chore(findings): opensource/kubeflow/visualization-server
Summary
opensource/kubeflow/visualization-server has 580 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
d531668494943a06d0d5a191ee0126cb | Anchore Compliance | Critical | |
GHSA-34f9-hjfq-rr8j | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-5qw5-89mw-wcg2 | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-9p77-mmrw-69c7 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-7j3m-8g3c-9qqq | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-jqm7-m5q7-3hm5 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-fcgg-rvwg-jv58 | Anchore CVE | High | github.com/hashicorp/go-getter-v1.4.0 |
GHSA-cq76-mxrc-vchh | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-9vp5-m38w-j776 | Anchore CVE | Low | helm.sh/helm/v3-v3.2.0 |
GHSA-4fx9-vc88-q2xc | Anchore CVE | Low | Pillow-8.4.0 |
GHSA-gf2j-f278-xh4v | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-wm93-f238-7v37 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-3pgj-pg6c-r5p7 | Anchore CVE | Medium | oauthlib-3.1.1 |
GHSA-98j8-c9q4-r38g | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-368v-7v32-52fx | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-jjm6-4vf7-cjh4 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-m87f-39q9-6f55 | Anchore CVE | High | notebook-6.4.6 |
GHSA-44qp-9wwf-734r | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-f54p-f6jp-4rhr | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-fq6p-6334-8gr4 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-9c78-vcq7-7vxq | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-g468-qj8g-vcjc | Anchore CVE | Low | tensorflow-2.5.1 |
GHSA-cpf4-wx82-gxp6 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-pq7m-3gw7-gq5x | Anchore CVE | High | ipython-7.12.0 |
GHSA-8vj2-vxx3-667w | Anchore CVE | Critical | Pillow-8.4.0 |
GHSA-6rx9-889q-vv2r | Anchore CVE | Medium | helm.sh/helm/v3-v3.2.0 |
GHSA-f2w8-jw48-fr7j | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-9j4v-pp28-mxv7 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-h67m-xg8f-fxcf | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-xrqm-fpgr-6hhx | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-qq97-vm5h-rrhg | Anchore CVE | Low | github.com/docker/distribution-v2.7.1+incompatible |
GHSA-v3f7-j968-4h5f | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-9fpg-838v-wpv7 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-frqp-wp83-qggv | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-5f2r-qp73-37mr | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-m4hf-j54p-p353 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-3mw4-6rj6-74g5 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-f2vv-v9cg-qhh7 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-53c4-hhmh-vw5q | Anchore CVE | Medium | helm.sh/helm/v3-v3.2.0 |
GHSA-wq6q-6m32-9rv9 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-gh8h-7j2j-qv4f | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-rrx2-r989-2c43 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-fpfv-jqm9-f5jm | Anchore CVE | Medium | numpy-1.19.5 |
GHSA-28r2-q6m8-9hpx | Anchore CVE | High | github.com/hashicorp/go-getter-v1.4.0 |
GHSA-v7vw-577f-vp8x | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-cqv6-3phm-hcwx | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-4j82-5ccr-4r8v | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-h246-cgh4-7475 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-f4w6-h4f5-wx45 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-79h2-q768-fpxr | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-27rq-4943-qcwp | Anchore CVE | Medium | github.com/hashicorp/go-getter-v1.4.0 |
GHSA-24x4-6qmh-88qg | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-vxv8-r8q2-63xw | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-h48f-q7rw-hvr7 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-67pf-62xr-q35m | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-7jr6-prv4-5wf5 | Anchore CVE | Medium | helm.sh/helm/v3-v3.2.0 |
GHSA-p2xf-8hgm-hpw5 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-27rc-728f-x5w2 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-vjg4-v33c-ggc4 | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-pxrw-j2fv-hx3h | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-8r7c-3cm2-3h8f | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-8cxv-76p7-jxwr | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-6hpv-v2rx-c5g6 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-m6cv-4fmf-66xf | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-c6fh-56w7-fvjw | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-fqxc-pvf8-2w9v | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-67fx-wx78-jx33 | Anchore CVE | Medium | helm.sh/helm/v3-v3.2.0 |
