UNCLASSIFIED - NO CUI

chore(findings): opensource/odoo/odoo-enterprise

Summary

opensource/odoo/odoo-enterprise has 288 new findings discovered during continuous monitoring.

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/odoo/odoo-enterprise&tag=18.0&branch=master

id source severity package impact workaround
75d08d8c7b064bbd44f2f524c924d17b Anchore Compliance Critical
6329fe232b699ab5b4c9002b9f1b1f9e Anchore Compliance Critical
e56b64c2a7d254d4174ecaed69899327 Anchore Compliance Critical
eec438eed6560f1ea7792b726009538e Anchore Compliance Low
c2e44319ae5b3b040044d8ae116d1c2f Anchore Compliance Low
698044205a9c4a6d48b7937e66a6bf4f Anchore Compliance Low
463a9a24225c26f7a5bf3f38908e5cb3 Anchore Compliance Low
bcd159901fe47efddae5c095b4b0d7fd Anchore Compliance Low
320a97c6816565eedf3545833df99dd0 Anchore Compliance Low
e7573262736ef52353cde3bae2617782 Anchore Compliance Low
8e163263cda4bd745af2e34598d058fe Anchore Compliance Critical
8030074f2c8ebd727f6071fea96456d1 Anchore Compliance Critical
b499a7c53e6a0110b1f81fea37c2d0b5 Anchore Compliance Critical
4f9abc83a7a1c95e222b659e0fab27fa Anchore Compliance Low
da870e801836e419385f2f300713cf7f Anchore Compliance Low
1317210dc75fe7a1b26dc4411a1dbec9 Anchore Compliance Critical
9921070a2e7c5460cc69e7e9c2f531ac Anchore Compliance Critical
da972e9d2b2f9f59d9b9e4efc7065d74 Anchore Compliance Critical
69001ac81b04d601e3e8c7b990e345cb Anchore Compliance Critical
299c0d7b8661dfad34c7d6a9faf64da0 Anchore Compliance Critical
1b780db74e7a5dd64bed64c63af999c1 Anchore Compliance Critical
c440cb308fc1af511f93e2cda5a44338 Anchore Compliance Critical
18408e9655ba6df30b6e00e7380fcaa1 Anchore Compliance Critical
d0bcaa0d7121f73dd0a122b9c43d2a2c Anchore Compliance Critical
2d34b803f2b736d505ea90492a260e60 Anchore Compliance Critical
dea7390a7d89b824f43bc6ce259be968 Anchore Compliance Critical
949dd1a81c64fa62b82de4a3b131c135 Anchore Compliance Critical
e6f458f3a6e1a0bcb62f7a199304f632 Anchore Compliance Critical
47126339a8dead4b8067e4c801e8faeb Anchore Compliance Critical
2f24192c1854096949f7f9a75d849cce Anchore Compliance Critical
CVE-2022-3857 Anchore CVE Low libpng16-16t64-1.6.43-5build1
CVE-2021-3647 Anchore CVE Medium node-uri-js-4.4.0+dfsg-8
CVE-2024-9143 Anchore CVE Low openssl-3.0.13-0ubuntu3.4
CVE-2024-22018 Anchore CVE Medium nodejs-18.19.1+dfsg-6ubuntu5
CVE-2019-16776 Anchore CVE Medium npm-9.2.0~ds1-2
CVE-2021-23566 Anchore CVE Medium node-postcss-8.4.31+~cs8.0.26-1
CVE-2019-18797 Anchore CVE Medium libsass1-3.6.5+20231221-3
CVE-2023-41419 Anchore CVE Medium python3-gevent-24.2.1-0.1ubuntu2
