chore(findings): gladstone/afta/funcapp
Summary
gladstone/afta/funcapp has 97 new findings discovered during continuous monitoring.
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=gladstone/afta/funcapp&tag=0.26.0&branch=master
EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.
KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.
id | source | severity | package | impact | workaround | epss_score | kev |
---|---|---|---|---|---|---|---|
CVE-2023-44487 | Anchore CVE | High | stdlib-go1.20.7 | 0.94379 | true | ||
CVE-2023-45288 | Twistlock CVE | Medium | net/http-1.20.7 | 0.67599 | false | ||
CVE-2023-45288 | Anchore CVE | High | stdlib-go1.20.7 | 0.67599 | false | ||
CVE-2024-24787 | Anchore CVE | Medium | stdlib-go1.20.7 | 0.01583 | false | ||
CVE-2024-24784 | Anchore CVE | High | stdlib-go1.20.7 | 0.01498 | false | ||
CVE-2024-24791 | Twistlock CVE | Low | net/http-1.20.7 | 0.00618 | false | ||
CVE-2024-24791 | Anchore CVE | High | stdlib-go1.20.7 | 0.00618 | false | ||
CVE-2023-45289 | Twistlock CVE | Low | net/http-1.20.7 | 0.00409 | false | ||
CVE-2023-45289 | Anchore CVE | Medium | stdlib-go1.20.7 | 0.00409 | false | ||
CVE-2024-24783 | Twistlock CVE | Low | crypto/x509-1.20.7 | 0.00401 | false | ||
CVE-2024-24783 | Anchore CVE | Medium | stdlib-go1.20.7 | 0.00401 | false | ||
CVE-2023-45290 | Twistlock CVE | Low | net/textproto-1.20.7 | 0.00362 | false | ||
CVE-2023-45290 | Anchore CVE | Medium | stdlib-go1.20.7 | 0.00362 | false | ||
CVE-2023-24531 | Anchore CVE | Critical | stdlib-go1.20.7 | 0.00354 | false | ||
CVE-2024-24785 | Anchore CVE | Medium | stdlib-go1.20.7 | 0.00246 | false | ||
CVE-2025-1795 | Anchore CVE | Low | python-3.10.18 | 0.00184 | false | ||
CVE-2025-1795 | Anchore CVE | Low | python-3.10.18 | 0.00184 | false | ||
CVE-2025-1795 | Anchore CVE | Low | python-3.10.18 | 0.00184 | false | ||
CVE-2024-34156 | Anchore CVE | High | stdlib-go1.20.7 | 0.00178 | false | ||
CVE-2024-34155 | Anchore CVE | Medium | stdlib-go1.20.7 | 0.00115 | false | ||
CVE-2025-8194 | Anchore CVE | High | python-3.10.18 | 0.00096 | false | ||
CVE-2025-8194 | Anchore CVE | High | python-3.10.18 | 0.00096 | false | ||
CVE-2025-8194 | Anchore CVE | High | python-3.10.18 | 0.00096 | false | ||
CVE-2025-6069 | Anchore CVE | Medium | python-3.10.18 | 0.00090 | false | ||
CVE-2025-6069 | Anchore CVE | Medium | python-3.10.18 | 0.00090 | false | ||
CVE-2025-6069 | Anchore CVE | Medium | python-3.10.18 | 0.00090 | false | ||
CVE-2024-24790 | Twistlock CVE | Critical | net/netip-1.20.7 | 0.00090 | false | ||
CVE-2024-24790 | Anchore CVE | Critical | stdlib-go1.20.7 | 0.00090 | false | ||
CVE-2023-39325 | Twistlock CVE | High | net/http-1.20.7 | 0.00089 | false | ||
CVE-2023-39325 | Anchore CVE | High | stdlib-go1.20.7 | 0.00089 | false | ||
CVE-2024-34158 | Anchore CVE | High | stdlib-go1.20.7 | 0.00082 | false | ||
CVE-2023-39319 | Anchore CVE | Medium | stdlib-go1.20.7 | 0.00062 | false | ||