GHSA-4f99-p9c2-3j8x | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-428x-9xc2-m8mj | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-fv25-wrff-wf86 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-p9rc-rmr5-529j | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-prcg-wp5q-rv7p | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-m678-f26j-3hrp | Anchore CVE | High | jupyter-core-4.9.1 |
GHSA-4v5p-v5h9-6xjx | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-pgcq-h79j-2f69 | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-23hm-7w47-xw72 | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-pw3c-h7wp-cvhx | Anchore CVE | Critical | Pillow-8.4.0 |
GHSA-9942-r22v-78cp | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-wxjj-cgcx-r3vq | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-rh87-q4vg-m45j | Anchore CVE | Low | tensorflow-2.5.1 |
GHSA-h7ff-cfc9-wmmh | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-9px9-73fg-3fqp | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-xxcj-rhqg-m46g | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-7v94-64hj-m82h | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-77gp-3h4r-6428 | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-qhw4-wwr7-gjc5 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-xrp2-fhq4-4q3w | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-49rx-x2rw-pc6f | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-hrg5-737c-2p56 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-43fp-rhv2-5gv8 | Anchore CVE | Medium | certifi-2021.10.8 |
GHSA-5v77-j66x-4c4g | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-vwhq-49r4-gj9v | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-7r94-xv9v-63jw | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-7hfp-qfw3-5jxh | Anchore CVE | Medium | helm.sh/helm/v3-v3.2.0 |
GHSA-cqvq-fvhr-v6hc | Anchore CVE | Low | tensorflow-2.5.1 |
GHSA-43jf-985q-588j | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-4pc4-m9mj-v2r9 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-25xm-hr59-7c27 | Anchore CVE | High | github.com/ulikunitz/xz-v0.5.6 |
GHSA-hq7g-wwwp-q46h | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-m2vv-5vj5-2hm7 | Anchore CVE | High | Pillow-8.4.0 |
GHSA-jq6x-99hj-q636 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-cv2p-32v3-vhwq | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-fv43-93gv-vm8f | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-x3v8-c8qx-3j3r | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-87v6-crgm-2gfj | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-f7r5-q7cx-h668 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-x24g-9w7v-vprh | Anchore CVE | Critical | github.com/hashicorp/go-getter-v1.4.0 |
GHSA-pqrv-8r2f-7278 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-9v8w-xmr4-wgxp | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-wc4g-r73w-x8mm | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-fq86-3f29-px2c | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-5889-7v45-q28m | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-397c-5g2j-qxpv | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-x989-q2pq-4q5x | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-2p25-55c9-h58q | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-8rcj-c8pj-v3m3 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-h6gw-r52c-724r | Anchore CVE | Critical | tensorflow-2.5.1 |
GHSA-gcvh-66ff-4mwm | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-5wpj-c6f7-24x8 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-c582-c96p-r5cq | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-57wx-m983-2f88 | Anchore CVE | Critical | tensorflow-2.5.1 |
GHSA-c52f-pq47-2r9j | Anchore CVE | Low | helm.sh/helm/v3-v3.2.0 |
GHSA-v5xg-3q2c-c2r4 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-j3mj-fhpq-qqjj | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-w62h-8xjm-fv49 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-m6vp-8q9j-whx4 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-cjr4-fv6c-f3mv | Anchore CVE | High | github.com/hashicorp/go-getter-v1.4.0 |
GHSA-3839-6r69-m497 | Anchore CVE | Critical | github.com/Masterminds/goutils-v1.1.0 |
GHSA-9crf-c6qr-r273 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-h2wq-prv9-2f56 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-wcv5-vrvr-3rx2 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-v7vq-3x77-87vg | Anchore CVE | Medium | notebook-6.4.6 |
GHSA-q85f-69q7-55h2 | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-54ch-gjq5-4976 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-xf83-q765-xm6m | Anchore CVE | Low | tensorflow-2.5.1 |
GHSA-qx3f-p745-w4hr | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-fhfc-2q7x-929f | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-q6gq-997w-f55g | Anchore CVE | High | github.com/ulikunitz/xz-v0.5.6 |
