UNCLASSIFIED - NO CUI

chore(findings): octo/ddf

Summary

octo/ddf has 200 new findings discovered during continuous monitoring.

Layer: opensource/alpinelinux/alpine:3.20.3 is EOL, please update if possible

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=octo/ddf&tag=3.1.0&branch=master

EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.

KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.

id source severity package impact workaround epss_score kev
CVE-2022-1471 Twistlock CVE Critical org.yaml_snakeyaml-1.33 0.93849 false
CVE-2011-5034 Anchore CVE High geronimo-el_2.2_spec-1.1 0.68968 false
CVE-2008-3280 Anchore CVE Medium jetty-openid-9.4.54.v20240208 0.05925 false
CVE-2021-23383 Anchore CVE Critical handlebars-4.3.1 0.04396 false
CVE-2018-10237 Twistlock CVE Medium com.google.guava_guava-18.0 0.03259 false
CVE-2022-25647 Twistlock CVE High com.google.code.gson_gson-2.8.5 0.02798 false
CVE-2021-23369 Anchore CVE Critical handlebars-4.3.1 0.02542 false
CVE-2020-17521 Twistlock CVE Medium groovy-3.0.3 0.01790 false
CVE-2024-8184 Anchore CVE Medium jetty-io-10.0.22 0.01487 false
CVE-2024-8184 Anchore CVE Medium jetty-http-10.0.22 0.01487 false
CVE-2024-8184 Anchore CVE Medium jetty-client-9.4.54.v20240208 0.01487 false
CVE-2024-8184 Anchore CVE Medium jetty-http-9.4.54.v20240208 0.01487 false
CVE-2024-8184 Anchore CVE Medium jetty-alpn-openjdk8-server-9.4.54.v20240208 0.01487 false
CVE-2024-8184 Anchore CVE Medium jetty-servlets-9.4.54.v20240208 0.01487 false
CVE-2024-8184 Anchore CVE Medium jetty-alpn-client-10.0.22 0.01487 false
CVE-2024-8184 Anchore CVE Medium jetty-proxy-9.4.54.v20240208 0.01487 false
CVE-2024-8184 Anchore CVE Medium jetty-servlet-9.4.54.v20240208 0.01487 false
CVE-2024-8184 Anchore CVE Medium jetty-io-9.4.54.v20240208 0.01487 false
CVE-2024-8184 Anchore CVE Medium jetty-rewrite-9.4.54.v20240208 0.01487 false
CVE-2024-8184 Anchore CVE Medium jetty-xml-9.4.54.v20240208 0.01487 false
CVE-2024-8184 Anchore CVE Medium jetty-alpn-openjdk8-client-9.4.54.v20240208 0.01487 false
CVE-2024-8184 Anchore CVE Medium jetty-alpn-java-client-10.0.22 0.01487 false
CVE-2024-8184 Anchore CVE Medium jetty-alpn-java-client-9.4.54.v20240208 0.01487 false
CVE-2024-8184 Anchore CVE Medium jetty-jmx-9.4.54.v20240208 0.01487 false
CVE-2024-8184 Anchore CVE Medium jetty-alpn-client-9.4.54.v20240208 0.01487 false
CVE-2024-8184 Anchore CVE Medium jetty-alpn-java-server-9.4.54.v20240208 0.01487 false
CVE-2024-8184 Anchore CVE Medium jetty-alpn-server-9.4.54.v20240208 0.01487 false
CVE-2024-8184 Anchore CVE Medium jetty-client-10.0.22 0.01487 false
CVE-2024-8184 Twistlock CVE Medium org.eclipse.jetty_jetty-io-9.4.54.v20240208 0.01487 false
CVE-2024-8184 Twistlock CVE Medium org.eclipse.jetty_jetty-io-10.0.22 0.01487 false
CVE-2024-8184 Twistlock CVE Medium org.eclipse.jetty_jetty-server-9.4.54.v20240208 0.01487 false
CVE-2007-1652 Anchore CVE High jetty-openid-9.4.54.v20240208 0.01362 false
CVE-2007-1651 Anchore CVE Medium jetty-openid-9.4.54.v20240208 0.01275 false
CVE-2023-38435 Twistlock CVE Medium org.apache.felix_org.apache.felix.healthcheck.webconsoleplugin-2.0.2 0.01205 false
CVE-2024-6763 Twistlock CVE Medium org.eclipse.jetty_jetty-io-9.4.54.v20240208 0.01022 false
