004 | Twistlock CVE | Low | libssh-0.9.6-13.el8_9 |
CVE-2023-6004 | Twistlock CVE | Low | libssh-config-0.9.6-13.el8_9 |
CVE-2024-26461 | Twistlock CVE | Low | krb5-libs-1.18.2-26.el8_9 |
CVE-2024-26458 | Twistlock CVE | Low | krb5-libs-1.18.2-26.el8_9 |
CVE-2023-0464 | Twistlock CVE | Low | openssl-1.1.1k-12.el8_9 |
CVE-2023-0464 | Twistlock CVE | Low | openssl-libs-1.1.1k-12.el8_9 |
CVE-2020-12413 | Twistlock CVE | Low | nss-util-3.90.0-6.el8_9 |
CVE-2020-12413 | Twistlock CVE | Low | nss-sysinit-3.90.0-6.el8_9 |
CVE-2020-12413 | Twistlock CVE | Low | nss-softokn-3.90.0-6.el8_9 |
CVE-2020-12413 | Twistlock CVE | Low | nss-softokn-freebl-3.90.0-6.el8_9 |
CVE-2020-12413 | Twistlock CVE | Low | nss-3.90.0-6.el8_9 |
CVE-2024-2397 | Twistlock CVE | Low | libpcap-1.9.1-5.el8 |
CVE-2024-0727 | Twistlock CVE | Low | openssl-1.1.1k-12.el8_9 |
CVE-2024-0727 | Twistlock CVE | Low | openssl-libs-1.1.1k-12.el8_9 |
CVE-2023-24056 | Twistlock CVE | Low | pkgconf-m4-1.4.2-1.el8 |
CVE-2023-24056 | Twistlock CVE | Low | libpkgconf-1.4.2-1.el8 |
CVE-2023-24056 | Twistlock CVE | Low | pkgconf-pkg-config-1.4.2-1.el8 |
CVE-2023-24056 | Twistlock CVE | Low | pkgconf-1.4.2-1.el8 |
CVE-2022-3857 | Twistlock CVE | Low | libpng-devel-1.6.34-5.el8 |
CVE-2022-3857 | Twistlock CVE | Low | libpng-1.6.34-5.el8 |
CVE-2022-27943 | Twistlock CVE | Low | libgomp-8.5.0-20.el8 |
CVE-2023-0466 | Twistlock CVE | Low | openssl-libs-1.1.1k-12.el8_9 |
CVE-2023-0466 | Twistlock CVE | Low | openssl-1.1.1k-12.el8_9 |
CVE-2023-0465 | Twistlock CVE | Low | openssl-1.1.1k-12.el8_9 |
CVE-2023-0465 | Twistlock CVE | Low | openssl-libs-1.1.1k-12.el8_9 |
CVE-2022-41409 | Twistlock CVE | Low | pcre2-10.32-3.el8_6 |
CVE-2019-7317 | Twistlock CVE | Low | libpng-1.6.34-5.el8 |
CVE-2019-7317 | Twistlock CVE | Low | libpng-devel-1.6.34-5.el8 |
CVE-2019-16866 | Twistlock CVE | Low | unbound-libs-1.16.2-5.el8_9.6 |
CVE-2019-16866 | Twistlock CVE | Low | python3-unbound-1.16.2-5.el8_9.6 |
CVE-2024-0232 | Twistlock CVE | Low | sqlite-libs-3.26.0-19.el8_9 |
CVE-2024-25260 | Twistlock CVE | Low | elfutils-libelf-0.189-3.el8 |
CVE-2024-25260 | Twistlock CVE | Low | elfutils-default-yama-scope-0.189-3.el8 |
CVE-2024-25260 | Twistlock CVE | Low | elfutils-libs-0.189-3.el8 |
CVE-2019-12900 | Twistlock CVE | Low | bzip2-devel-1.0.6-26.el8 |
GHSA-58qw-p7qm-5rvh | Twistlock CVE | Low | org.eclipse.jetty_jetty-xml-9.4.43.v20210629 |
CVE-2024-2511 | Twistlock CVE | Low | openssl-1.1.1k-12.el8_9 |
CVE-2024-2511 | Twistlock CVE | Low | openssl-libs-1.1.1k-12.el8_9 |
CVE-2023-6918 | Twistlock CVE | Low | libssh-0.9.6-13.el8_9 |
CVE-2023-6918 | Twistlock CVE | Low | libssh-config-0.9.6-13.el8_9 |
CVE-2023-27534 | Twistlock CVE | Low | curl-7.61.1-33.el8_9.5 |
CVE-2023-27534 | Twistlock CVE | Low | libcurl-7.61.1-33.el8_9.5 |
CVE-2023-36479 | Twistlock CVE | Low | org.eclipse.jetty_jetty-servlets-9.4.43.v20210629 |
CVE-2023-39804 | Twistlock CVE | Low | tar-1.30-9.el8 |
CVE-2022-33879 | Twistlock CVE | Low | org.apache.tika_tika-core-1.24.1 |
CVE-2020-8908 | Twistlock CVE | Low | com.google.guava_guava-28.2-jre |
CVE-2019-9937 | Twistlock CVE | Low | sqlite-libs-3.26.0-19.el8_9 |
CVE-2019-9936 | Twistlock CVE | Low | sqlite-libs-3.26.0-19.el8_9 |
CVE-2019-14250 | Twistlock CVE | Low | libgomp-8.5.0-20.el8 |
CVE-2018-20657 | Twistlock CVE | Low | libgomp-8.5.0-20.el8 |
GHSA-77vh-xpmg-72qh | Twistlock CVE | Low | github.com/opencontainers/image-spec-v1.0.2-0.20190823105129-775207bd45b6 |
GHSA-5j5w-g665-5m35 | Twistlock CVE | Low | github.com/containerd/containerd-v1.5.7 |
CVE-2022-2047 | Twistlock CVE | Low | org.eclipse.jetty_jetty-http-9.4.43.v20210629 |
CVE-2022-2047 | Twistlock CVE | Low | org.eclipse.jetty_jetty-io-9.4.43.v20210629 |
CVE-2023-26049 | Twistlock CVE | Low | org.eclipse.jetty_jetty-server-9.4.43.v20210629 |
GO-2022-0379 | Twistlock CVE | Low | github.com/docker/distribution-v2.7.1 |
addbb93c22e9b0988b8b40392a4538cb | Anchore Compliance | Low | |
4940a20615a4bcd20ae968fc058b9a3b | Anchore Compliance | Critical | |
ab01b296c13b51fa5525bb83bbc46e12 | Anchore Compliance | Critical | |
daba1b7cc1ff63b6c3b507d3e7f1201f | Anchore Compliance | Critical | |
9c0fdc500c742d2eb2dcd1eb04bea081 | Anchore Compliance | Critical | |
664f9f55dca7aab5069e91c02f3a0b9e | Anchore Compliance | Critical | |
62de2901e846513b965d09bc939d5480 | Anchore Compliance | Critical | |
4ccb267b38d4665f748f96cd705e3c2c | Anchore Compliance | Critical | |
3f2c8b2b061c6fee995fb260c49b2333 | Anchore Compliance | Critical | |
44e56b8f38403bc11ee943c64b86d4b4 | Anchore Compliance | Critical | |
734672a2cb4126cadc7f6eb2a5e76ec6 | Anchore Compliance | Critical | |
cb3f0e98d3743ee581b691af8c7a22ba | Anchore Compliance | Critical | |
27a1f22d6ef52e7d73f67f4c634fdc43 | Anchore Compliance | Critical | |
10a9a379ca1121d2ca60a8092f3a4505 | Anchore Compliance | Critical | |
6d44927e7cd382fa2dfb0b3427a027c7 | Anchore Compliance | Critical | |
7f2d1ed7ec6194f6dca2a5b16b465ccd | Anchore Compliance | Critical | |
adb98899c5158ed6df7f9d179dd18b75 | Anchore Compliance | Critical | |
f56d244c9e2002125dad364653d866c7 | Anchore Compliance | Critical | |
CVE-2024-3205 | Anchore CVE | Medium | libyaml-0.1.7-5.el8 |
GHSA-7hfm-57qf-j43q | Anchore CVE | High | commons-compress-1.20 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-continuation-9.4.43.v20210629 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-http-9.4.43.v20210629 |
GHSA-8c26-wmh5-6g9v | Anchore CVE | High | golang.org/x/crypto-v0.0.0-20210616213533-5ff15b29337e |
GHSA-qppj-fm5r-hxr3 | Anchore CVE | Medium | golang.org/x/net-v0.0.0-20211020060615-d418f374d309 |
GHSA-qq97-vm5h-rrhg | Anchore CVE | Low | github.com/docker/distribution-v2.7.1+incompatible |
GHSA-fq42-c5rg-92c2 | Anchore CVE | High | nokogiri-1.12.5 |
GHSA-gwc9-m7rh-j2ww | Anchore CVE | High | golang.org/x/crypto-v0.0.0-20210616213533-5ff15b29337e |
CVE-2021-31812 | Anchore CVE | Medium | pdfbox-tools-2.0.19 |
GHSA-5ffw-gxpp-mxpf | Anchore CVE | Medium | github.com/containerd/containerd-v1.5.7 |
CVE-2022-2047 | Anchore CVE | Low | jetty-servlets-9.4.43.v20210629 |
CVE-2022-46363 | Anchore CVE | High | cxf-rt-rs-client-3.3.6 |
CVE-2023-36478 | Anchore CVE | High | jetty-webapp-9.4.43.v20210629 |
GHSA-7ww5-4wqc-m92c | Anchore CVE | Medium | github.com/containerd/containerd-v1.5.7 |