CVE-2024-22017 Anchore CVE High nodejs-18.19.1+dfsg-6ubuntu5
CVE-2022-3219 Anchore CVE Low keyboxd-2.4.4-2ubuntu17
CVE-2021-44465 Anchore CVE Medium odoo-18.0+e.20241112
CVE-2018-18064 Anchore CVE Low libcairo2-1.18.0-3build1
CVE-2022-43358 Anchore CVE Medium libsass1-3.6.5+20231221-3
CVE-2023-45803 Anchore CVE Medium python3-pip-24.0+dfsg-1ubuntu1.1
CVE-2024-22017 Anchore CVE High libnode109-18.19.1+dfsg-6ubuntu5
CVE-2024-10041 Anchore CVE Medium libpam-modules-bin-1.5.3-5ubuntu5.1
CVE-2022-33987 Anchore CVE Medium node-got-11.8.5+~cs58.13.36-3
CVE-2022-25858 Anchore CVE Medium node-terser-5.19.2-1
CVE-2024-43788 Anchore CVE Medium webpack-5.76.1+dfsg1+~cs17.16.16-1
CVE-2020-8203 Anchore CVE Medium node-lodash-packages-4.17.21+dfsg+~cs8.31.198.20210220-9
CVE-2024-27982 Anchore CVE Medium libnode-dev-18.19.1+dfsg-6ubuntu5
CVE-2021-23176 Anchore CVE Medium odoo-18.0+e.20241112
CVE-2021-44775 Anchore CVE Medium odoo-18.0+e.20241112
CVE-2018-19218 Anchore CVE Medium libsass1-3.6.5+20231221-3
CVE-2021-44531 Anchore CVE Medium nodejs-18.19.1+dfsg-6ubuntu5
CVE-2023-5574 Anchore CVE Low x11-common-1:7.7+23ubuntu3
CVE-2023-46809 Anchore CVE Medium nodejs-18.19.1+dfsg-6ubuntu5
CVE-2022-3219 Anchore CVE Low gpgv-2.4.4-2ubuntu17
CVE-2023-43804 Anchore CVE Medium python3-pip-24.0+dfsg-1ubuntu1.1
CVE-2018-11698 Anchore CVE Medium libsass1-3.6.5+20231221-3
CVE-2022-21824 Anchore CVE Medium libnode-dev-18.19.1+dfsg-6ubuntu5
CVE-2023-45133 Anchore CVE Medium node-babel7-runtime-7.20.15+ds1+~cs214.269.168-6build1
CVE-2024-22020 Anchore CVE Medium nodejs-18.19.1+dfsg-6ubuntu5
CVE-2023-5752 Anchore CVE Medium python3-pip-24.0+dfsg-1ubuntu1.1
CVE-2021-44476 Anchore CVE Medium odoo-18.0+e.20241112
CVE-2020-11080 Anchore CVE Medium nodejs-18.19.1+dfsg-6ubuntu5
CVE-2021-44531 Anchore CVE Medium libnode-dev-18.19.1+dfsg-6ubuntu5
CVE-2021-33502 Anchore CVE Medium node-got-11.8.5+~cs58.13.36-3
CVE-2021-44532 Anchore CVE Medium nodejs-18.19.1+dfsg-6ubuntu5
CVE-2016-20013 Anchore CVE Low libc-bin-2.39-0ubuntu8.3
CVE-2021-32804 Anchore CVE Medium node-tar-6.1.13+~cs7.0.5-3
CVE-2021-26947 Anchore CVE Medium odoo-18.0+e.20241112
CVE-2023-38552 Anchore CVE Medium libnode109-18.19.1+dfsg-6ubuntu5
CVE-2023-44487 Anchore CVE High libnode109-18.19.1+dfsg-6ubuntu5
CVE-2022-3219 Anchore CVE Low gnupg-2.4.4-2ubuntu17
CVE-2016-20013 Anchore CVE Low libc6-2.39-0ubuntu8.3
CVE-2022-25858 Anchore CVE Medium terser-5.19.2-1
CVE-2022-2596 Anchore CVE Medium node-fetch-3.3.2+~cs11.4.11-1
CVE-2024-34459 Anchore CVE Low libxml2-2.9.14+dfsg-1.3ubuntu3