GHSA-8wwm-6264-x792 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-pfjj-m3jj-9jc9 | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-qj5r-f9mv-rffh | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-h5g4-ppwx-48q2 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-rmg2-f698-wq35 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-54pp-c6pp-7fpx | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-f4rr-5m7v-wxcw | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-m539-j985-hcr8 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-mv77-9g28-cwg3 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-j43h-pgmg-5hjq | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-2475-53vw-vp25 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-v3c5-jqr6-7qm8 | Anchore CVE | High | future-0.18.2 |
GHSA-c38g-469g-cmgx | Anchore CVE | Medium | helm.sh/helm/v3-v3.2.0 |
GHSA-mg66-qvc5-rm93 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-ffjm-4qwc-7cmf | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-627q-g293-49q7 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-6p56-wp2h-9hxr | Anchore CVE | Medium | numpy-1.19.5 |
GHSA-mh3m-62v7-68xg | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-xg2h-wx96-xgxr | Anchore CVE | Low | github.com/Masterminds/goutils-v1.1.0 |
GHSA-374m-jm66-3vj8 | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-762h-vpvw-3rcx | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-rc9w-5c64-9vqq | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-8jj7-5vxc-pg2q | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-6hrg-qmvc-2xh8 | Anchore CVE | Critical | joblib-0.14.1 |
GHSA-jvhc-5hhr-w3v5 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-m54r-vrmv-hw33 | Anchore CVE | Low | helm.sh/helm/v3-v3.2.0 |
GHSA-9j59-75qj-795w | Anchore CVE | Critical | Pillow-8.4.0 |
GHSA-j86v-p27c-73fm | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-g35r-369w-3fqp | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-wr9v-g9vf-c74v | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-4w68-4x85-mjj9 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-gjqc-q9g6-q2j3 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-mgmh-g2v6-mqw5 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-689c-r7h2-fv9v | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-4hvf-hxvg-f67v | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-gq2j-cr96-gvqx | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-cwpm-f78v-7m5c | Anchore CVE | Medium | tensorflow-2.5.1 |
CVE-2022-45199 | Anchore CVE | High | Pillow-8.4.0 |
GHSA-6x99-gv2v-q76v | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-m342-ff57-4jcc | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-66vq-54fq-6jvv | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-fx5c-h9f6-rv7c | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-vgvh-2pf4-jr2x | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-xrcv-f9gm-v42c | Anchore CVE | Medium | Pillow-8.4.0 |
GHSA-rww7-2gpw-fv6j | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-9cr2-8pwr-fhfq | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-5crj-c72x-m7gq | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-pqhm-4wvf-2jg8 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-v6h3-348g-6h5x | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-rg3m-hqc5-344v | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-84jm-4cf3-9jfm | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-fpcp-9h7m-ffpx | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-247x-2f9f-5wp7 | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-qxpx-j395-pw36 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-2p9q-h29j-3f5v | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-5hx2-qx8j-qjqm | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-56hp-xqp3-w2jf | Anchore CVE | Medium | helm.sh/helm/v3-v3.2.0 |
GHSA-97p7-w86h-vcf9 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-jm56-5h66-w453 | Anchore CVE | Low | helm.sh/helm/v3-v3.2.0 |
GHSA-mw6j-hh29-h379 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-75c9-jrh4-79mc | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-9vqj-64pv-w55c | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-6gmv-pjp9-p8w8 | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-2r2f-g8mw-9gvr | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-6445-fm66-fvq2 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-7pxj-m4jf-r6h2 | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-q2c3-jpmc-gfjx | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-g9h5-vr8m-x2h4 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-q5jv-m6qw-5g37 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-pf36-r9c6-h97j | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-8w5g-3wcv-9g2j | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-wqmc-pm8c-2jhc | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-mv8m-8x97-937q | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-vm7x-4qhj-rrcq | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-2vv3-56qg-g2cf | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-9gwq-6cwj-47h3 | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-37jf-mjv6-xfqw | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-8fvv-46hw-vpg3 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-fr77-rrx3-cp7g | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-98p5-x8x4-c9m5 | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-p7hr-f446-x6qf | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-cg88-rpvp-cjv5 | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-r26c-679w-mrjm | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-c94w-c95p-phf8 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-hx9q-2mx4-m4pg | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-828c-5j5q-vrjq | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-3ff2-r28g-w7h9 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-3rcw-9p9x-582v | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-h5vq-gw2c-pq47 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-g9fm-r5mm-rf9f | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-9jmq-rx5f-8jwq | Anchore CVE | Medium | nbconvert-5.5.0 |
GHSA-786j-5qwq-r36x | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-xvwp-h6jv-7472 | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-j8c8-67vp-6mx7 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-43q8-3fv7-pr5x | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-rjx6-v474-2ch9 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-x4qx-4fjv-hmw6 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-8cfg-vx93-jvxw | Anchore CVE | Medium | k8s.io/client-go-v0.18.3 |
GHSA-pwcw-6f5g-gxf8 | Anchore CVE | Medium | helm.sh/helm/v3-v3.2.0 |
GHSA-29gw-9793-fvw7 | Anchore CVE | Medium | ipython-7.12.0 |
GHSA-c3h9-896r-86jm | Anchore CVE | High | github.com/gogo/protobuf-v1.3.1 |
GHSA-xg9f-g7g7-2323 | Anchore CVE | High | Werkzeug-2.0.2 |
GHSA-f5pg-7wfw-84q9 | Anchore CVE | Medium | github.com/aws/aws-sdk-go-v1.25.3 |
GHSA-jpxj-2jvg-6jv9 | Anchore CVE | Medium | github.com/hashicorp/go-getter-v1.4.0 |
GHSA-px8h-6qxv-m22q | Anchore CVE | Low | Werkzeug-2.0.2 |
GHSA-7f33-f4f5-xwgw | Anchore CVE | Low | github.com/aws/aws-sdk-go-v1.25.3 |
GHSA-vvpx-j8f3-3w6h | Anchore CVE | High | golang.org/x/net-v0.0.0-20220127200216-cd36cc0744dd |
GHSA-8c26-wmh5-6g9v | Anchore CVE | High | golang.org/x/crypto-v0.0.0-20220131195533-30dcbda58838 |
GHSA-69cg-p879-7622 | Anchore CVE | High | golang.org/x/net-v0.0.0-20220127200216-cd36cc0744dd |
GHSA-69ch-w2m2-3vjp | Anchore CVE | High | golang.org/x/text-v0.3.7 |
GHSA-p782-xgp4-8hr8 | Anchore CVE | Medium | golang.org/x/sys-v0.0.0-20220128215802-99c3d69c2c27 |
GHSA-76wf-9vgp-pj7w | Anchore CVE | Medium | github.com/aws/aws-sdk-go-v1.25.3 |
GHSA-5w96-866f-6rm8 | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-fxgc-95xx-grvq | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-6wfh-89q8-44jq | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-qjqc-vqcf-5qvj | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-gw97-ff7c-9v96 | Anchore CVE | Critical | tensorflow-2.5.1 |
GHSA-94mm-g2mv-8p7r | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-93vr-9q9m-pj8p | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-rcf8-g8jv-vg6p | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-gf97-q72m-7579 | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-647v-r7qq-24fh | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-49rq-hwc3-x77w | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-j5w9-hmfh-4cr6 | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-f49c-87jh-g47q | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-f637-vh3r-vfh2 | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-6hg6-5c2q-7rcr | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-fqm2-gh8w-gr68 | Anchore CVE | Medium | tensorflow-2.5.1 |
GHSA-64jg-wjww-7c5w | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-68v3-g9cm-rmm6 | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-558h-mq8x-7q9g | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-7jvm-xxmr-v5cw | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-7x4v-9gxg-9hwj | Anchore CVE | High | tensorflow-2.5.1 |
GHSA-h6q3-vv32-2cq5 | Anchore CVE | High | tensorflow-2.5.1 |
CCE-84036-3 | OSCAP Compliance | Medium | |
CCE-85888-6 | OSCAP Compliance | Medium | |
CCE-84038-9 | OSCAP Compliance | Medium | |
CVE-2022-23806 | Twistlock CVE | Critical | go-1.17.6 |
CVE-2022-26945 | Twistlock CVE | Critical | github.com/hashicorp/go-getter-v1.4.0 |