CVE-2023-44487 | Anchore CVE | High | jetty-xml-9.4.43.v20210629 |
CVE-2023-44487 | Anchore CVE | High | jetty-servlets-9.4.43.v20210629 |
GHSA-mcvf-2q2m-x72m | Anchore CVE | Medium | rails-html-sanitizer-1.3.0 |
GHSA-qw69-rqj8-6qw8 | Anchore CVE | Medium | jetty-server-9.4.43.v20210629 |
CVE-2023-36478 | Anchore CVE | High | jetty-jmx-9.4.43.v20210629 |
CVE-2021-28657 | Anchore CVE | Medium | tika-core-1.24.1 |
CVE-2022-30973 | Anchore CVE | Medium | tika-parsers-1.24.1 |
CVE-2023-44487 | Anchore CVE | High | jetty-continuation-9.4.43.v20210629 |
CVE-2022-2048 | Anchore CVE | High | jetty-http-9.4.43.v20210629 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-server-9.4.43.v20210629 |
CVE-2022-2047 | Anchore CVE | Low | jetty-io-9.4.43.v20210629 |
CVE-2023-36478 | Anchore CVE | High | jetty-server-9.4.43.v20210629 |
CVE-2024-1931 | Anchore CVE | Medium | unbound-libs-1.16.2-5.el8_9.6 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-io-9.4.43.v20210629 |
GHSA-7w2c-w47h-789w | Anchore CVE | Medium | doorkeeper-4.4.3 |
GHSA-3x8r-x6xp-q4vm | Anchore CVE | High | loofah-2.9.1 |
GHSA-xj5v-6v4g-jfw6 | Anchore CVE | Low | rack-2.1.4.3 |
GHSA-5x79-w82f-gw8w | Anchore CVE | High | rails-html-sanitizer-1.3.0 |
GHSA-3gh6-v5v9-6v9j | Anchore CVE | Low | jetty-servlets-9.4.43.v20210629 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-xml-9.4.43.v20210629 |
GHSA-288c-cq4h-88gq | Anchore CVE | High | jackson-databind-2.10.3 |
CVE-2023-36478 | Anchore CVE | High | jetty-util-ajax-9.4.43.v20210629 |
CVE-2020-13954 | Anchore CVE | Medium | cxf-rt-rs-client-3.3.6 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-io-9.4.43.v20210629 |
CVE-2022-2048 | Anchore CVE | High | jetty-servlets-9.4.43.v20210629 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-servlets-9.4.43.v20210629 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-xml-9.4.43.v20210629 |
CVE-2023-44487 | Anchore CVE | High | jetty-servlet-9.4.43.v20210629 |
CVE-2023-36478 | Anchore CVE | High | jetty-continuation-9.4.43.v20210629 |
CVE-2022-2048 | Anchore CVE | High | jetty-server-9.4.43.v20210629 |
GHSA-m425-mq94-257g | Anchore CVE | High | google.golang.org/grpc-v1.41.0 |
GHSA-x3x3-qwjq-8gj4 | Anchore CVE | Critical | cxf-core-3.3.13 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-security-9.4.43.v20210629 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-continuation-9.4.43.v20210629 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-servlet-9.4.43.v20210629 |
CVE-2018-20699 | Anchore CVE | Medium | github.com/docker/engine-v0.0.0-20191113042239-ea84732a7725 |
GHSA-hqxw-f8mx-cpmw | Anchore CVE | High | github.com/docker/distribution-v2.7.1+incompatible |
CVE-2023-7008 | Anchore CVE | Medium | systemd-pam-239-78.el8 |
GHSA-mjmj-j48q-9wg2 | Anchore CVE | High | snakeyaml-1.26 |
CVE-2023-29499 | Anchore CVE | Low | glib2-2.56.4-161.el8 |
CVE-2023-44487 | Anchore CVE | High | jetty-jmx-9.4.43.v20210629 |
GHSA-2qjp-425j-52j9 | Anchore CVE | Medium | github.com/containerd/containerd-v1.5.7 |
GHSA-58qw-p7qm-5rvh | Anchore CVE | Low | jetty-xml-9.4.43.v20210629 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-util-9.4.43.v20210629 |
CVE-2023-44487 | Anchore CVE | High | jetty-io-9.4.43.v20210629 |
CVE-2024-0450 | Anchore CVE | Medium | python3-libs-3.6.8-56.el8_9.3 |
CVE-2024-2511 | Anchore CVE | Low | openssl-1:1.1.1k-12.el8_9 |
GHSA-2wrh-6pvc-2jm9 | Anchore CVE | Medium | golang.org/x/net-v0.0.0-20211020060615-d418f374d309 |
GHSA-2qc6-mcvw-92cw | Anchore CVE | Medium | nokogiri-1.12.5 |
CVE-2023-32611 | Anchore CVE | Low | glib2-2.56.4-161.el8 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-xml-9.4.43.v20210629 |
GHSA-486f-hjj9-9vhh | Anchore CVE | High | loofah-2.9.1 |
GHSA-hhhw-99gj-p3c3 | Anchore CVE | Medium | snakeyaml-1.26 |
CVE-2021-30468 | Anchore CVE | High | cxf-rt-rs-client-3.3.6 |
GHSA-5j5w-g665-5m35 | Anchore CVE | Low | github.com/containerd/containerd-v1.5.7 |
GHSA-45x7-px36-x8w8 | Anchore CVE | Medium | golang.org/x/crypto-v0.0.0-20210616213533-5ff15b29337e |
CVE-2024-25062 | Anchore CVE | Medium | libxml2-2.9.7-18.el8_9 |
CVE-2023-43785 | Anchore CVE | Medium | libX11-common-1.6.8-6.el8 |
GHSA-vvpx-j8f3-3w6h | Anchore CVE | High | golang.org/x/net-v0.0.0-20211020060615-d418f374d309 |
CVE-2022-30126 | Anchore CVE | Medium | tika-core-1.24.1 |
CVE-2023-6918 | Anchore CVE | Low | libssh-config-0.9.6-13.el8_9 |
CVE-2023-43785 | Anchore CVE | Medium | libX11-1.6.8-6.el8 |
GHSA-gwc9-m7rh-j2ww | Anchore CVE | High | golang.org/x/crypto-v0.0.0-20210616213533-5ff15b29337e |
CVE-2024-2397 | Anchore CVE | Low | libpcap-14:1.9.1-5.el8 |
CVE-2022-46363 | Anchore CVE | High | cxf-rt-frontend-jaxrs-3.3.6 |
GHSA-pg8v-g4xq-hww9 | Anchore CVE | Medium | rails-html-sanitizer-1.3.0 |
GHSA-3f7h-mf4q-vrm4 | Anchore CVE | Medium | woodstox-core-5.0.3 |
CVE-2023-36478 | Anchore CVE | High | jetty-io-9.4.43.v20210629 |
GHSA-w37g-rhq8-7m4j | Anchore CVE | Medium | snakeyaml-1.26 |
GHSA-qmgx-j96g-4428 | Anchore CVE | Medium | cxf-core-3.3.13 |
GHSA-xc9x-jj77-9p9j | Anchore CVE | Medium | nokogiri-1.12.5 |
GHSA-8c26-wmh5-6g9v | Anchore CVE | High | golang.org/x/crypto-v0.0.0-20210616213533-5ff15b29337e |
CVE-2024-28182 | Anchore CVE | Medium | libnghttp2-1.33.0-5.el8_9 |
GHSA-9w3m-gqgf-c4p9 | Anchore CVE | Medium | snakeyaml-1.26 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-jmx-9.4.43.v20210629 |
CVE-2022-2048 | Anchore CVE | High | jetty-io-9.4.43.v20210629 |
GHSA-98wm-3w3q-mw94 | Anchore CVE | Medium | snakeyaml-1.26 |
CVE-2023-36478 | Anchore CVE | High | jetty-security-9.4.43.v20210629 |
GHSA-vcc3-rw6f-jv97 | Anchore CVE | Medium | nokogiri-1.12.5 |
CVE-2023-5455 | Anchore CVE | Medium | krb5-libs-1.18.2-26.el8_9 |
GHSA-jw7r-rxff-gv24 | Anchore CVE | Medium | apache-mime4j-core-0.8.3 |
CVE-2022-2047 | Anchore CVE | Low | jetty-servlet-9.4.43.v20210629 |
CVE-2022-25169 | Anchore CVE | Medium | tika-core-1.24.1 |
CVE-2024-26461 | Anchore CVE | Low | krb5-libs-1.18.2-26.el8_9 |
CVE-2021-31811 | Anchore CVE | Medium | pdfbox-tools-2.0.19 |
GHSA-hmfx-3pcx-653p | Anchore CVE | Medium | github.com/containerd/containerd-v1.5.7 |
GHSA-4v7x-pqxf-cx7m | Anchore CVE | Medium | golang.org/x/net-v0.0.0-20211020060615-d418f374d309 |