CVE-2024-36138 Anchore CVE Medium libnode-dev-18.19.1+dfsg-6ubuntu5
CVE-2019-16777 Anchore CVE Medium npm-9.2.0~ds1-2
CVE-2018-11694 Anchore CVE Medium libsass1-3.6.5+20231221-3
CVE-2024-27983 Anchore CVE Medium libnode-dev-18.19.1+dfsg-6ubuntu5
CVE-2018-19797 Anchore CVE Medium libsass1-3.6.5+20231221-3
CVE-2023-39333 Anchore CVE Medium libnode-dev-18.19.1+dfsg-6ubuntu5
CVE-2021-23337 Anchore CVE Medium node-lodash-packages-4.17.21+dfsg+~cs8.31.198.20210220-9
CVE-2023-44487 Anchore CVE High libnode-dev-18.19.1+dfsg-6ubuntu5
CVE-2024-4068 Anchore CVE Medium node-braces-3.0.2+~3.0.1-1
CVE-2024-36137 Anchore CVE Medium libnode-dev-18.19.1+dfsg-6ubuntu5
CVE-2022-26592 Anchore CVE Medium libsass1-3.6.5+20231221-3
CVE-2022-31151 Anchore CVE Medium node-undici-5.26.3+dfsg1+~cs23.10.12-2
CVE-2024-24758 Anchore CVE Medium node-undici-5.26.3+dfsg1+~cs23.10.12-2
CVE-2023-46809 Anchore CVE Medium libnode-dev-18.19.1+dfsg-6ubuntu5
CVE-2024-2236 Anchore CVE Medium libgcrypt20-1.10.3-2build1
CVE-2018-11697 Anchore CVE Medium libsass1-3.6.5+20231221-3
CVE-2024-22018 Anchore CVE Medium libnode-dev-18.19.1+dfsg-6ubuntu5
CVE-2023-39331 Anchore CVE Medium libnode-dev-18.19.1+dfsg-6ubuntu5
CVE-2021-23166 Anchore CVE Medium odoo-18.0+e.20241112
CVE-2023-46809 Anchore CVE Medium libnode109-18.19.1+dfsg-6ubuntu5
CVE-2023-39329 Anchore CVE Medium libopenjp2-7-2.5.0-2ubuntu0.2
CVE-2022-24723 Anchore CVE Low node-uri-js-4.4.0+dfsg-8
CVE-2023-28154 Anchore CVE Medium webpack-5.76.1+dfsg1+~cs17.16.16-1
CVE-2021-23186 Anchore CVE Medium odoo-18.0+e.20241112
CVE-2018-10126 Anchore CVE Low libjpeg-turbo8-2.1.5-2ubuntu2
CVE-2024-6716 Anchore CVE Low libtiff6-4.5.1+git230720-4ubuntu2.2
CVE-2022-29244 Anchore CVE Medium npm-9.2.0~ds1-2
CVE-2024-50602 Anchore CVE Medium libexpat1-2.6.1-2ubuntu0.1
CVE-2022-31129 Anchore CVE Medium odoo-18.0+e.20241112
CVE-2024-41996 Anchore CVE Low openssl-3.0.13-0ubuntu3.4
CVE-2024-24750 Anchore CVE Medium node-undici-5.26.3+dfsg1+~cs23.10.12-2
CVE-2021-23383 Anchore CVE Medium handlebars-3:4.7.7+~4.1.0-1
CVE-2023-39333 Anchore CVE Medium nodejs-18.19.1+dfsg-6ubuntu5
CVE-2022-21824 Anchore CVE Medium nodejs-18.19.1+dfsg-6ubuntu5
CVE-2023-39333 Anchore CVE Medium libnode109-18.19.1+dfsg-6ubuntu5
CVE-2024-22020 Anchore CVE Medium libnode-dev-18.19.1+dfsg-6ubuntu5
CVE-2024-30261 Anchore CVE Medium node-undici-5.26.3+dfsg1+~cs23.10.12-2
CVE-2022-31150 Anchore CVE Medium node-undici-5.26.3+dfsg1+~cs23.10.12-2
CVE-2024-36137 Anchore CVE Medium nodejs-18.19.1+dfsg-6ubuntu5
CVE-2024-37372 Anchore CVE Medium libnode-dev-18.19.1+dfsg-6ubuntu5