CVE-2024-6763 Twistlock CVE Medium org.eclipse.jetty_jetty-http-9.4.54.v20240208 0.01022 false
CVE-2024-6763 Twistlock CVE Medium org.eclipse.jetty_jetty-http-10.0.22 0.01022 false
CVE-2022-40152 Twistlock CVE Medium com.fasterxml.woodstox_woodstox-core-6.2.8 0.00762 false
CVE-2022-1271 Anchore CVE High xz-1.9 0.00716 false
CVE-2024-21742 Twistlock CVE Medium org.apache.james_apache-mime4j-core-0.8.9 0.00658 false
CVE-2015-4035 Anchore CVE High xz-1.9 0.00612 false
CVE-2021-29425 Twistlock CVE Medium commons-io_commons-io-2.5 0.00484 false
CVE-2023-5685 Twistlock CVE High org.jboss.xnio_xnio-api-3.8.11.Final 0.00474 false
CVE-2024-26308 Twistlock CVE Medium org.apache.commons_commons-compress-1.23.0 0.00448 false
CVE-2019-20920 Anchore CVE High handlebars-4.3.1 0.00343 false
CVE-2024-29857 Twistlock CVE Medium org.bouncycastle_bcprov-jdk18on-1.77.00.0 0.00337 false
CVE-2024-29857 Twistlock CVE Medium org.bouncycastle_bcprov-jdk18on-1.76.0.0 0.00337 false
CVE-2024-51504 Anchore CVE Critical zookeeper-jute-3.9.2 0.00312 false
CVE-2024-51504 Twistlock CVE Low org.apache.zookeeper_zookeeper-3.9.2 0.00312 false
CVE-2025-31672 Twistlock CVE Low The Apache Software Foundation_poi-ooxml-5.2.3 0.00271 false
CVE-2025-25247 Twistlock CVE Medium org.apache.felix_org.apache.felix.webconsole-4.8.12 0.00266 false
CVE-2024-34447 Twistlock CVE Medium org.bouncycastle_bcprov-jdk18on-1.77.00.0 0.00227 false
CVE-2024-34447 Twistlock CVE Medium org.bouncycastle_bcprov-jdk18on-1.76.0.0 0.00227 false
CVE-2020-27225 Anchore CVE High org.eclipse.osgi-3.18.0 0.00184 false
CVE-2025-46392 Twistlock CVE Low commons-configuration_commons-configuration-1.10 0.00181 false
CVE-2024-47554 Twistlock CVE Low commons-io_commons-io-2.5 0.00173 false
CVE-2024-47554 Twistlock CVE Low commons-io_commons-io-2.11.0 0.00173 false
CVE-2023-44483 Twistlock CVE Medium org.apache.santuario_xmlsec-2.3.1 0.00169 false
CVE-2025-48976 Twistlock CVE Low commons-fileupload_commons-fileupload-1.5 0.00168 false
CVE-2023-38286 Anchore CVE High thymeleaf-3.0.15.RELEASE 0.00148 false
CVE-2023-33008 Anchore CVE Medium org.apache.sling.commons.johnzon-1.2.16 0.00137 false
CVE-2024-30172 Twistlock CVE Medium org.bouncycastle_bcprov-jdk18on-1.76.0.0 0.00136 false
CVE-2024-30172 Twistlock CVE Medium org.bouncycastle_bcprov-jdk18on-1.77.00.0 0.00136 false
CVE-2019-20922 Anchore CVE High handlebars-4.3.1 0.00131 false
CVE-2024-30171 Twistlock CVE Medium org.bouncycastle_bcprov-jdk18on-1.76.0.0 0.00100 false
CVE-2024-30171 Twistlock CVE Medium org.bouncycastle_bcprov-jdk18on-1.77.00.0 0.00100 false
CVE-2025-5115 Twistlock CVE High org.eclipse.jetty.http2_http2-common-10.0.22 0.00098 false
CVE-2025-5115 Twistlock CVE High org.eclipse.jetty.http2_http2-common-9.4.54.v20240208 0.00098 false
CVE-2025-58457 Anchore CVE Medium zookeeper-jute-3.9.2 0.00093 false
CVE-2025-58457 Twistlock CVE Low org.apache.zookeeper_zookeeper-3.9.2 0.00093 false
CVE-2025-8916 Twistlock CVE Medium org.bouncycastle_bcpkix-jdk18on-1.76.0.0 0.00087 false
CVE-2025-8916 Twistlock CVE Medium org.bouncycastle_bcpkix-jdk18on-1.77.00.0 0.00087 false
CVE-2024-7254 Twistlock CVE High com.google.protobuf_protobuf-java-3.19.6 0.00085 false