CVE-2023-32665 | Anchore CVE | Low | glib2-2.56.4-161.el8 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-webapp-9.4.43.v20210629 |
GHSA-m6cj-93v6-cvr5 | Anchore CVE | High | junrar-4.0.0 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-io-9.4.43.v20210629 |
CVE-2022-2048 | Anchore CVE | High | jetty-jmx-9.4.43.v20210629 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-security-9.4.43.v20210629 |
GHSA-jjjh-jjxp-wpff | Anchore CVE | High | jackson-databind-2.10.3 |
GHSA-c4r9-r8fh-9vj2 | Anchore CVE | Medium | snakeyaml-1.26 |
CVE-2023-6004 | Anchore CVE | Low | libssh-0.9.6-13.el8_9 |
CVE-2023-7008 | Anchore CVE | Medium | systemd-libs-239-78.el8 |
GHSA-qppj-fm5r-hxr3 | Anchore CVE | Medium | google.golang.org/grpc-v1.41.0 |
GHSA-pj73-v5mw-pm9j | Anchore CVE | Medium | activesupport-5.2.8.1 |
CVE-2019-3826 | Anchore CVE | Medium | github.com/prometheus/prometheus-v2.5.0+incompatible |
GHSA-69cg-p879-7622 | Anchore CVE | High | golang.org/x/net-v0.0.0-20211020060615-d418f374d309 |
CVE-2023-36478 | Anchore CVE | High | jetty-servlet-9.4.43.v20210629 |
CVE-2021-30468 | Anchore CVE | High | cxf-rt-frontend-jaxrs-3.3.6 |
GHSA-cgx6-hpwq-fhv5 | Anchore CVE | High | nokogiri-1.12.5 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-webapp-9.4.43.v20210629 |
GHSA-rrfc-7g8p-99q8 | Anchore CVE | Medium | rails-html-sanitizer-1.3.0 |
CVE-2022-2048 | Anchore CVE | High | jetty-xml-9.4.43.v20210629 |
CVE-2018-20699 | Anchore CVE | Medium | github.com/docker/engine-v0.0.0-20191113042239-ea84732a7725 |
GHSA-hqxw-f8mx-cpmw | Anchore CVE | High | github.com/docker/distribution-v2.7.1+incompatible |
CVE-2023-26049 | Anchore CVE | Medium | jetty-http-9.4.43.v20210629 |
CVE-2024-27316 | Anchore CVE | Medium | libnghttp2-1.33.0-5.el8_9 |
GHSA-jxhc-q857-3j6g | Anchore CVE | High | addressable-2.5.2 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.10.3 |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-28.2-jre |
CVE-2022-40897 | Anchore CVE | Medium | python2-setuptools-wheel-39.0.1-13.module+el8.9.0+19487+7dc18407 |
GHSA-fj7f-vq84-fh43 | Anchore CVE | Medium | bundler-2.2.29 |
CVE-2024-2398 | Anchore CVE | Medium | curl-7.61.1-33.el8_9.5 |
CVE-2022-48565 | Anchore CVE | Medium | python2-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2023-26048 | Anchore CVE | Medium | jetty-util-9.4.43.v20210629 |
CVE-2021-28657 | Anchore CVE | Medium | tika-parsers-1.24.1 |
GHSA-crjr-9rc5-ghw8 | Anchore CVE | High | nokogiri-1.12.5 |
CVE-2022-48565 | Anchore CVE | Medium | python2-libs-2.7.18-15.module+el8.9.0+20125+68111a8f |
GHSA-8r3f-844c-mc37 | Anchore CVE | Medium | google.golang.org/protobuf-v1.27.1 |
GHSA-8xww-x3g3-6jcv | Anchore CVE | Low | actionpack-5.2.8.1 |
CVE-2022-26336 | Anchore CVE | Medium | poi-4.1.2 |
GHSA-4374-p667-p6c8 | Anchore CVE | High | golang.org/x/net-v0.0.0-20211020060615-d418f374d309 |
CVE-2024-0450 | Anchore CVE | Medium | platform-python-3.6.8-56.el8_9.3 |
CVE-2020-17049 | Anchore CVE | Medium | krb5-libs-1.18.2-26.el8_9 |
CVE-2024-2511 | Anchore CVE | Low | openssl-libs-1:1.1.1k-12.el8_9 |
CVE-2023-44487 | Anchore CVE | High | jetty-security-9.4.43.v20210629 |
CVE-2022-48560 | Anchore CVE | Medium | python2-libs-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2023-26048 | Anchore CVE | Medium | jetty-http-9.4.43.v20210629 |
GHSA-j6gc-792m-qgm2 | Anchore CVE | Low | activesupport-5.2.8.1 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-security-9.4.43.v20210629 |
GHSA-m72m-mhq2-9p6c | Anchore CVE | High | jsoup-1.13.1 |
GHSA-8h22-8cf7-hq6g | Anchore CVE | Medium | activestorage-5.2.8.1 |
CVE-2022-2047 | Anchore CVE | Low | jetty-webapp-9.4.43.v20210629 |
GHSA-crp2-qrr5-8pq7 | Anchore CVE | High | github.com/containerd/containerd-v1.5.7 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-webapp-9.4.43.v20210629 |
CVE-2024-2236 | Anchore CVE | Medium | libgcrypt-1.8.5-7.el8_6 |
GHSA-cr5q-6q9f-rq6q | Anchore CVE | Low | activesupport-5.2.8.1 |
GHSA-22f2-v57c-j9cx | Anchore CVE | Low | rack-2.1.4.3 |
GHSA-qw3f-w4pf-jh5f | Anchore CVE | Medium | tika-core-1.24.1 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-servlet-9.4.43.v20210629 |
GHSA-57j2-w4cx-62h2 | Anchore CVE | High | jackson-databind-2.10.3 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-util-9.4.43.v20210629 |
CVE-2024-22365 | Anchore CVE | Medium | pam-1.3.1-27.el8 |
CVE-2023-44487 | Anchore CVE | High | jetty-webapp-9.4.43.v20210629 |
CVE-2022-26336 | Anchore CVE | Medium | poi-ooxml-4.1.2 |
GHSA-p782-xgp4-8hr8 | Anchore CVE | Medium | golang.org/x/sys-v0.0.0-20211102192858-4dd72447c267 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-io-9.4.43.v20210629 |
GHSA-hmfx-3pcx-653p | Anchore CVE | Medium | github.com/containerd/containerd-v1.5.7 |
CVE-2023-6004 | Anchore CVE | Low | libssh-config-0.9.6-13.el8_9 |
GHSA-4v7x-pqxf-cx7m | Anchore CVE | Medium | golang.org/x/net-v0.0.0-20211020060615-d418f374d309 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-webapp-9.4.43.v20210629 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-server-9.4.43.v20210629 |
CVE-2015-4035 | Anchore CVE | High | xz-1.8 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-security-9.4.43.v20210629 |
GHSA-crv7-7245-f45f | Anchore CVE | High | commons-compress-1.20 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-http-9.4.43.v20210629 |
CVE-2023-43786 | Anchore CVE | Medium | libX11-common-1.6.8-6.el8 |
GHSA-4g9r-vxhx-9pgx | Anchore CVE | High | commons-compress-1.20 |
GHSA-4g8v-vg43-wpgf | Anchore CVE | Medium | actionpack-5.2.8.1 |
CVE-2024-26458 | Anchore CVE | Low | krb5-libs-1.18.2-26.el8_9 |
GHSA-qppj-fm5r-hxr3 | Anchore CVE | Medium | google.golang.org/grpc-v1.41.0 |
GHSA-p26g-97m4-6q7c | Anchore CVE | Low | jetty-server-9.4.43.v20210629 |
CVE-2021-43618 | Anchore CVE | Medium | gmp-1:6.1.2-10.el8 |
CVE-2021-27807 | Anchore CVE | Medium | pdfbox-tools-2.0.19 |
GHSA-69cg-p879-7622 | Anchore CVE | High | golang.org/x/net-v0.0.0-20211020060615-d418f374d309 |
CVE-2022-40897 | Anchore CVE | Medium | python2-setuptools-39.0.1-13.module+el8.9.0+19487+7dc18407 |
GHSA-gp7f-rwcx-9369 | Anchore CVE | Medium | jsoup-1.13.1 |
GHSA-ppp9-7jff-5vj2 | Anchore CVE | High | golang.org/x/text-v0.3.6 |
GHSA-xp5h-f8jf-rc8q | Anchore CVE | Medium | actionview-5.2.8.1 |