CVE-2024-10963 Anchore CVE Medium libpam-modules-1.5.3-5ubuntu5.1
CVE-2024-3651 Anchore CVE Medium python3-pip-24.0+dfsg-1ubuntu1.1
CVE-2018-19838 Anchore CVE Medium libsass1-3.6.5+20231221-3
CVE-2024-38372 Anchore CVE Medium node-undici-5.26.3+dfsg1+~cs23.10.12-2
CVE-2024-22025 Anchore CVE Medium libnode109-18.19.1+dfsg-6ubuntu5
CVE-2021-3807 Anchore CVE Medium node-ansi-regex-5.0.1-1
CVE-2022-25883 Anchore CVE Medium node-semver-7.5.4+~7.5.0-2
CVE-2020-29396 Anchore CVE Medium odoo-18.0+e.20241112
CVE-2021-26263 Anchore CVE Medium odoo-18.0+e.20241112
CVE-2019-6461 Anchore CVE Low libcairo2-1.18.0-3build1
CVE-2023-38552 Anchore CVE Medium libnode-dev-18.19.1+dfsg-6ubuntu5
CVE-2024-22018 Anchore CVE Medium libnode109-18.19.1+dfsg-6ubuntu5
CVE-2020-7788 Anchore CVE Medium node-ini-3.0.1-2
CVE-2021-44533 Anchore CVE Medium nodejs-18.19.1+dfsg-6ubuntu5
CVE-2020-11080 Anchore CVE Medium libnode-dev-18.19.1+dfsg-6ubuntu5
CVE-2022-43357 Anchore CVE Medium libsass1-3.6.5+20231221-3
CVE-2020-28500 Anchore CVE Medium node-lodash-packages-4.17.21+dfsg+~cs8.31.198.20210220-9
CVE-2021-44534 Anchore CVE Medium libnode109-18.19.1+dfsg-6ubuntu5
CVE-2022-3219 Anchore CVE Low gnupg-utils-2.4.4-2ubuntu17
CVE-2022-21824 Anchore CVE Medium libnode109-18.19.1+dfsg-6ubuntu5
CVE-2021-44534 Anchore CVE Medium libnode-dev-18.19.1+dfsg-6ubuntu5
CVE-2023-45133 Anchore CVE Medium node-babel7-7.20.15+ds1+~cs214.269.168-6build1
CVE-2018-20822 Anchore CVE Medium libsass1-3.6.5+20231221-3
CVE-2021-43616 Anchore CVE Medium npm-9.2.0~ds1-2
CVE-2021-44533 Anchore CVE Medium libnode-dev-18.19.1+dfsg-6ubuntu5
CVE-2020-8203 Anchore CVE Medium node-lodash-4.17.21+dfsg+~cs8.31.198.20210220-9
CVE-2024-10963 Anchore CVE Medium libpam-runtime-1.5.3-5ubuntu5.1
CVE-2022-3219 Anchore CVE Low gpgconf-2.4.4-2ubuntu17
CVE-2021-37712 Anchore CVE Medium node-tar-6.1.13+~cs7.0.5-3
CVE-2023-46250 Anchore CVE Medium python3-pypdf2-2.12.1-4
CVE-2023-39331 Anchore CVE Medium libnode109-18.19.1+dfsg-6ubuntu5
CVE-2021-44533 Anchore CVE Medium libnode109-18.19.1+dfsg-6ubuntu5
CVE-2024-29415 Anchore CVE Medium node-ip-2.0.0+~1.1.0-1ubuntu1
CVE-2021-45071 Anchore CVE Medium odoo-18.0+e.20241112
CVE-2024-41996 Anchore CVE Low libssl3t64-3.0.13-0ubuntu3.4
CVE-2024-27983 Anchore CVE Medium libnode109-18.19.1+dfsg-6ubuntu5
CVE-2024-22020 Anchore CVE Medium libnode109-18.19.1+dfsg-6ubuntu5
CVE-2018-19219 Anchore CVE Medium libsass1-3.6.5+20231221-3
CVE-2024-9143 Anchore CVE Low libssl-dev-3.0.13-0ubuntu3.4
CVE-2024-27982 Anchore CVE Medium libnode109-18.19.1+dfsg-6ubuntu5