CVE-2024-13009 Anchore CVE High jetty-io-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Anchore CVE High jetty-alpn-openjdk8-client-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Anchore CVE High jetty-jaas-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Anchore CVE High jetty-util-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Anchore CVE High jetty-servlets-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Anchore CVE High jetty-alpn-java-server-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Anchore CVE High jetty-continuation-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Anchore CVE High jetty-http-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Anchore CVE High jetty-alpn-server-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Anchore CVE High jetty-xml-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Anchore CVE High jetty-servlet-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Anchore CVE High jetty-alpn-client-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Anchore CVE High jetty-rewrite-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Anchore CVE High jetty-client-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Anchore CVE High jetty-alpn-openjdk8-server-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Anchore CVE High jetty-alpn-java-client-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Anchore CVE High jetty-openid-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Anchore CVE High jetty-proxy-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Anchore CVE High jetty-jmx-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Anchore CVE High jetty-security-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Anchore CVE High jetty-util-ajax-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Twistlock CVE High org.eclipse.jetty_jetty-server-9.4.54.v20240208 0.00078 false
CVE-2024-13009 Twistlock CVE Low org.eclipse.jetty_jetty-io-9.4.54.v20240208 0.00078 false
CVE-2020-8908 Twistlock CVE Low guava-31.1.0.jre 0.00072 false
CVE-2020-8908 Twistlock CVE Low com.google.guava_guava-18.0 0.00072 false
CVE-2020-8908 Twistlock CVE Low com.google.guava_guava-31.1-jre 0.00072 false
CVE-2023-2976 Twistlock CVE High guava-31.1.0.jre 0.00071 false
CVE-2023-2976 Twistlock CVE High com.google.guava_guava-18.0 0.00071 false
CVE-2023-2976 Twistlock CVE High com.google.guava_guava-31.1-jre 0.00071 false
CVE-2025-8885 Twistlock CVE Medium org.bouncycastle_bcprov-jdk18on-1.76.0.0 0.00063 false
CVE-2025-8885 Twistlock CVE Medium org.bouncycastle_bcprov-jdk18on-1.77.00.0 0.00063 false
CVE-2025-66516 Twistlock CVE Critical org.apache.tika_tika-core-2.8.0 0.00063 false
CVE-2025-66516 Anchore CVE Critical tika-parsers-standard-package-2.8.0 0.00063 false
CVE-2025-66516 Anchore CVE Critical tika-bundle-standard-2.8.0 0.00063 false
CVE-2008-0732 Anchore CVE Low geronimo-el_2.2_spec-1.1 0.00054 false
CVE-2025-52999 Twistlock CVE High com.fasterxml.jackson.core_jackson-core-2.14.1 0.00030 false
CVE-2025-54988 Anchore CVE Critical tika-bundle-standard-2.8.0 0.00024 false
CVE-2025-54988 Anchore CVE Critical tika-core-2.8.0 0.00024 false
CVE-2025-54988 Anchore CVE Critical tika-core-2.8.0 0.00024 false
CVE-2025-54988 Anchore CVE Critical tika-parsers-standard-package-2.8.0 0.00024 false
CVE-2025-54988 Twistlock CVE Low org.apache.tika_tika-core-2.8.0 0.00024 false