CVE-2024-1931 | Anchore CVE | Medium | python3-unbound-1.16.2-5.el8_9.6 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-servlet-9.4.43.v20210629 |
GHSA-3w37-5p3p-jv92 | Anchore CVE | High | cxf-core-3.3.13 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-util-9.4.43.v20210629 |
GHSA-4jrv-ppp4-jm57 | Anchore CVE | High | gson-2.8.6 |
CVE-2020-13401 | Anchore CVE | Medium | github.com/docker/engine-v0.0.0-20191113042239-ea84732a7725 |
CVE-2022-2048 | Anchore CVE | High | jetty-servlet-9.4.43.v20210629 |
GHSA-jc36-42cf-vqwj | Anchore CVE | High | nokogiri-1.12.5 |
CVE-2022-30126 | Anchore CVE | Medium | tika-parsers-1.24.1 |
GHSA-hp87-p4gw-j4gq | Anchore CVE | High | gopkg.in/yaml.v3-v3.0.0-20210107192922-496545a6307b |
GHSA-9h9g-93gc-623h | Anchore CVE | Medium | rails-html-sanitizer-1.3.0 |
GHSA-8r3f-844c-mc37 | Anchore CVE | Medium | google.golang.org/protobuf-v1.27.1 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-util-9.4.43.v20210629 |
CVE-2022-33879 | Anchore CVE | Low | tika-core-1.24.1 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-servlet-9.4.43.v20210629 |
GHSA-4374-p667-p6c8 | Anchore CVE | High | golang.org/x/net-v0.0.0-20211020060615-d418f374d309 |
GHSA-mvff-h3cj-wj9c | Anchore CVE | High | github.com/containerd/containerd-v1.5.7 |
GHSA-c6qg-cjj8-47qp | Anchore CVE | Low | rack-2.1.4.3 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-jmx-9.4.43.v20210629 |
CVE-2023-36478 | Anchore CVE | High | jetty-http-9.4.43.v20210629 |
GHSA-5ffw-gxpp-mxpf | Anchore CVE | Medium | github.com/containerd/containerd-v1.5.7 |
CVE-2021-22696 | Anchore CVE | High | cxf-rt-rs-client-3.3.6 |
GHSA-mc84-pj99-q6hh | Anchore CVE | High | commons-compress-1.20 |
GHSA-259w-8hf6-59c2 | Anchore CVE | Medium | github.com/containerd/containerd-v1.5.7 |
GHSA-p5pg-wm9q-8v6r | Anchore CVE | Medium | metadata-extractor-2.13.0 |
CVE-2023-44487 | Anchore CVE | High | jetty-http-9.4.43.v20210629 |
CVE-2023-43786 | Anchore CVE | Medium | libX11-1.6.8-6.el8 |
GHSA-69ch-w2m2-3vjp | Anchore CVE | High | golang.org/x/text-v0.3.7 |
GHSA-qppj-fm5r-hxr3 | Anchore CVE | Medium | golang.org/x/net-v0.0.0-20211020060615-d418f374d309 |
GHSA-qq97-vm5h-rrhg | Anchore CVE | Low | github.com/docker/distribution-v2.7.1+incompatible |
CVE-2023-41900 | Anchore CVE | Medium | jetty-servlets-9.4.43.v20210629 |
CVE-2023-2953 | Anchore CVE | Low | openldap-2.4.46-18.el8 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-continuation-9.4.43.v20210629 |
GHSA-gx8x-g87m-h5q6 | Anchore CVE | High | nokogiri-1.12.5 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-jmx-9.4.43.v20210629 |
CVE-2022-2047 | Anchore CVE | Low | jetty-xml-9.4.43.v20210629 |
CVE-2024-25062 | Anchore CVE | Medium | python3-libxml2-2.9.7-18.el8_9 |
CVE-2022-33879 | Anchore CVE | Low | tika-parsers-1.24.1 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-util-ajax-9.4.43.v20210629 |
CVE-2022-2047 | Anchore CVE | Low | jetty-jmx-9.4.43.v20210629 |
GHSA-cj7v-27pg-wf7q | Anchore CVE | Low | jetty-http-9.4.43.v20210629 |
GHSA-crp2-qrr5-8pq7 | Anchore CVE | High | github.com/containerd/containerd-v1.5.7 |
CVE-2023-6597 | Anchore CVE | High | platform-python-3.6.8-56.el8_9.3 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-28.2-jre |
CVE-2023-26049 | Anchore CVE | Medium | jetty-xml-9.4.43.v20210629 |
CVE-2021-27906 | Anchore CVE | Medium | pdfbox-tools-2.0.19 |
CVE-2023-36478 | Anchore CVE | High | jetty-xml-9.4.43.v20210629 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-util-ajax-9.4.43.v20210629 |
GHSA-228g-948r-83gx | Anchore CVE | Medium | loofah-2.9.1 |
CVE-2023-44487 | Anchore CVE | High | jetty-server-9.4.43.v20210629 |
CVE-2023-43787 | Anchore CVE | Medium | libX11-common-1.6.8-6.el8 |
GHSA-p84v-45xj-wwqj | Anchore CVE | Low | actionpack-5.2.8.1 |
CVE-2020-13401 | Anchore CVE | Medium | github.com/docker/engine-v0.0.0-20191113042239-ea84732a7725 |
CVE-2023-6918 | Anchore CVE | Low | libssh-0.9.6-13.el8_9 |
GHSA-7r82-7xv7-xcpj | Anchore CVE | Medium | httpclient-4.5.2 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-jmx-9.4.43.v20210629 |
GHSA-3mc7-4q67-w48m | Anchore CVE | High | snakeyaml-1.26 |
GHSA-rgv9-q543-rqg4 | Anchore CVE | High | jackson-databind-2.10.3 |
GHSA-p782-xgp4-8hr8 | Anchore CVE | Medium | golang.org/x/sys-v0.0.0-20211007075335-d3039528d8ac |
CVE-2022-26336 | Anchore CVE | Medium | poi-ooxml-schemas-4.1.2 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-util-ajax-9.4.43.v20210629 |
GHSA-xh29-r2w5-wx8m | Anchore CVE | High | nokogiri-1.12.5 |
GHSA-7ww5-4wqc-m92c | Anchore CVE | Medium | github.com/containerd/containerd-v1.5.7 |
CVE-2022-2047 | Anchore CVE | Low | jetty-server-9.4.43.v20210629 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-servlets-9.4.43.v20210629 |
GHSA-pxvg-2qj5-37jq | Anchore CVE | Medium | nokogiri-1.12.5 |
CVE-2020-13954 | Anchore CVE | Medium | cxf-rt-frontend-jaxrs-3.3.6 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-servlets-9.4.43.v20210629 |
CVE-2023-36478 | Anchore CVE | High | jetty-util-9.4.43.v20210629 |
CCE-86931-3 | OSCAP Compliance | Medium | |
CCE-86916-4 | OSCAP Compliance | Medium | |
CCE-85987-6 | OSCAP Compliance | Medium | |
CCE-86534-5 | OSCAP Compliance | Medium | |
CCE-85888-6 | OSCAP Compliance | Medium | |
CCE-86261-5 | OSCAP Compliance | Medium | |
CCE-80675-2 | OSCAP Compliance | Medium | |
CCE-85964-5 | OSCAP Compliance | Medium | |
CCE-82891-3 | OSCAP Compliance | Medium | |
CCE-84220-3 | OSCAP Compliance | Low | |
CCE-83733-6 | OSCAP Compliance | Low | |
CVE-2023-24540 | Anchore CVE | Critical | stdlib-go1.17.5 |
CVE-2023-27043 | Anchore CVE | Medium | python2-libs-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2020-12413 | Anchore CVE | Low | nss-3.90.0-6.el8_9 |
CVE-2022-0235 | Anchore CVE | Medium | python3-subscription-manager-rhsm-1.28.40-1.el8_9 |
CVE-2023-39804 | Anchore CVE | Low | tar-2:1.30-9.el8 |
CVE-2022-2879 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2023-24539 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2023-24056 | Anchore CVE | Low | pkgconf-1.4.2-1.el8 |
CVE-2022-41724 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2021-33294 | Anchore CVE | Low | elfutils-debuginfod-client-0.189-3.el8 |
CVE-2023-29400 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2022-24675 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2024-25260 | Anchore CVE | Low | elfutils-default-yama-scope-0.189-3.el8 |