CVE-2023-39318 | Anchore CVE | Medium | stdlib-go1.20.7 | 0.00062 | false | ||
CVE-2023-39323 | Anchore CVE | High | stdlib-go1.20.7 | 0.00060 | false | ||
CVE-2023-45285 | Anchore CVE | High | stdlib-go1.20.7 | 0.00055 | false | ||
CVE-2025-47907 | Anchore CVE | High | stdlib-go1.20.7 | 0.00054 | false | ||
CVE-2025-27789 | Twistlock CVE | Medium | @babel/runtime-7.22.5 | Its only if you are passing untrusted inputs to the second argument of RegExp.prototype.replace, which is a rare thing to do | 0.00050 | false | |
CVE-2025-27789 | Twistlock CVE | Medium | @babel/runtime-7.23.2 | Its only if you are passing untrusted inputs to the second argument of RegExp.prototype.replace, which is a rare thing to do | 0.00050 | false | |
CVE-2023-39326 | Twistlock CVE | Medium | net/http/internal-1.20.7 | 0.00049 | false | ||
CVE-2023-39326 | Anchore CVE | Medium | stdlib-go1.20.7 | 0.00049 | false | ||
CVE-2024-45336 | Twistlock CVE | Low | net/http-1.20.7 | 0.00041 | false | ||
CVE-2024-45336 | Anchore CVE | Medium | stdlib-go1.20.7 | 0.00041 | false | ||
CVE-2025-55173 | Twistlock CVE | Medium | next-14.2.28 | 0.00040 | false | ||
CVE-2024-53382 | Twistlock CVE | Medium | prismjs-1.29.0 | 0.00036 | false | ||
CVE-2024-53382 | Twistlock CVE | Medium | prismjs-1.27.0 | 0.00036 | false | ||
CVE-2024-45341 | Twistlock CVE | Low | crypto/x509-1.20.7 | 0.00032 | false | ||
CVE-2024-45341 | Anchore CVE | Medium | stdlib-go1.20.7 | 0.00032 | false | ||
CVE-2025-57822 | Twistlock CVE | Medium | next-14.2.28 | 0.00028 | false | ||
CVE-2025-48068 | Twistlock CVE | Low | next-14.2.28 | 0.00028 | false | ||
CVE-2025-5889 | Twistlock CVE | Low | brace-expansion-1.1.11 | Im mirroring the CVE severity assessment here. | Sanitize strings being passed to the function so that they dont contain many , in a row. | 0.00022 | false |
CVE-2025-7783 | Twistlock CVE | Critical | form-data-4.0.0 | See the impact section in the attached GHSA. | 0.00020 | false | |
CVE-2023-45284 | Twistlock CVE | Medium | path/filepath-1.20.7 | 0.00020 | false | ||
CVE-2025-4673 | Twistlock CVE | Low | net/http-1.20.7 | 0.00019 | false | ||
CVE-2025-4673 | Anchore CVE | Medium | stdlib-go1.20.7 | 0.00019 | false | ||
CVE-2025-46653 | Twistlock CVE | Low | formidable-3.5.1 | 0.00014 | false | ||
CVE-2025-22871 | Twistlock CVE | Low | net/http/internal-1.20.7 | 0.00013 | false | ||
CVE-2025-22871 | Anchore CVE | Critical | stdlib-go1.20.7 | 0.00013 | false | ||
CVE-2025-57752 | Twistlock CVE | Medium | next-14.2.28 | 0.00012 | false | ||
CVE-2025-22866 | Twistlock CVE | Low | crypto/internal/nistec-1.20.7 | 0.00012 | false | ||
CVE-2025-22866 | Anchore CVE | Medium | stdlib-go1.20.7 | 0.00012 | false | ||
CVE-2025-4674 | Anchore CVE | High | stdlib-go1.20.7 | 0.00006 | false | ||
CVE-2024-24789 | Twistlock CVE | Medium | archive/zip-1.20.7 | 0.00006 | false | ||
CVE-2024-24789 | Anchore CVE | Medium | stdlib-go1.20.7 | 0.00006 | false | ||