CVE-2021-4238 | Twistlock CVE | Critical | github.com/Masterminds/goutils-v1.1.0 |
CVE-2022-30580 | Twistlock CVE | High | go-1.17.6 |
CVE-2022-41715 | Twistlock CVE | High | go-1.17.6 |
CVE-2022-32189 | Twistlock CVE | High | go-1.17.6 |
CVE-2022-30635 | Twistlock CVE | High | go-1.17.6 |
CVE-2022-30633 | Twistlock CVE | High | go-1.17.6 |
CVE-2022-30632 | Twistlock CVE | High | go-1.17.6 |
CVE-2022-30631 | Twistlock CVE | High | go-1.17.6 |
CVE-2022-30630 | Twistlock CVE | High | go-1.17.6 |
CVE-2022-2880 | Twistlock CVE | High | go-1.17.6 |
CVE-2022-2879 | Twistlock CVE | High | go-1.17.6 |
CVE-2022-28327 | Twistlock CVE | High | go-1.17.6 |
CVE-2022-28131 | Twistlock CVE | High | go-1.17.6 |
CVE-2022-27664 | Twistlock CVE | High | go-1.17.6 |
CVE-2022-24921 | Twistlock CVE | High | go-1.17.6 |
CVE-2022-24675 | Twistlock CVE | High | go-1.17.6 |
CVE-2022-23773 | Twistlock CVE | High | go-1.17.6 |
CVE-2022-23772 | Twistlock CVE | High | go-1.17.6 |
CVE-2022-30323 | Twistlock CVE | High | github.com/hashicorp/go-getter-v1.4.0 |
CVE-2022-30322 | Twistlock CVE | High | github.com/hashicorp/go-getter-v1.4.0 |
CVE-2022-30321 | Twistlock CVE | High | github.com/hashicorp/go-getter-v1.4.0 |
CVE-2021-29482 | Twistlock CVE | High | github.com/ulikunitz/xz-v0.5.6 |
CVE-2020-16845 | Twistlock CVE | High | github.com/ulikunitz/xz-v0.5.6 |
PRISMA-2022-0113 | Twistlock CVE | Medium | github.com/aws/aws-sdk-go-v1.25.3 |
CVE-2022-32148 | Twistlock CVE | Medium | go-1.17.6 |
CVE-2022-2582 | Twistlock CVE | Medium | github.com/aws/aws-sdk-go-v1.25.3 |
CVE-2022-1705 | Twistlock CVE | Medium | go-1.17.6 |
CVE-2022-1962 | Twistlock CVE | Medium | go-1.17.6 |
CVE-2019-10743 | Twistlock CVE | Medium | github.com/mholt/archiver-v3.1.1 |
PRISMA-2022-0270 | Twistlock CVE | Medium | github.com/golang-jwt/jwt/v4-v4.0.0 |
CVE-2022-41716 | Twistlock CVE | High | go-1.17.6 |
PRISMA-2022-0164 | Twistlock CVE | Medium | github.com/aws/aws-sdk-go-v1.25.3 |
CVE-2022-41717 | Twistlock CVE | Medium | go-1.17.6 |
GHSA-56hp-xqp3-w2jf | Twistlock CVE | Medium | helm.sh/helm/v3-v3.2.0 |
CVE-2022-36055 | Twistlock CVE | Medium | helm.sh/helm/v3-v3.2.0 |
CVE-2022-29810 | Twistlock CVE | Medium | github.com/hashicorp/go-getter-v1.4.0 |
CVE-2022-23526 | Twistlock CVE | Medium | helm.sh/helm/v3-v3.2.0 |
CVE-2022-23525 | Twistlock CVE | Medium | helm.sh/helm/v3-v3.2.0 |
CVE-2022-23524 | Twistlock CVE | Medium | helm.sh/helm/v3-v3.2.0 |
CVE-2021-32690 | Twistlock CVE | Medium | helm.sh/helm/v3-v3.2.0 |
CVE-2021-21303 | Twistlock CVE | Medium | helm.sh/helm/v3-v3.2.0 |
CVE-2022-30629 | Twistlock CVE | Low | go-1.17.6 |
CVE-2020-8912 | Twistlock CVE | Low | github.com/aws/aws-sdk-go-v1.25.3 |
GHSA-xg2h-wx96-xgxr | Twistlock CVE | Low | github.com/Masterminds/goutils-v1.1.0 |
GHSA-qq97-vm5h-rrhg | Twistlock CVE | Low | github.com/docker/distribution-v2.7.1 |
CVE-2020-8565 | Twistlock CVE | Medium | k8s.io/client-go-v0.18.3 |
CVE-2023-25165 | Twistlock CVE | Medium | helm.sh/helm/v3-v3.2.0 |
CVE-2021-3121 | Twistlock CVE | High | github.com/gogo/protobuf-v1.3.1 |
CVE-2023-0475 | Twistlock CVE | Medium | github.com/hashicorp/go-getter-v1.4.0 |
CVE-2020-8911 | Twistlock CVE | Medium | github.com/aws/aws-sdk-go-v1.25.3 |
CVE-2022-41723 | Twistlock CVE | High | golang.org/x/net-v0.0.0-20220127200216-cd36cc0744dd |
CVE-2022-27664 | Twistlock CVE | High | golang.org/x/net-v0.0.0-20220127200216-cd36cc0744dd |
CVE-2022-27191 | Twistlock CVE | High | golang.org/x/crypto-v0.0.0-20220131195533-30dcbda58838 |
CVE-2022-29526 | Twistlock CVE | Medium | golang.org/x/sys-v0.0.0-20220128215802-99c3d69c2c27 |
CVE-2022-41725 | Twistlock CVE | High | go-1.17.6 |
CVE-2022-41724 | Twistlock CVE | High | go-1.17.6 |
CVE-2022-41723 | Twistlock CVE | High | go-1.17.6 |
CVE-2023-24532 | Twistlock CVE | Medium | go-1.17.6 |
CVE-2023-0464 | Twistlock CVE | Low | openssl-1.1.1k-9.el8_7 |
CVE-2023-0466 | Twistlock CVE | Low | openssl-1.1.1k-9.el8_7 |
CVE-2023-0465 | Twistlock CVE | Low | openssl-1.1.1k-9.el8_7 |
CVE-2023-25668 | Twistlock CVE | Critical | tensorflow-2.5.1 |
CVE-2023-25664 | Twistlock CVE | Critical | tensorflow-2.5.1 |
CVE-2022-41900 | Twistlock CVE | Critical | tensorflow-2.5.1 |
CVE-2022-23587 | Twistlock CVE | Critical | tensorflow-2.5.1 |
CVE-2022-22817 | Twistlock CVE | Critical | pillow-8.4.0 |
CVE-2022-21797 | Twistlock CVE | Critical | joblib-0.14.1 |
CVE-2022-41910 | Twistlock CVE | Critical | tensorflow-2.5.1 |
CVE-2022-41902 | Twistlock CVE | Critical | tensorflow-2.5.1 |
CVE-2022-41880 | Twistlock CVE | Critical | tensorflow-2.5.1 |
CVE-2022-24303 | Twistlock CVE | Critical | pillow-8.4.0 |
GHSA-h6gw-r52c-724r | Twistlock CVE | Critical | tensorflow-2.5.1 |