CVE-2022-41725 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2022-23806 | Anchore CVE | Critical | stdlib-go1.17.5 |
CVE-2019-12900 | Anchore CVE | Low | bzip2-libs-1.0.6-26.el8 |
CVE-2022-30635 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2018-19211 | Anchore CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
CVE-2022-28327 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2019-9674 | Anchore CVE | Low | python3-libs-3.6.8-56.el8_9.3 |
CVE-2022-23518 | Anchore CVE | Medium | loofah-2.9.1 |
GHSA-hr8g-6v94-x4m9 | Anchore CVE | Medium | bcprov-jdk15on-1.65 |
CVE-2022-23773 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2023-39323 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2023-2650 | Anchore CVE | Medium | openssl-1:1.1.1k-12.el8_9 |
CVE-2020-35512 | Anchore CVE | Low | dbus-common-1:1.12.8-26.el8 |
GHSA-77vh-xpmg-72qh | Anchore CVE | Low | github.com/opencontainers/image-spec-v1.0.2-0.20190823105129-775207bd45b6 |
CVE-2023-45287 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2022-27664 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2023-45322 | Anchore CVE | Low | python3-libxml2-2.9.7-18.el8_9 |
CVE-2018-20657 | Anchore CVE | Low | libgomp-8.5.0-20.el8 |
CVE-2022-28131 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2023-39319 | Anchore CVE | Medium | stdlib-go1.17.5 |
CVE-2022-32148 | Anchore CVE | Medium | stdlib-go1.17.5 |
CVE-2022-3857 | Anchore CVE | Low | libpng-devel-2:1.6.34-5.el8 |
CVE-2022-41717 | Anchore CVE | Medium | stdlib-go1.17.5 |
CVE-2023-24537 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2021-3997 | Anchore CVE | Medium | systemd-pam-239-78.el8 |
CVE-2019-14250 | Anchore CVE | Low | libgomp-8.5.0-20.el8 |
CVE-2022-3555 | Anchore CVE | Low | libX11-1.6.8-6.el8 |
CVE-2022-41723 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2020-8492 | Anchore CVE | Medium | python2-libs-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2022-1705 | Anchore CVE | Medium | stdlib-go1.17.5 |
CVE-2021-42694 | Anchore CVE | Medium | libgcc-8.5.0-20.el8 |
CVE-2018-20225 | Anchore CVE | Low | python3-pip-wheel-9.0.3-23.el8_9.1 |
CVE-2022-30630 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2019-16866 | Anchore CVE | Low | python3-unbound-1.16.2-5.el8_9.6 |
CVE-2023-45285 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2023-29402 | Anchore CVE | Critical | stdlib-go1.17.5 |
CVE-2018-20839 | Anchore CVE | Medium | systemd-pam-239-78.el8 |
CVE-2023-29403 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2024-0232 | Anchore CVE | Low | sqlite-libs-3.26.0-19.el8_9 |
CVE-2022-0235 | Anchore CVE | Medium | dnf-plugin-subscription-manager-1.28.40-1.el8_9 |
CVE-2022-24836 | Anchore CVE | High | nokogiri- |
CVE-2023-27043 | Anchore CVE | Medium | python2-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2022-3554 | Anchore CVE | Medium | libX11-common-1.6.8-6.el8 |
CVE-2023-29405 | Anchore CVE | Critical | stdlib-go1.17.5 |
CVE-2020-14422 | Anchore CVE | Medium | python2-pip-9.0.3-19.module+el8.9.0+19487+7dc18407 |
CVE-2022-1962 | Anchore CVE | Medium | stdlib-go1.17.5 |
CVE-2019-12900 | Anchore CVE | Low | bzip2-devel-1.0.6-26.el8 |
CVE-2023-29409 | Anchore CVE | Medium | stdlib-go1.17.5 |
CVE-2020-26247 | Anchore CVE | Medium | nokogiri- |
CVE-2021-33294 | Anchore CVE | Low | elfutils-libelf-0.189-3.el8 |
CVE-2022-41715 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2020-21674 | Anchore CVE | Medium | libarchive-3.3.3-5.el8 |
CVE-2022-0235 | Anchore CVE | Medium | python3-cloud-what-1.28.40-1.el8_9 |
CVE-2018-1000879 | Anchore CVE | Low | libarchive-3.3.3-5.el8 |
CVE-2020-12413 | Anchore CVE | Low | nss-softokn-3.90.0-6.el8_9 |
CVE-2022-2880 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2022-24921 | Anchore CVE | High | stdlib-go1.17.5 |
GHSA-hj4r-2c9c-29h3 | Anchore CVE | Medium | github.com/elastic/beats/v7-3.3.0 |
CVE-2018-20839 | Anchore CVE | Medium | systemd-239-78.el8 |
CVE-2022-30580 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2024-3651 | Anchore CVE | Medium | python3-idna-2.5-5.el8 |
CVE-2018-20839 | Anchore CVE | Medium | systemd-libs-239-78.el8 |
CVE-2021-3997 | Anchore CVE | Medium | systemd-libs-239-78.el8 |
CVE-2023-24532 | Anchore CVE | Medium | stdlib-go1.17.5 |
CVE-2019-19244 | Anchore CVE | Low | sqlite-libs-3.26.0-19.el8_9 |
CVE-2023-0466 | Anchore CVE | Low | openssl-1:1.1.1k-12.el8_9 |
CVE-2022-2879 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2022-0235 | Anchore CVE | Medium | subscription-manager-1.28.40-1.el8_9 |
CVE-2023-24056 | Anchore CVE | Low | libpkgconf-1.4.2-1.el8 |
CVE-2023-24539 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2019-9937 | Anchore CVE | Low | sqlite-libs-3.26.0-19.el8_9 |
CVE-2018-19217 | Anchore CVE | Low | ncurses-base-6.1-10.20180224.el8 |
CVE-2022-23990 | Anchore CVE | Medium | expat-2.2.5-11.el8_9.1 |
CVE-2022-23806 | Anchore CVE | Critical | stdlib-go1.17.5 |
CVE-2022-30631 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2023-4156 | Anchore CVE | Low | gawk-4.2.1-4.el8 |
CVE-2022-23772 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2023-0466 | Anchore CVE | Low | openssl-libs-1:1.1.1k-12.el8_9 |
CVE-2022-30629 | Anchore CVE | Low | stdlib-go1.17.5 |
CVE-2023-29404 | Anchore CVE | Critical | stdlib-go1.17.5 |
CVE-2021-24032 | Anchore CVE | Low | libzstd-1.4.4-1.el8 |
CVE-2019-14250 | Anchore CVE | Low | libstdc++-8.5.0-20.el8 |
CVE-2023-36632 | Anchore CVE | Medium | python2-libs-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2005-2541 | Anchore CVE | Medium | tar-2:1.30-9.el8 |
CVE-2023-45287 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2023-24540 | Anchore CVE | Critical | stdlib-go1.17.5 |
CVE-2022-23773 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2022-3555 | Anchore CVE | Low | libX11-common-1.6.8-6.el8 |
CVE-2023-29406 | Anchore CVE | Medium | stdlib-go1.17.5 |
CVE-2023-39318 | Anchore CVE | Medium | stdlib-go1.17.5 |
CVE-2023-44487 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2020-35512 | Anchore CVE | Low | dbus-1:1.12.8-26.el8 |
CVE-2022-41724 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2022-30632 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2023-29400 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2020-35512 | Anchore CVE | Low | dbus-tools-1:1.12.8-26.el8 |