dd76dea9595c709b4058036e22892e8f | Anchore Compliance | Critical | N/A | N/A | |||
d96628426196f0a13fce7f5c231da259 | Anchore Compliance | Critical | N/A | N/A | |||
cbda6acbdb1c2b853c34ee647c9359e7 | Anchore Compliance | Critical | N/A | N/A | |||
c222d5f6c1c9815a05a85ce755374574 | Anchore Compliance | Critical | N/A | N/A | |||
bbffb91d67a41630712dd5857ba750b1 | Anchore Compliance | Critical | N/A | N/A | |||
ba617e9a453ee97d487b90fcefd3a037 | Anchore Compliance | Critical | N/A | N/A | |||
a565683d63c8e56b576c5f8cb63053ee | Anchore Compliance | Critical | N/A | N/A | |||
a09431aedc5e8952b786edcc85645b15 | Anchore Compliance | Critical | N/A | N/A | |||
GHSA-xv57-4mr9-wg8v | Anchore CVE | Medium | next-14.2.28 | N/A | N/A | ||
GHSA-xffm-g5w8-qvg7 | Twistlock CVE | Low | @eslint/plugin-kit-0.2.8 | N/A | N/A | ||
GHSA-xffm-g5w8-qvg7 | Anchore CVE | Low | @eslint/plugin-kit-0.2.8 | N/A | N/A | ||
GHSA-x7hr-w5r2-h6wg | Anchore CVE | Medium | prismjs-1.27.0 | N/A | N/A | ||
GHSA-x7hr-w5r2-h6wg | Anchore CVE | Medium | prismjs-1.29.0 | N/A | N/A | ||
GHSA-v6h2-p8h4-qcjw | Anchore CVE | Low | brace-expansion-1.1.11 | N/A | N/A | ||
GHSA-g5qg-72qw-gw5v | Anchore CVE | Medium | next-14.2.28 | N/A | N/A | ||
GHSA-fjxv-7rqg-78g4 | Anchore CVE | Critical | form-data-4.0.0 | N/A | N/A | ||
GHSA-968p-4wvh-cqc8 | Anchore CVE | Medium | @babel/runtime-7.22.5 | N/A | N/A | ||
GHSA-968p-4wvh-cqc8 | Anchore CVE | Medium | @babel/runtime-7.23.2 | N/A | N/A | ||
GHSA-75v8-2h7p-7m2m | Anchore CVE | Low | formidable-3.5.1 | N/A | N/A | ||
GHSA-67mh-4wv8-2f99 | Twistlock CVE | Medium | esbuild-0.18.20 | N/A | N/A | ||
GHSA-67mh-4wv8-2f99 | Anchore CVE | Medium | esbuild-0.18.20 | N/A | N/A | ||
GHSA-4342-x723-ch2f | Anchore CVE | Medium | next-14.2.28 | N/A | N/A | ||
GHSA-3h52-269p-cp9r | Anchore CVE | Low | next-14.2.28 | N/A | N/A | ||
90838cd2efa235ada2f448f50be58635 | Anchore Compliance | Critical | N/A | N/A | |||
8682c3c8ac12ead8770f68567a8fc6fe | Anchore Compliance | Critical | N/A | N/A | |||
7e1307260ffc98b26a5a44dd56e7e3b1 | Anchore Compliance | Critical | N/A | N/A | |||
7bbcf93f2ba6c5971643c9859fa35696 | Anchore Compliance | Critical | N/A | N/A | |||
4f3f417a717acccfd4d3ae90b68fecf7 | Anchore Compliance | Critical | N/A | N/A | |||
49b03166ab46815d7d272b2a28550ec0 | Anchore Compliance | Critical | N/A | N/A | |||
4775e62d2dc763dbb3fca65fc0ddb8e6 | Anchore Compliance | Critical | N/A | N/A | |||
35d2deace41d9ca1218b657dad1938c9 | Anchore Compliance | Critical | N/A | N/A | |||
26333da9da224e000eff38a63570d893 | Anchore Compliance | Critical | N/A | N/A | |||
1f0e24335f7a9a983e1df57e0f221bc3 | Anchore Compliance | Critical | N/A | N/A | |||
022513029418a42769a9063e96737d23 | Anchore Compliance | Critical | N/A | N/A |
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=gladstone/afta/funcapp&tag=0.26.0&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.