CVE-2024-10963 Anchore CVE Medium libpam-modules-bin-1.5.3-5ubuntu5.1
CVE-2024-22025 Anchore CVE Medium libnode-dev-18.19.1+dfsg-6ubuntu5
CVE-2019-6462 Anchore CVE Low libcairo2-1.18.0-3build1
CVE-2022-3219 Anchore CVE Low gpgsm-2.4.4-2ubuntu17
CVE-2024-27983 Anchore CVE Medium nodejs-18.19.1+dfsg-6ubuntu5
CVE-2024-22025 Anchore CVE Medium nodejs-18.19.1+dfsg-6ubuntu5
CVE-2021-23203 Anchore CVE Medium odoo-18.0+e.20241112
CVE-2024-36138 Anchore CVE Medium nodejs-18.19.1+dfsg-6ubuntu5
CVE-2021-37713 Anchore CVE Medium node-tar-6.1.13+~cs7.0.5-3
CVE-2024-35195 Anchore CVE Medium python3-pip-24.0+dfsg-1ubuntu1.1
CVE-2024-10041 Anchore CVE Medium libpam-runtime-1.5.3-5ubuntu5.1
CVE-2019-18798 Anchore CVE Medium libsass1-3.6.5+20231221-3
CVE-2023-39331 Anchore CVE Medium nodejs-18.19.1+dfsg-6ubuntu5
CVE-2024-26134 Anchore CVE Medium python3-cbor2-5.6.2-1build1
CVE-2021-44532 Anchore CVE Medium libnode109-18.19.1+dfsg-6ubuntu5
CVE-2024-27982 Anchore CVE Medium nodejs-18.19.1+dfsg-6ubuntu5
CVE-2024-9143 Anchore CVE Low libssl3t64-3.0.13-0ubuntu3.4
CVE-2021-44531 Anchore CVE Medium libnode109-18.19.1+dfsg-6ubuntu5
CVE-2021-44906 Anchore CVE Medium node-minimist-1.2.8+~cs5.3.5-1
CVE-2021-44534 Anchore CVE Medium nodejs-18.19.1+dfsg-6ubuntu5
CVE-2017-9814 Anchore CVE Low libcairo2-1.18.0-3build1
CVE-2024-30260 Anchore CVE Medium node-undici-5.26.3+dfsg1+~cs23.10.12-2
CVE-2018-25091 Anchore CVE Medium python3-pip-24.0+dfsg-1ubuntu1.1
CVE-2021-23178 Anchore CVE Medium odoo-18.0+e.20241112
CVE-2021-44547 Anchore CVE Medium odoo-18.0+e.20241112
CVE-2017-20162 Anchore CVE Medium npm-9.2.0~ds1-2
CVE-2024-36138 Anchore CVE Medium libnode109-18.19.1+dfsg-6ubuntu5
CVE-2020-11080 Anchore CVE Medium libnode109-18.19.1+dfsg-6ubuntu5
CVE-2023-44270 Anchore CVE Medium node-postcss-8.4.31+~cs8.0.26-1
CVE-2023-39328 Anchore CVE Medium libopenjp2-7-2.5.0-2ubuntu0.2
CVE-2024-36137 Anchore CVE Medium libnode109-18.19.1+dfsg-6ubuntu5
CVE-2022-3219 Anchore CVE Low gpg-2.4.4-2ubuntu17
CVE-2017-7475 Anchore CVE Low libcairo2-1.18.0-3build1
CVE-2020-28500 Anchore CVE Medium node-lodash-4.17.21+dfsg+~cs8.31.198.20210220-9
CVE-2024-41996 Anchore CVE Low libssl-dev-3.0.13-0ubuntu3.4
CVE-2019-6988 Anchore CVE Low libopenjp2-7-2.5.0-2ubuntu0.2
CVE-2021-45111 Anchore CVE Low odoo-18.0+e.20241112
CVE-2021-23337 Anchore CVE Medium node-lodash-4.17.21+dfsg+~cs8.31.198.20210220-9
CVE-2024-37372 Anchore CVE Medium libnode109-18.19.1+dfsg-6ubuntu5
CVE-2023-45143 Anchore CVE Medium node-undici-5.26.3+dfsg1+~cs23.10.12-2
CVE-2021-44460 Anchore CVE Medium odoo-18.0+e.20241112