CVE-2022-3219 | Anchore CVE | Low | gnupg2-2.2.20-3.el8_6 |
CVE-2022-41725 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2022-27943 | Anchore CVE | Low | libstdc++-8.5.0-20.el8 |
CVE-2022-32189 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2007-4559 | Anchore CVE | Medium | python2-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2022-27664 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2022-30635 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2022-27943 | Anchore CVE | Low | libgcc-8.5.0-20.el8 |
CVE-2019-8906 | Anchore CVE | Low | file-libs-5.33-25.el8 |
CVE-2007-4559 | Anchore CVE | Medium | python2-libs-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2022-30633 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2020-35512 | Anchore CVE | Low | dbus-libs-1:1.12.8-26.el8 |
CVE-2021-33294 | Anchore CVE | Low | elfutils-libs-0.189-3.el8 |
GHSA-6xx3-rg99-gc3p | Anchore CVE | Medium | bcprov-jdk15on-1.62 |
CVE-2022-30630 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2023-24536 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2020-19189 | Anchore CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
GHSA-wjxj-5m7g-mg7q | Anchore CVE | Medium | bcprov-jdk15on-1.62 |
CVE-2020-19189 | Anchore CVE | Low | ncurses-base-6.1-10.20180224.el8 |
CVE-2023-39326 | Anchore CVE | Medium | stdlib-go1.17.5 |
CVE-2024-25260 | Anchore CVE | Low | elfutils-libs-0.189-3.el8 |
CVE-2023-0465 | Anchore CVE | Low | openssl-1:1.1.1k-12.el8_9 |
CVE-2018-19211 | Anchore CVE | Low | ncurses-base-6.1-10.20180224.el8 |
CVE-2022-29181 | Anchore CVE | High | nokogiri- |
CVE-2019-9674 | Anchore CVE | Low | platform-python-3.6.8-56.el8_9.3 |
CVE-2020-10735 | Anchore CVE | Medium | python2-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2023-50495 | Anchore CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
CVE-2023-24538 | Anchore CVE | Critical | stdlib-go1.17.5 |
GHSA-77vh-xpmg-72qh | Anchore CVE | Low | github.com/opencontainers/image-spec-v1.0.2-0.20190823105129-775207bd45b6 |
CVE-2023-27534 | Anchore CVE | Low | libcurl-7.61.1-33.el8_9.5 |
CVE-2021-20193 | Anchore CVE | Medium | tar-2:1.30-9.el8 |
CVE-2023-27534 | Anchore CVE | Low | curl-7.61.1-33.el8_9.5 |
CVE-2020-10735 | Anchore CVE | Medium | python2-libs-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2021-41098 | Anchore CVE | High | nokogiri- |
CVE-2019-12904 | Anchore CVE | Medium | libgcrypt-1.8.5-7.el8_6 |
CVE-2022-41723 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2018-19217 | Anchore CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
GHSA-6xx3-rg99-gc3p | Anchore CVE | Medium | bcprov-jdk15on-1.65 |
CVE-2023-0464 | Anchore CVE | Low | openssl-libs-1:1.1.1k-12.el8_9 |
CVE-2022-0235 | Anchore CVE | Medium | python3-syspurpose-1.28.40-1.el8_9 |
CVE-2023-29402 | Anchore CVE | Critical | stdlib-go1.17.5 |
CVE-2023-24532 | Anchore CVE | Medium | stdlib-go1.17.5 |
CVE-2022-29526 | Anchore CVE | Medium | stdlib-go1.17.5 |
CVE-2019-5477 | Anchore CVE | Critical | nokogiri- |
CVE-2023-24056 | Anchore CVE | Low | pkgconf-m4-1.4.2-1.el8 |
CVE-2023-2004 | Anchore CVE | Low | freetype-2.9.1-9.el8 |
CVE-2023-36191 | Anchore CVE | Low | sqlite-libs-3.26.0-19.el8_9 |
CVE-2023-29403 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2022-24921 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2022-30580 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2019-16866 | Anchore CVE | Low | unbound-libs-1.16.2-5.el8_9.6 |
CVE-2023-2650 | Anchore CVE | Medium | openssl-libs-1:1.1.1k-12.el8_9 |
CVE-2018-1000880 | Anchore CVE | Low | libarchive-3.3.3-5.el8 |
CVE-2019-9674 | Anchore CVE | Low | python2-libs-2.7.18-15.module+el8.9.0+20125+68111a8f |
GHSA-wjxj-5m7g-mg7q | Anchore CVE | Medium | bcprov-jdk15on-1.65 |
CVE-2020-8492 | Anchore CVE | Medium | python2-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2018-1000654 | Anchore CVE | Low | libtasn1-4.13-4.el8_7 |
CVE-2022-30631 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2023-24056 | Anchore CVE | Low | pkgconf-pkg-config-1.4.2-1.el8 |
CVE-2023-29404 | Anchore CVE | Critical | stdlib-go1.17.5 |
CVE-2022-24675 | Anchore CVE | High | stdlib-go1.17.5 |
GHSA-hr8g-6v94-x4m9 | Anchore CVE | Medium | bcprov-jdk15on-1.62 |
CVE-2022-41409 | Anchore CVE | Low | pcre2-10.32-3.el8_6 |
CVE-2022-28327 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2019-8905 | Anchore CVE | Low | file-libs-5.33-25.el8 |
CVE-2023-24534 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2023-29406 | Anchore CVE | Medium | stdlib-go1.17.5 |
CVE-2022-32148 | Anchore CVE | Medium | stdlib-go1.17.5 |
CVE-2023-0465 | Anchore CVE | Low | openssl-libs-1:1.1.1k-12.el8_9 |
CVE-2019-7317 | Anchore CVE | Low | libpng-2:1.6.34-5.el8 |
CVE-2023-2004 | Anchore CVE | Low | freetype-devel-2.9.1-9.el8 |
CVE-2022-41717 | Anchore CVE | Medium | stdlib-go1.17.5 |
CVE-2023-39323 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2021-42694 | Anchore CVE | Medium | libstdc++-8.5.0-20.el8 |
CVE-2019-9923 | Anchore CVE | Low | tar-2:1.30-9.el8 |
CVE-2020-12413 | Anchore CVE | Low | nss-sysinit-3.90.0-6.el8_9 |
CVE-2022-30629 | Anchore CVE | Low | stdlib-go1.17.5 |
CVE-2018-20657 | Anchore CVE | Low | libstdc++-8.5.0-20.el8 |
CVE-2024-25260 | Anchore CVE | Low | elfutils-debuginfod-client-0.189-3.el8 |
CVE-2020-35512 | Anchore CVE | Low | dbus-daemon-1:1.12.8-26.el8 |
CVE-2023-45322 | Anchore CVE | Low | libxml2-2.9.7-18.el8_9 |
CVE-2023-50495 | Anchore CVE | Low | ncurses-base-6.1-10.20180224.el8 |
CVE-2022-32189 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2023-24534 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2022-3554 | Anchore CVE | Medium | libX11-1.6.8-6.el8 |
CVE-2022-27943 | Anchore CVE | Low | libgomp-8.5.0-20.el8 |
CVE-2022-28131 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2023-36632 | Anchore CVE | Medium | python2-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2024-0727 | Anchore CVE | Low | openssl-1:1.1.1k-12.el8_9 |
CVE-2022-1962 | Anchore CVE | Medium | stdlib-go1.17.5 |
CVE-2023-39319 | Anchore CVE | Medium | stdlib-go1.17.5 |
CVE-2023-39318 | Anchore CVE | Medium | stdlib-go1.17.5 |