CVE-2023-50572 Anchore CVE Medium jline-3.21.0 0.00021 false
CVE-2024-25710 Twistlock CVE Medium org.apache.commons_commons-compress-1.23.0 0.00018 false
CVE-2023-35116 Anchore CVE Medium jackson-databind-2.15.3 0.00017 false
CVE-2023-35116 Anchore CVE Medium jackson-databind-2.15.2 0.00017 false
CVE-2023-35116 Anchore CVE Medium jackson-databind-2.14.1 0.00017 false
CVE-2025-48924 Twistlock CVE Medium org.apache.commons_commons-lang3-3.4 0.00014 false
CVE-2025-48924 Twistlock CVE Medium org.apache.commons_commons-lang3-3.14.0 0.00014 false
CVE-2025-48924 Twistlock CVE Medium commons-lang_commons-lang-2.6 0.00014 false
CVE-2025-48924 Twistlock CVE Medium org.apache.commons_commons-lang3-3.12.0 0.00014 false
CVE-2023-1370 Twistlock CVE High net.minidev_json-smart-2.4.8 0.00012 false
CVE-2023-42503 Twistlock CVE Medium org.apache.commons_commons-compress-1.23.0 0.00011 false
PRISMA-2023-0067 Twistlock CVE High com.fasterxml.jackson.core_jackson-core-2.14.1 N/A N/A
PRISMA-2021-0055 Twistlock CVE Low commons-codec_commons-codec-1.11 N/A N/A
GHSA-xfrj-6vvc-3xm2 Anchore CVE Medium xmlsec-2.3.1 N/A N/A
GHSA-vv7r-c36w-3prj Anchore CVE High commons-fileupload-1.5 N/A N/A
GHSA-vv7r-c36w-3prj Anchore CVE High commons-fileupload-1.5 N/A N/A
GHSA-v435-xc8x-wvr9 Anchore CVE Medium bcprov-jdk18on-1.76 N/A N/A
GHSA-v435-xc8x-wvr9 Anchore CVE Medium bcprov-jdk18on-1.77 N/A N/A
GHSA-rcjj-h6gh-jf3r Anchore CVE Medium groovy-3.0.3 N/A N/A
GHSA-qh8g-58pp-2wxh Anchore CVE Medium jetty-http-10.0.22 N/A N/A
GHSA-qh8g-58pp-2wxh Anchore CVE Medium jetty-http-9.4.54.v20240208 N/A N/A
GHSA-q4rv-gq96-w7c5 Anchore CVE High jetty-server-9.4.54.v20240208 N/A N/A
GHSA-pvp8-3xj6-8c6x Anchore CVE Low commons-configuration-1.10 N/A N/A
GHSA-mvr2-9pj6-7w5j Anchore CVE Medium guava-18.0 N/A N/A
GHSA-mmxm-8w33-wc4h Anchore CVE High http2-common-9.4.54.v20240208 N/A N/A
GHSA-mmxm-8w33-wc4h Anchore CVE High http2-common-10.0.22 N/A N/A
GHSA-mjmj-j48q-9wg2 Anchore CVE High snakeyaml-1.33 N/A N/A
GHSA-m44j-cfrm-g8qc Anchore CVE Medium bcprov-jdk18on-1.76 N/A N/A
GHSA-m44j-cfrm-g8qc Anchore CVE Medium bcprov-jdk18on-1.77 N/A N/A
GHSA-jw7r-rxff-gv24 Anchore CVE Medium apache-mime4j-core-0.8.9 N/A N/A
GHSA-jw7r-rxff-gv24 Anchore CVE Medium apache-mime4j-core-0.8.9 N/A N/A
GHSA-j288-q9x7-2f5v Anchore CVE Medium commons-lang3-3.14.0 N/A N/A
GHSA-j288-q9x7-2f5v Anchore CVE Medium commons-lang3-3.14.0 N/A N/A
GHSA-j288-q9x7-2f5v Anchore CVE Medium commons-lang3-3.14.0 N/A N/A
GHSA-j288-q9x7-2f5v Anchore CVE Medium commons-lang3-3.14.0 N/A N/A
GHSA-j288-q9x7-2f5v Anchore CVE Medium commons-lang3-3.14.0 N/A N/A
GHSA-j288-q9x7-2f5v Anchore CVE Medium commons-lang3-3.14.0 N/A N/A
GHSA-j288-q9x7-2f5v Anchore CVE Medium commons-lang3-3.12.0 N/A N/A
GHSA-j288-q9x7-2f5v Anchore CVE Medium commons-lang3-3.12.0 N/A N/A
GHSA-j288-q9x7-2f5v Anchore CVE Medium commons-lang3-3.4 N/A N/A
GHSA-j288-q9x7-2f5v Anchore CVE Medium commons-lang3-3.14.0 N/A N/A
GHSA-j288-q9x7-2f5v Anchore CVE Medium commons-lang3-3.14.0 N/A N/A
GHSA-j288-q9x7-2f5v Anchore CVE Medium commons-lang3-3.12.0 N/A N/A
GHSA-j288-q9x7-2f5v Anchore CVE Medium commons-lang-2.6 N/A N/A
GHSA-j288-q9x7-2f5v Anchore CVE Medium commons-lang3-3.14.0 N/A N/A
GHSA-j288-q9x7-2f5v Anchore CVE Medium commons-lang3-3.14.0 N/A N/A