CVE-2022-3219 Anchore CVE Low dirmngr-2.4.4-2ubuntu17
CVE-2021-44532 Anchore CVE Medium libnode-dev-18.19.1+dfsg-6ubuntu5
CVE-2023-45311 Anchore CVE Medium npm-9.2.0~ds1-2
CVE-2019-16775 Anchore CVE Medium npm-9.2.0~ds1-2
CVE-2022-3219 Anchore CVE Low gpg-agent-2.4.4-2ubuntu17
CVE-2023-37769 Anchore CVE Medium libpixman-1-0-0.42.2-1build1
CVE-2018-20821 Anchore CVE Medium libsass1-3.6.5+20231221-3
CVE-2024-28863 Anchore CVE Medium node-tar-6.1.13+~cs7.0.5-3
CVE-2024-10041 Anchore CVE Medium libpam0g-1.5.3-5ubuntu5.1
CVE-2024-37372 Anchore CVE Medium nodejs-18.19.1+dfsg-6ubuntu5
CVE-2024-10963 Anchore CVE Medium libpam0g-1.5.3-5ubuntu5.1
CVE-2023-38552 Anchore CVE Medium nodejs-18.19.1+dfsg-6ubuntu5
CVE-2024-10041 Anchore CVE Medium libpam-modules-1.5.3-5ubuntu5.1
CVE-2024-22017 Anchore CVE High libnode-dev-18.19.1+dfsg-6ubuntu5
CVE-2024-4067 Anchore CVE Medium node-micromatch-4.0.5+~4.0.2-1
CVE-2024-3596 Anchore CVE Medium libk5crypto3-1.20.1-6ubuntu2.2
CVE-2024-26458 Anchore CVE Low libgssapi-krb5-2-1.20.1-6ubuntu2.2
CVE-2024-26462 Anchore CVE Medium libk5crypto3-1.20.1-6ubuntu2.2
CVE-2024-26458 Anchore CVE Low libkrb5-3-1.20.1-6ubuntu2.2
CVE-2024-26462 Anchore CVE Medium libgssapi-krb5-2-1.20.1-6ubuntu2.2
CVE-2024-3596 Anchore CVE Medium libgssapi-krb5-2-1.20.1-6ubuntu2.2
CVE-2024-26461 Anchore CVE Low libkrb5support0-1.20.1-6ubuntu2.2
CVE-2024-26462 Anchore CVE Medium libkrb5-3-1.20.1-6ubuntu2.2
CVE-2024-26461 Anchore CVE Low libgssapi-krb5-2-1.20.1-6ubuntu2.2
CVE-2024-26458 Anchore CVE Low libk5crypto3-1.20.1-6ubuntu2.2
CVE-2024-3596 Anchore CVE Medium libkrb5-3-1.20.1-6ubuntu2.2
CVE-2024-26462 Anchore CVE Medium libkrb5support0-1.20.1-6ubuntu2.2
CVE-2024-26461 Anchore CVE Low libk5crypto3-1.20.1-6ubuntu2.2
CVE-2024-3596 Anchore CVE Medium libkrb5support0-1.20.1-6ubuntu2.2
CVE-2024-26461 Anchore CVE Low libkrb5-3-1.20.1-6ubuntu2.2
CVE-2024-26458 Anchore CVE Low libkrb5support0-1.20.1-6ubuntu2.2
CVE-2024-52595 Anchore CVE Medium python3-lxml-html-clean-0.1.1-1
CVE-2023-45133 Twistlock CVE Critical @babel/traverse-7.20.13
PRISMA-2022-0168 Twistlock CVE High pip-24.0
CVE-2024-4068 Twistlock CVE High braces-3.0.2
CVE-2023-26115 Twistlock CVE High word-wrap-1.2.3
CVE-2022-25881 Twistlock CVE High http-cache-semantics-4.1.0
CVE-2023-41419 Twistlock CVE Medium python-gevent-24.2.1-0.1ubuntu2
CVE-2020-7788 Twistlock CVE Medium node-ini-3.0.1-2
CVE-2020-29396 Twistlock CVE Medium odoo-18.0+e.20241112
CVE-2020-29396 Twistlock CVE Medium odoo-18.0+e.20241112
CVE-2018-11694 Twistlock CVE Medium libsass-3.6.5+20231221-3