CVE-2023-44487 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2019-14250 | Anchore CVE | Low | libgcc-8.5.0-20.el8 |
CVE-2023-24536 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2022-30632 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2023-24537 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2019-7317 | Anchore CVE | Low | libpng-devel-2:1.6.34-5.el8 |
CVE-2022-30633 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2019-17543 | Anchore CVE | Medium | lz4-libs-1.8.3-3.el8_4 |
CVE-2024-25260 | Anchore CVE | Low | elfutils-libelf-0.189-3.el8 |
GHSA-73xv-w5gp-frxh | Anchore CVE | High | bcprov-jdk15on-1.65 |
CVE-2022-23990 | Anchore CVE | Medium | expat-devel-2.2.5-11.el8_9.1 |
CVE-2022-1705 | Anchore CVE | Medium | stdlib-go1.17.5 |
CVE-2023-32636 | Anchore CVE | Low | glib2-2.56.4-161.el8 |
CVE-2021-42694 | Anchore CVE | Medium | libgomp-8.5.0-20.el8 |
CVE-2023-45285 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2023-24538 | Anchore CVE | Critical | stdlib-go1.17.5 |
CVE-2022-3857 | Anchore CVE | Low | libpng-2:1.6.34-5.el8 |
CVE-2022-41715 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2012-6685 | Anchore CVE | High | nokogiri- |
CVE-2023-39326 | Anchore CVE | Medium | stdlib-go1.17.5 |
CCE-80763-6 | OSCAP Compliance | Medium | |
CCE-83918-3 | OSCAP Compliance | Medium | |
CCE-82988-7 | OSCAP Compliance | Low | |
CCE-82840-0 | OSCAP Compliance | Low | |
CCE-84300-3 | OSCAP Compliance | Medium | |
CCE-86266-4 | OSCAP Compliance | Medium | |
CCE-83375-6 | OSCAP Compliance | Medium | |
CCE-80785-9 | OSCAP Compliance | High | |
CCE-82155-3 | OSCAP Compliance | High | |
CCE-80942-6 | OSCAP Compliance | High | |
CCE-80789-1 | OSCAP Compliance | High | |
CCE-86478-5 | OSCAP Compliance | Medium | |
CCE-83434-1 | OSCAP Compliance | Medium | |
CCE-80806-3 | OSCAP Compliance | Medium | |
CCE-80809-7 | OSCAP Compliance | Medium | |
CCE-84038-9 | OSCAP Compliance | Medium | |
CCE-85902-5 | OSCAP Compliance | High | |
CCE-85897-7 | OSCAP Compliance | Medium | |
CCE-85870-4 | OSCAP Compliance | Medium | |
CCE-85899-3 | OSCAP Compliance | Medium | |
CCE-82028-2 | OSCAP Compliance | Medium | |
CCE-80832-9 | OSCAP Compliance | Medium | |
CCE-82059-7 | OSCAP Compliance | Medium | |
CCE-81031-7 | OSCAP Compliance | Low | |
CCE-82005-0 | OSCAP Compliance | Low | |
CCE-80834-5 | OSCAP Compliance | Medium | |
CCE-82297-3 | OSCAP Compliance | Low | |
CCE-80835-2 | OSCAP Compliance | Medium | |
CCE-86960-2 | OSCAP Compliance | Medium | |
CCE-90784-0 | OSCAP Compliance | Medium | |
CCE-80837-8 | OSCAP Compliance | Medium | |
CCE-80838-6 | OSCAP Compliance | Medium | |
CCE-80839-4 | OSCAP Compliance | Medium | |
CCE-80844-4 | OSCAP Compliance | Medium | |
CCE-81043-2 | OSCAP Compliance | Medium | |
CCE-82191-8 | OSCAP Compliance | Medium | |
CCE-82998-6 | OSCAP Compliance | Medium | |
CCE-87036-0 | OSCAP Compliance | Medium | |
CCE-86260-7 | OSCAP Compliance | Medium | |
CCE-80846-9 | OSCAP Compliance | Medium | |
CCE-83303-8 | OSCAP Compliance | Medium | |
CCE-82976-2 | OSCAP Compliance | Low | |
CCE-85983-5 | OSCAP Compliance | Medium | |
CCE-82859-0 | OSCAP Compliance | Medium | |
CCE-80847-7 | OSCAP Compliance | Medium | |
CCE-80644-8 | OSCAP Compliance | Medium | |
CCE-82959-8 | OSCAP Compliance | Medium | |
CCE-81044-0 | OSCAP Compliance | Low | |
CCE-80851-9 | OSCAP Compliance | Low | |
CCE-80852-7 | OSCAP Compliance | Low | |
CCE-80853-5 | OSCAP Compliance | Low | |
CCE-80854-3 | OSCAP Compliance | Low | |
CCE-82730-3 | OSCAP Compliance | Medium | |
CCE-80859-2 | OSCAP Compliance | Medium | |
CCE-86339-9 | OSCAP Compliance | Medium | |
CCE-86098-1 | OSCAP Compliance | Medium | |
CCE-85992-6 | OSCAP Compliance | Medium | |
CCE-83426-7 | OSCAP Compliance | Medium | |
CCE-80863-4 | OSCAP Compliance | Medium | |
CCE-80868-3 | OSCAP Compliance | Medium | |
CCE-80869-1 | OSCAP Compliance | High | |
CCE-86353-0 | OSCAP Compliance | Medium | |
CCE-82249-4 | OSCAP Compliance | Medium | |
CCE-80886-5 | OSCAP Compliance | Medium | |
CCE-82426-8 | OSCAP Compliance | Medium | |
CCE-82853-3 | OSCAP Compliance | Medium | |
CCE-90781-6 | OSCAP Compliance | Medium | |
CCE-82462-3 | OSCAP Compliance | Low | |
CCE-84027-2 | OSCAP Compliance | High | |
CCE-81027-5 | OSCAP Compliance | Medium | |
CCE-81030-9 | OSCAP Compliance | Medium | |
CCE-82215-5 | OSCAP Compliance | Medium | |
CCE-80913-7 | OSCAP Compliance | Low | |
CCE-80952-5 | OSCAP Compliance | Medium | |
CCE-80915-2 | OSCAP Compliance | Medium | |
CCE-81054-9 | OSCAP Compliance | Low | |
CCE-80916-0 | OSCAP Compliance | Medium | |
CCE-82974-7 | OSCAP Compliance | Medium | |
CCE-80953-3 | OSCAP Compliance | Medium | |
CCE-82934-1 | OSCAP Compliance | Medium | |
CCE-80917-8 | OSCAP Compliance | Medium | |
CCE-81011-9 | OSCAP Compliance | Medium | |
CCE-86220-1 | OSCAP Compliance | Medium | |
CCE-81021-8 | OSCAP Compliance | Medium | |
CCE-80918-6 | OSCAP Compliance | Medium | |
CCE-80919-4 | OSCAP Compliance | Medium | |
CCE-80920-2 | OSCAP Compliance | Medium | |
CCE-80921-0 | OSCAP Compliance | Medium | |
CCE-80922-8 | OSCAP Compliance | Medium | |
CCE-81006-9 | OSCAP Compliance | Medium | |
CCE-81009-3 | OSCAP Compliance | Medium | |
CCE-81013-5 | OSCAP Compliance | Medium | |
CCE-82863-2 | OSCAP Compliance | Medium | |
CCE-81007-7 | OSCAP Compliance | Medium | |
CCE-81010-1 | OSCAP Compliance | Medium | |
CCE-81015-0 | OSCAP Compliance | Medium | |
CCE-82211-4 | OSCAP Compliance | Medium | |
CCE-83774-0 | OSCAP Compliance | Medium | |
CVE-2023-6597 | Twistlock CVE | Critical | python3-libs-3.6.8-56.el8_9.3 |
CVE-2023-6597 | Twistlock CVE | Critical | platform-python-3.6.8-56.el8_9.3 |
CVE-2024-0450 | Twistlock CVE | Medium | platform-python-3.6.8-56.el8_9.3 |
CVE-2024-0450 | Twistlock CVE | Medium | python3-libs-3.6.8-56.el8_9.3 |
CVE-2023-43804 | Twistlock CVE | Medium | python3-pip-wheel-9.0.3-23.el8_9.1 |
CVE-2023-43804 | Twistlock CVE | Medium | platform-python-pip-9.0.3-23.el8_9.1 |
CVE-2024-29040 | Twistlock CVE | Medium | tpm2-tss-2.3.2-5.el8 |
CVE-2024-0727 | Anchore CVE | Low | openssl-libs-1:1.1.1k-12.el8_9 |
CVE-2022-23772 | Anchore CVE | High | stdlib-go1.17.5 |
CVE-2023-29405 | Anchore CVE | Critical | stdlib-go1.17.5 |
CVE-2022-4899 | Anchore CVE | Low | libzstd-1.4.4-1.el8 |
CVE-2021-4209 | Anchore CVE | Low | gnutls-3.6.16-8.el8_9.3 |