GHSA-h46c-h94j-95f3 Anchore CVE High jackson-core-2.14.1 N/A N/A
GHSA-gwrp-pvrq-jmwv Anchore CVE Medium commons-io-2.5 N/A N/A
GHSA-gmg8-593g-7mv3 Anchore CVE Medium poi-ooxml-5.2.3 N/A N/A
GHSA-g93m-8x6h-g5gv Anchore CVE High zookeeper-3.9.2 N/A N/A
GHSA-g8m5-722r-8whq Anchore CVE Medium jetty-server-9.4.54.v20240208 N/A N/A
GHSA-f58c-gq56-vjjf Anchore CVE Critical tika-core-2.8.0 N/A N/A
GHSA-f58c-gq56-vjjf Anchore CVE Critical tika-core-2.8.0 N/A N/A
GHSA-cgwf-w82q-5jrr Anchore CVE Medium commons-compress-1.23.0 N/A N/A
GHSA-8xfc-gm6g-vgpv Anchore CVE Medium bcprov-jdk18on-1.76 N/A N/A
GHSA-8xfc-gm6g-vgpv Anchore CVE Medium bcprov-jdk18on-1.77 N/A N/A
GHSA-826p-4gcg-35vw Anchore CVE Critical gt-wfs-ng-29.6 N/A N/A
GHSA-826p-4gcg-35vw Twistlock CVE Critical org.geotools_gt-wfs-ng-29.6 N/A N/A
GHSA-7g45-4rm6-3mm3 Anchore CVE Medium guava-18.0 N/A N/A
GHSA-7g45-4rm6-3mm3 Anchore CVE Medium guava-31.1-jre N/A N/A
GHSA-7f88-5hhx-67m2 Anchore CVE High xnio-api-3.8.11.Final N/A N/A
GHSA-78wr-2p64-hpwj Anchore CVE High commons-io-2.11.0 N/A N/A
GHSA-78wr-2p64-hpwj Anchore CVE High commons-io-2.5 N/A N/A
GHSA-78wr-2p64-hpwj Anchore CVE High commons-io-2.11.0 N/A N/A
GHSA-78wr-2p64-hpwj Anchore CVE High commons-io-2.11.0 N/A N/A
GHSA-735f-pc8j-v9w8 Anchore CVE High protobuf-java-3.19.6 N/A N/A
GHSA-67mf-3cr5-8w23 Anchore CVE Medium bcprov-jdk18on-1.77 N/A N/A
GHSA-67mf-3cr5-8w23 Anchore CVE Medium bcprov-jdk18on-1.76 N/A N/A
GHSA-5mg8-w23w-74h3 Anchore CVE Low guava-18.0 N/A N/A
GHSA-5mg8-w23w-74h3 Anchore CVE Low guava-31.1-jre N/A N/A
GHSA-4pvw-g9fx-594r Anchore CVE Medium org.apache.felix.healthcheck.webconsoleplugin-2.0.2 N/A N/A
GHSA-4jrv-ppp4-jm57 Anchore CVE High gson-2.8.5 N/A N/A
GHSA-4h8f-2wvx-gg5w Anchore CVE Medium bcprov-jdk18on-1.76 N/A N/A
GHSA-4h8f-2wvx-gg5w Anchore CVE Medium bcprov-jdk18on-1.77 N/A N/A
GHSA-4g9r-vxhx-9pgx Anchore CVE Medium commons-compress-1.23.0 N/A N/A
GHSA-4cx2-fc23-5wg6 Anchore CVE Medium bcpkix-jdk18on-1.76 N/A N/A
GHSA-4cx2-fc23-5wg6 Anchore CVE Medium bcpkix-jdk18on-1.77 N/A N/A
GHSA-4c37-7m5h-c8m9 Anchore CVE Medium org.apache.felix.webconsole-4.8.12 N/A N/A
GHSA-493p-pfq6-5258 Anchore CVE High json-smart-2.4.8 N/A N/A
GHSA-493p-pfq6-5258 Anchore CVE High json-smart-2.4.8 N/A N/A
GHSA-493p-pfq6-5258 Anchore CVE High json-smart-2.4.8 N/A N/A
GHSA-4265-ccf5-phj5 Anchore CVE Medium commons-compress-1.23.0 N/A N/A
GHSA-3f7h-mf4q-vrm4 Anchore CVE Medium woodstox-core-6.2.8 N/A N/A
GHSA-2hmj-97jw-28jh Anchore CVE Medium zookeeper-3.9.2 N/A N/A
877f5090d3b898c03cce32a52db1d2ce Anchore Compliance Critical N/A N/A
28ed50d0466d9c238e8ab814c7757c11 Anchore Compliance Critical N/A N/A

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=octo/ddf&tag=3.1.0&branch=master

Tasks

Contributor:

  • Apply the StatusReview label to this issue for a merge request review and wait for feedback

OR

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue for a VAT justifications review and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Review or Verification label will be removed and the issue will be sent back to To-Do. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Review or Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by CHORE_TOKEN
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information