CVE-2022-23574 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-23573 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-23566 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-23562 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-23561 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-23560 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-23559 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-23558 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-21740 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-21727 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-21726 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-41894 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-21730 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-21728 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2023-25801 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-29216 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2021-41228 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2021-41225 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2021-41221 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2021-41219 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2021-41216 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2021-41214 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2021-41208 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2021-41206 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2021-41203 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2021-41201 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2023-27579 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2023-25676 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2023-25675 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2023-25674 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2023-25673 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2023-25672 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2023-25671 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2023-25670 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2023-25669 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2023-25667 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2023-25666 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2023-25665 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2023-25663 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2023-25662 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2023-25660 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2023-25659 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2023-25658 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2023-25577 | Twistlock CVE | High | werkzeug-2.0.2 |
CVE-2022-45199 | Twistlock CVE | High | pillow-8.4.0 |
CVE-2022-45198 | Twistlock CVE | High | pillow-8.4.0 |
CVE-2022-41911 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-41909 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-41908 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-41907 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-41901 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-41899 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-41898 | Twistlock CVE | High | tensorflow-2.5.1 |
GHSA-hqxw-f8mx-cpmw | Anchore CVE | High | github.com/docker/distribution-v2.7.1+incompatible |
GHSA-j8r2-6x86-q33q | Anchore CVE | Medium | requests-2.26.0 |
GHSA-hj3f-6gcp-jg8j | Anchore CVE | Medium | tornado-6.1 |
GHSA-6jvc-q2x7-pchv | Anchore CVE | Medium | github.com/aws/aws-sdk-go-v1.25.3 |
GHSA-cfgp-2977-2fmm | Anchore CVE | High | grpcio-1.34.1 |
GHSA-cfgp-2977-2fmm | Anchore CVE | High | google.golang.org/grpc-v1.28.1 |
CVE-2022-41897 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-41896 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-41895 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-41893 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-41891 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-41890 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-41889 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-41888 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-41886 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-41885 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-41884 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-36027 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-36026 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-36019 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-36018 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-36017 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-36016 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-36015 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-36014 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-36013 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-36012 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-36011 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-36005 