CVE-2018-11698 Twistlock CVE Medium libsass-3.6.5+20231221-3
CVE-2018-11697 Twistlock CVE Medium libsass-3.6.5+20231221-3
CVE-2021-23337 Twistlock CVE Medium node-lodash-4.17.21+dfsg+~cs8.31.198.20210220-9
CVE-2023-37769 Twistlock CVE Medium pixman-0.42.2-1build1
CVE-2018-20821 Twistlock CVE Medium libsass-3.6.5+20231221-3
CVE-2018-19797 Twistlock CVE Medium libsass-3.6.5+20231221-3
CVE-2024-43788 Twistlock CVE Medium webpack-5.76.1
PRISMA-2022-0014 Twistlock CVE Medium cli-table-0.3.11
CVE-2024-4067 Twistlock CVE Medium micromatch-4.0.5
CVE-2020-28500 Twistlock CVE Medium node-lodash-4.17.21+dfsg+~cs8.31.198.20210220-9
GHSA-h4gh-qq45-vh27 Twistlock CVE Medium cryptography-41.0.7
CVE-2024-35195 Twistlock CVE Medium python-pip-24.0+dfsg-1ubuntu1.1
CVE-2024-2236 Twistlock CVE Medium libgcrypt20-1.10.3-2build1
CVE-2023-39329 Twistlock CVE Medium openjpeg2-2.5.0-2ubuntu0.2
CVE-2023-39328 Twistlock CVE Medium openjpeg2-2.5.0-2ubuntu0.2
CVE-2016-20013 Twistlock CVE Low glibc-2.39-0ubuntu8.3
CVE-2019-6988 Twistlock CVE Low openjpeg2-2.5.0-2ubuntu0.2
CVE-2019-6461 Twistlock CVE Low cairo-1.18.0-3build1
CVE-2018-18064 Twistlock CVE Low cairo-1.18.0-3build1
CVE-2017-7475 Twistlock CVE Low cairo-1.18.0-3build1
CVE-2024-30260 Twistlock CVE Low undici-5.26.3
CVE-2024-24758 Twistlock CVE Low undici-5.26.3
CVE-2022-3219 Twistlock CVE Low gnupg2-2.4.4-2ubuntu17
CVE-2024-30261 Twistlock CVE Low undici-5.26.3
CVE-2024-41996 Twistlock CVE Low openssl-3.0.13-0ubuntu3.4
CVE-2024-26462 Twistlock CVE Medium krb5-1.20.1-6ubuntu2.2
CVE-2024-26461 Twistlock CVE Low krb5-1.20.1-6ubuntu2.2
CVE-2024-26458 Twistlock CVE Low krb5-1.20.1-6ubuntu2.2
CVE-2024-52595 Twistlock CVE High lxml-html-clean-0.1.1
CVE-2024-10963 Twistlock CVE Medium pam-1.5.3-5ubuntu5.1
CVE-2024-10041 Twistlock CVE Medium pam-1.5.3-5ubuntu5.1
CVE-2024-6345 Twistlock CVE High setuptools-68.1.2 Most users have migrated off of the code paths that are affected. The affected code paths are actively deprecated and planned for turn down. Only specialized and legacy workflows are affected. Use recommended installers pip, uv, build, system package managers to install all packages from trusted indexes. If working with untrusted content in private indexes, consider scanning for malicious code in the package index pages.
