chore(findings): kubecost/frontend
Summary
kubecost/frontend has 32 new findings discovered during continuous monitoring.
Layer: opensource/nginx/nginx:1.27.2-distroless is EOL, please update if possible
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=kubecost/frontend&tag=prod-2.6.5&branch=master
EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.
KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.
| id | source | severity | package | impact | workaround | epss_score | kev | 
|---|---|---|---|---|---|---|---|
| CVE-2023-38039 | Anchore CVE | High | curl-7.88.1 | 0.14797 | false | ||
| CVE-2024-7264 | Anchore CVE | Medium | curl-7.88.1 | 0.06460 | false | ||
| CVE-2024-2398 | Anchore CVE | High | curl-7.88.1 | 0.01962 | false | ||
| CVE-2024-2004 | Anchore CVE | Low | curl-7.88.1 | 0.00910 | false | ||
| CVE-2023-28320 | Anchore CVE | Medium | curl-7.88.1 | 0.00641 | false | ||
| CVE-2024-9681 | Anchore CVE | Medium | curl-7.88.1 | 0.00571 | false | ||
| CVE-2023-28322 | Anchore CVE | Low | curl-7.88.1 | 0.00502 | false | ||
| CVE-2025-0725 | Anchore CVE | High | curl-7.88.1 | 0.00460 | false | ||
| CVE-2023-46218 | Anchore CVE | Medium | curl-7.88.1 | 0.00444 | false | ||
| CVE-2024-8096 | Anchore CVE | Medium | curl-7.88.1 | 0.00412 | false | ||
| CVE-2025-23419 | Anchore CVE | Medium | nginx-1.27.2 | 0.00405 | false | ||
| CVE-2024-11053 | Anchore CVE | Low | curl-7.88.1 | 0.00337 | false | ||
| CVE-2023-28319 | Anchore CVE | High | curl-7.88.1 | 0.00320 | false | ||
| CVE-2023-28321 | Anchore CVE | Medium | curl-7.88.1 | 0.00297 | false | ||
| CVE-2023-46219 | Anchore CVE | Medium | curl-7.88.1 | 0.00193 | false | ||
| CVE-2023-27534 | Anchore CVE | High | curl-7.88.1 | 0.00176 | false | ||
| CVE-2023-27533 | Anchore CVE | High | curl-7.88.1 | 0.00141 | false | ||
| CVE-2024-13176 | Anchore CVE | Medium | openssl-3.0.15 | 0.00118 | false | ||
| CVE-2025-53859 | Anchore CVE | Medium | nginx-1.27.2 | 0.00106 | false | ||
| CVE-2025-0167 | Anchore CVE | Low | curl-7.88.1 | 0.00083 | false | ||
| CVE-2025-9086 | Anchore CVE | High | curl-7.88.1 | 0.00077 | false | ||
| CVE-2025-4598 | Anchore CVE | Medium | systemd-252.31-1~deb12u1 | 0.00053 | false | ||
| CVE-2025-27587 | Anchore CVE | Low | libssl3-3.0.15-1~deb12u1 | 0.00035 | false | ||
| CVE-2025-9230 | Twistlock CVE | Low | openssl-3.0.15-1~deb12u1 | 0.00026 | false | ||
| CVE-2025-9230 | Anchore CVE | High | libssl3-3.0.15-1~deb12u1 | 0.00026 | false | ||
| CVE-2025-9230 | Anchore CVE | High | openssl-3.0.15 | 0.00026 | false | ||
| CVE-2025-9232 | Twistlock CVE | Low | openssl-3.0.15-1~deb12u1 | 0.00023 | false | ||
| CVE-2025-9232 | Anchore CVE | Medium | libssl3-3.0.15-1~deb12u1 | 0.00023 | false | ||
| CVE-2025-8058 | Twistlock CVE | Low | glibc-2.36-9+deb12u9 | 0.00010 | false | ||
| CVE-2025-8058 | Anchore CVE | Medium | libc6-2.36-9+deb12u9 | 0.00010 | false | ||
| CVE-2025-4802 | Twistlock CVE | Low | glibc-2.36-9+deb12u9 | 0.00007 | false | ||
| CVE-2025-4802 | Anchore CVE | High | libc6-2.36-9+deb12u9 | 0.00007 | false | 
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=kubecost/frontend&tag=prod-2.6.5&branch=master
Tasks
Contributor:
- 
Apply the StatusReview label to this issue for a merge request reviewand wait for feedback 
OR
- 
Provide justifications for findings in the VAT (docs)  - 
Apply the StatusVerification label to this issue for a VAT justifications reviewand wait for feedback 
Iron Bank:
- 
Review findings and justifications  
Note: If the above process is rejected for any reason, the
RevieworVerificationlabel will be removed and the issue will be sent back toTo-Do. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theRevieworVerificationlabel.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.