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-36004 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-36003 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-36002 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-36001 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-36000 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-35999 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-35998 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-35997 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-35996 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-35995 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-35994 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-35993 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-35992 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-35991 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-35990 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-35989 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-35988 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-35987 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-35986 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-35985 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-35984 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-35983 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-35982 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-35981 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-35979 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-34749 | Twistlock CVE | High | mistune-0.8.4 |
CVE-2022-24758 | Twistlock CVE | High | notebook-6.4.6 |
CVE-2022-23591 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2022-23590 | Twistlock CVE | High | tensorflow-2.5.1 |
PRISMA-2021-0041 | Twistlock CVE | High | oauthlib-3.1.1 |
CVE-2022-29208 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2021-41226 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2021-41224 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2021-41223 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2021-41212 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2021-41210 | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2021-41205 | Twistlock CVE | High | tensorflow-2.5.1 |
GHSA-43q8-3fv7-pr5x | Twistlock CVE | High | tensorflow-2.5.1 |
CVE-2023-24816 | Twistlock CVE | High | ipython-7.12.0 |
CVE-2022-40899 | Twistlock CVE | High | future-0.18.2 |
CVE-2022-39286 | Twistlock CVE | High | jupyter-core-4.9.1 |
CVE-2022-1941 | Twistlock CVE | High | protobuf-3.19.1 |
CVE-2023-25661 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23595 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23589 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23588 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23586 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23585 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23584 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23583 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23582 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23581 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23580 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23579 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23577 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23576 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23575 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23572 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23571 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23570 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23569 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23568 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23567 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23565 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23564 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23557 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-22816 | Twistlock CVE | Medium | pillow-8.4.0 |
CVE-2022-22815 | Twistlock CVE | Medium | pillow-8.4.0 |
CVE-2022-21741 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-21739 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-21738 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-21737 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-21736 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-21735 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-21734 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-21733 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-21732 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-21731 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-21729 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-21725 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-23563 