CVE-2024-34069 Twistlock CVE High werkzeug-3.0.1 While anyone using the debugger is technically vulnerable, it requires developers to use the debugger from within an attackercontrolled domain, and for the attacker to guess a URL that will raise an exception and start a debugger. The debugger still requires the developer to enter the debugger pin to enable the vulnerability. Developers should never expect clicking a link on an unfamiliar domain to start their local project, and closing the window if it happens will prevent the vulnerability. Disable the debuggers interactive features by passing useevalexFalse to runsimple. Do not interact with the debugger unless you navigate to it explicitly.
CVE-2024-26130 Twistlock CVE High cryptography-41.0.7
CVE-2023-50782 Twistlock CVE High cryptography-41.0.7
CVE-2024-28219 Twistlock CVE High pillow-10.2.0 Unlikely that a user would allow an attacker to enter an arbitrary mode string Do not allow provide modes longer than 8 characters. This should not impact functionality, as no modes are that long.
CVE-2024-49767 Twistlock CVE Medium werkzeug-3.0.1 Assuming the other conditions listed are met, then it is possible to exploit this. Configure Request.maxcontentlength.
CVE-2024-3651 Twistlock CVE Medium idna-3.6
CVE-2023-36464 Twistlock CVE Medium pypdf2-2.12.1 Handling untrusted PDFs is quite a common usecase of PyPDF, as is extracting text from them.
CVE-2024-22195 Twistlock CVE Medium jinja2-3.1.2 This requires using a specific filter in an uncommon way. Prefilter user input that you plan to pass as the keys. Values do not need to be filtered, as they are already escaped.
CVE-2024-35195 Twistlock CVE Medium requests-2.31.0
CVE-2024-0727 Twistlock CVE Medium cryptography-41.0.7
CVE-2024-34064 Twistlock CVE Medium jinja2-3.1.2 This requires using a specific filter in an uncommon way. Prefilter user input that you plan to pass as the keys. Values do not need to be filtered, as they are already escaped.
CVE-2024-37891 Twistlock CVE Medium urllib3-2.0.7 Theres no reason to set ProxyAuthorization without using urllib3s proxy support. Using the ProxyAuthorization header with urllib3s ProxyManager. Disabling HTTP redirects using redirectsFalse when sending requests. Not using the ProxyAuthorization header.
CVE-2024-49766 Twistlock CVE Medium werkzeug-3.0.1 Assuming the other conditions listed are met, this is exploitable.
CVE-2024-39689 Twistlock CVE Low certifi-2023.11.17

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/odoo/odoo-enterprise&tag=18.0&branch=master

Tasks

Contributor:

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Verification label will be removed and the issue will be sent back to Open. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by Al Fontaine
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information