CVE-2019-9936 | Anchore CVE | Low | sqlite-libs-3.26.0-19.el8_9 |
CVE-2021-33294 | Anchore CVE | Low | elfutils-default-yama-scope-0.189-3.el8 |
CVE-2022-29526 | Anchore CVE | Medium | stdlib-go1.17.5 |
CVE-2019-9674 | Anchore CVE | Low | python2-2.7.18-15.module+el8.9.0+20125+68111a8f |
CVE-2023-29409 | Anchore CVE | Medium | stdlib-go1.17.5 |
CVE-2023-0464 | Anchore CVE | Low | openssl-1:1.1.1k-12.el8_9 |
CVE-2020-12413 | Anchore CVE | Low | nss-softokn-freebl-3.90.0-6.el8_9 |
CVE-2020-14422 | Anchore CVE | Medium | python2-pip-wheel-9.0.3-19.module+el8.9.0+19487+7dc18407 |
CVE-2018-20225 | Anchore CVE | Low | platform-python-pip-9.0.3-23.el8_9.1 |
CVE-2022-2880 | Anchore CVE | High | stdlib-go1.17.5 |
GHSA-9339-86wc-4qgf | Anchore CVE | High | xalan-2.7.2 |
CVE-2018-20657 | Anchore CVE | Low | libgcc-8.5.0-20.el8 |
CVE-2020-12413 | Anchore CVE | Low | nss-util-3.90.0-6.el8_9 |
CVE-2021-3997 | Anchore CVE | Medium | systemd-239-78.el8 |
CVE-2023-45803 | Anchore CVE | Medium | python2-pip-9.0.3-19.module+el8.9.0+19487+7dc18407 |
CVE-2023-45803 | Anchore CVE | Medium | python2-pip-wheel-9.0.3-19.module+el8.9.0+19487+7dc18407 |
CVE-2023-43804 | Anchore CVE | Medium | platform-python-pip-9.0.3-23.el8_9.1 |
CVE-2023-43804 | Anchore CVE | Medium | python3-pip-wheel-9.0.3-23.el8_9.1 |
CVE-2024-33599 | Anchore CVE | High | glibc-minimal-langpack-2.28-236.el8_9.13 |
CVE-2024-33599 | Anchore CVE | High | glibc-2.28-236.el8_9.13 |
CVE-2024-33602 | Anchore CVE | Low | glibc-minimal-langpack-2.28-236.el8_9.13 |
CVE-2024-2961 | Anchore CVE | High | glibc-gconv-extra-2.28-236.el8_9.13 |
CVE-2024-33601 | Anchore CVE | Low | glibc-langpack-en-2.28-236.el8_9.13 |
CVE-2024-33602 | Anchore CVE | Low | glibc-langpack-en-2.28-236.el8_9.13 |
CVE-2019-1010022 | Anchore CVE | Critical | glibc-common-2.28-236.el8_9.13 |
CVE-2024-33600 | Anchore CVE | Medium | glibc-gconv-extra-2.28-236.el8_9.13 |
CVE-2024-33600 | Anchore CVE | Medium | glibc-common-2.28-236.el8_9.13 |
CVE-2024-33602 | Anchore CVE | Low | glibc-2.28-236.el8_9.13 |
CVE-2024-33599 | Anchore CVE | High | glibc-common-2.28-236.el8_9.13 |
CVE-2024-2961 | Anchore CVE | High | glibc-2.28-236.el8_9.13 |
CVE-2024-33602 | Anchore CVE | Low | glibc-common-2.28-236.el8_9.13 |
CVE-2024-33600 | Anchore CVE | Medium | glibc-langpack-en-2.28-236.el8_9.13 |
CVE-2024-2961 | Anchore CVE | High | glibc-minimal-langpack-2.28-236.el8_9.13 |
CVE-2024-33601 | Anchore CVE | Low | glibc-minimal-langpack-2.28-236.el8_9.13 |
CVE-2019-1010022 | Anchore CVE | Critical | glibc-langpack-en-2.28-236.el8_9.13 |
CVE-2019-1010022 | Anchore CVE | Critical | glibc-minimal-langpack-2.28-236.el8_9.13 |
CVE-2019-1010022 | Anchore CVE | Critical | glibc-2.28-236.el8_9.13 |
CVE-2024-33600 | Anchore CVE | Medium | glibc-2.28-236.el8_9.13 |
CVE-2024-33602 | Anchore CVE | Low | glibc-gconv-extra-2.28-236.el8_9.13 |
CVE-2024-33599 | Anchore CVE | High | glibc-langpack-en-2.28-236.el8_9.13 |
CVE-2024-33601 | Anchore CVE | Low | glibc-common-2.28-236.el8_9.13 |
CVE-2024-33600 | Anchore CVE | Medium | glibc-minimal-langpack-2.28-236.el8_9.13 |
CVE-2019-1010022 | Anchore CVE | Critical | glibc-gconv-extra-2.28-236.el8_9.13 |
CVE-2024-33601 | Anchore CVE | Low | glibc-2.28-236.el8_9.13 |
CVE-2024-2961 | Anchore CVE | High | glibc-langpack-en-2.28-236.el8_9.13 |
CVE-2024-2961 | Anchore CVE | High | glibc-common-2.28-236.el8_9.13 |
CVE-2024-33601 | Anchore CVE | Low | glibc-gconv-extra-2.28-236.el8_9.13 |
CVE-2024-33599 | Anchore CVE | High | glibc-gconv-extra-2.28-236.el8_9.13 |
CVE-2021-3572 | Twistlock CVE | Low | python2-pip-9.0.3-19.module+el8.9.0+19487+7dc18407 |
CVE-2021-3572 | Twistlock CVE | Low | python2-pip-wheel-9.0.3-19.module+el8.9.0+19487+7dc18407 |
CVE-2024-2961 | Twistlock CVE | Critical | glibc-gconv-extra-2.28-236.el8_9.13 |
CVE-2024-2961 | Twistlock CVE | Critical | glibc-2.28-236.el8_9.13 |
CVE-2024-2961 | Twistlock CVE | Critical | glibc-langpack-en-2.28-236.el8_9.13 |
CVE-2024-2961 | Twistlock CVE | Critical | glibc-common-2.28-236.el8_9.13 |
CVE-2024-2961 | Twistlock CVE | Critical | glibc-minimal-langpack-2.28-236.el8_9.13 |
CVE-2022-31163 | Twistlock CVE | High | tzinfo-1.2.11 |
CVE-2024-33599 | Twistlock CVE | Critical | glibc-gconv-extra-2.28-236.el8_9.13 |
CVE-2024-33599 | Twistlock CVE | Critical | glibc-2.28-236.el8_9.13 |
CVE-2024-33599 | Twistlock CVE | Critical | glibc-minimal-langpack-2.28-236.el8_9.13 |
CVE-2024-33599 | Twistlock CVE | Critical | glibc-common-2.28-236.el8_9.13 |
CVE-2024-33599 | Twistlock CVE | Critical | glibc-langpack-en-2.28-236.el8_9.13 |
CVE-2018-1000211 | Twistlock CVE | High | doorkeeper-4.4.3 |
CVE-2016-10707 | Twistlock CVE | High | jquery-rails-4.4.0 |
CVE-2015-7579 | Twistlock CVE | Medium | rails-html-sanitizer-1.3.0 |
CVE-2024-33600 | Twistlock CVE | Medium | glibc-minimal-langpack-2.28-236.el8_9.13 |
CVE-2024-33600 | Twistlock CVE | Medium | glibc-gconv-extra-2.28-236.el8_9.13 |
CVE-2024-33600 | Twistlock CVE | Medium | glibc-common-2.28-236.el8_9.13 |
CVE-2024-33600 | Twistlock CVE | Medium | glibc-2.28-236.el8_9.13 |
CVE-2024-33600 | Twistlock CVE | Medium | glibc-langpack-en-2.28-236.el8_9.13 |
CVE-2024-33602 | Twistlock CVE | Low | glibc-common-2.28-236.el8_9.13 |
CVE-2024-33602 | Twistlock CVE | Low | glibc-2.28-236.el8_9.13 |
CVE-2024-33602 | Twistlock CVE | Low | glibc-minimal-langpack-2.28-236.el8_9.13 |
CVE-2024-33602 | Twistlock CVE | Low | glibc-gconv-extra-2.28-236.el8_9.13 |
CVE-2024-33602 | Twistlock CVE | Low | glibc-langpack-en-2.28-236.el8_9.13 |
CVE-2024-33601 | Twistlock CVE | Low | glibc-common-2.28-236.el8_9.13 |
CVE-2024-33601 | Twistlock CVE | Low | glibc-minimal-langpack-2.28-236.el8_9.13 |
CVE-2024-33601 | Twistlock CVE | Low | glibc-gconv-extra-2.28-236.el8_9.13 |
CVE-2024-33601 | Twistlock CVE | Low | glibc-langpack-en-2.28-236.el8_9.13 |
CVE-2024-33601 | Twistlock CVE | Low | glibc-2.28-236.el8_9.13 |
VAT: https://vat.dso.mil/vat/image?imageName=elastic/ent-search/ent-search&tag=7.17.21&branch=master
More information can be found in the failed pipeline located here: https://repo1.dso.mil/dsop/elastic/enterprise-search/7.x/enterprise-search/-/jobs/22523530
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the ~"Hardening::Verification" label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.