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-29213 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-29212 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-29211 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-29209 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-29207 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-29206 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-29205 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-29204 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-29203 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-29202 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-29201 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-29200 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-29199 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-29198 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-29197 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-29196 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-29195 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-29194 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-29193 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-29192 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-29191 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2021-41227 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2021-41222 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2021-41218 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2021-41217 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2021-41215 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2021-41213 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2021-41209 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2021-41207 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2021-41204 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2021-41202 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2021-41200 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2021-41199 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2021-41198 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2021-41197 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2021-41196 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2021-41195 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2021-37692 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2021-32862 | Twistlock CVE | Medium | nbconvert-5.5.0 |
CVE-2021-34141 | Twistlock CVE | Medium | numpy-1.19.5 |
CVE-2022-29238 | Twistlock CVE | Medium | notebook-6.4.6 |
CVE-2022-23578 | Twistlock CVE | Medium | tensorflow-2.5.1 |
GHSA-wcv5-vrvr-3rx2 | Twistlock CVE | Medium | tensorflow-2.5.1 |
GHSA-mw6j-hh29-h379 | Twistlock CVE | Medium | tensorflow-2.5.1 |
CVE-2022-36087 | Twistlock CVE | Medium | oauthlib-3.1.1 |
CVE-2022-23491 | Twistlock CVE | Medium | certifi-2021.10.8 |
CVE-2023-23934 | Twistlock CVE | Low | werkzeug-2.0.2 |
GHSA-xf83-q765-xm6m | Twistlock CVE | Low | tensorflow-2.5.1 |
GHSA-cqvq-fvhr-v6hc | Twistlock CVE | Low | tensorflow-2.5.1 |
GHSA-4fx9-vc88-q2xc | Twistlock CVE | Low | pillow-8.4.0 |
CVE-2020-15184 | Twistlock CVE | Low | helm.sh/helm/v3/pkg/chartutil-v3.2.0 |
CVE-2023-24537 | Twistlock CVE | High | go-1.17.6 |
CVE-2023-24538 | Twistlock CVE | Critical | go-1.17.6 |
CVE-2023-24536 | Twistlock CVE | High | go-1.17.6 |
CVE-2023-24534 | Twistlock CVE | High | go-1.17.6 |
CVE-2021-31879 | Twistlock CVE | Medium | wget-1.19.5-11.el8 |
CVE-2023-24540 | Twistlock CVE | Critical | go-1.17.6 |
CVE-2023-29400 | Twistlock CVE | High | go-1.17.6 |
CVE-2023-24539 | Twistlock CVE | High | go-1.17.6 |
CVE-2023-2253 | Twistlock CVE | High | github.com/docker/distribution-v2.7.1 |
CVE-2023-28370 | Twistlock CVE | Medium | tornado-6.1 |
CVE-2023-29403 | Twistlock CVE | High | go-1.17.6 |
CVE-2023-29405 | Twistlock CVE | Critical | go-1.17.6 |
CVE-2023-29404 | Twistlock CVE | Critical | go-1.17.6 |
CVE-2023-29402 | Twistlock CVE | Critical | go-1.17.6 |
CVE-2023-2650 | Twistlock CVE | Low | openssl-1.1.1k-9.el8_7 |
CVE-2023-32731 | Twistlock CVE | High | grpcio-1.34.1 |
CVE-2023-32731 | Twistlock CVE | High | google.golang.org/grpc-v1.28.1 |
VAT: https://vat.dso.mil/vat/image?imageName=opensource/kubeflow/visualization-server&tag=1.8.1&branch=master
More information can be found in the failed pipeline located here: https://repo1.dso.mil/dsop/opensource/kubeflow/visualization-server/-/jobs/17012571
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the ~"Hardening::Approval" label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications -
Send approval request to Authorizing Official -
Close issue after approval from Authorizing Official
Note: If the above approval process is rejected for any reason, the
Approval
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theApproval
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.