chore(findings): radiantone/fid
Summary
radiantone/fid has 251 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
CVE-2020-27218 | Anchore CVE | Medium | jetty-jndi-9.4.19.v20190610 |
GHSA-6vqp-h455-42mr | Anchore CVE | Medium | pdfbox-2.0.17 |
GHSA-mc84-pj99-q6hh | Anchore CVE | High | commons-compress-1.12 |
CVE-2017-3161 | Anchore CVE | Medium | hadoop-common-2.6.0 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-servlet-9.4.19.v20190610 |
GHSA-2h3j-m7gr-25xj | Anchore CVE | Medium | pdfbox-2.0.17 |
GHSA-xqfj-vm6h-2x34 | Anchore CVE | High | commons-compress-1.12 |
CVE-2018-1308 | Anchore CVE | High | solr-core-4.9.1 |
CVE-2016-5393 | Anchore CVE | High | hadoop-hdfs-2.6.0 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-rewrite-9.4.19.v20190610 |
GHSA-8m5h-hrqm-pxm2 | Anchore CVE | High | esapi-2.0.1 |
CVE-2020-27216 | Anchore CVE | High | jetty-xml-9.4.19.v20190610 |
CVE-2021-34428 | Anchore CVE | Low | jetty-rewrite-9.4.19.v20190610 |
CVE-2017-3161 | Anchore CVE | Medium | hadoop-auth-2.6.0 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-annotations-9.4.19.v20190610 |
CVE-2020-9492 | Anchore CVE | High | hadoop-auth-2.6.0 |
GHSA-grg4-wf29-r9vv | Anchore CVE | High | netty-codec-4.1.48.Final |
CVE-2015-1776 | Anchore CVE | Medium | hadoop-auth-2.6.0 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-annotations-9.4.19.v20190610 |
CVE-2018-8009 | Anchore CVE | High | hadoop-auth-2.6.0 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-server-9.4.19.v20190610 |
CVE-2020-27216 | Anchore CVE | High | jetty-servlet-9.4.19.v20190610 |
CVE-2021-34428 | Anchore CVE | Low | jetty-quickstart-9.4.19.v20190610 |
GHSA-crv7-7245-f45f | Anchore CVE | High | commons-compress-1.12 |
GHSA-h436-432x-8fvx | Anchore CVE | Medium | commons-compress-1.12 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-quickstart-9.4.19.v20190610 |
CVE-2020-9492 | Anchore CVE | High | hadoop-hdfs-2.6.0 |
CVE-2021-29262 | Anchore CVE | High | solr-core-4.9.1 |
CVE-2018-1313 | Anchore CVE | Medium | derbynet-10.8.2.2 |
CVE-2018-1296 | Anchore CVE | High | hadoop-hdfs-2.6.0 |
GHSA-673j-qm5f-xpv8 | Anchore CVE | Medium | postgresql-42.2.5 |
GHSA-7grw-6pjh-jpc9 | Anchore CVE | Medium | pdfbox-2.0.17 |
GHSA-q62h-jw38-24vh | Anchore CVE | Medium | zip4j-1.3.2 |
GHSA-9qcf-c26r-x5rf | Anchore CVE | Critical | quartz-2.1.0 |
CVE-2015-8795 | Anchore CVE | Medium | solr-core-4.9.1 |
CVE-2021-28165 | Anchore CVE | High | jetty-deploy-9.4.19.v20190610 |
CVE-2021-28165 | Anchore CVE | High | jetty-servlet-9.4.19.v20190610 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-jndi-9.4.19.v20190610 |
GHSA-86wm-rrjm-8wh8 | Anchore CVE | Medium | jetty-server-9.4.19.v20190610 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-jndi-9.4.19.v20190610 |
CVE-2021-28165 | Anchore CVE | High | jetty-xml-9.4.19.v20190610 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-http-9.4.19.v20190610 |
CVE-2016-6811 | Anchore CVE | High | hadoop-auth-2.6.0 |
CVE-2016-3086 | Anchore CVE | Critical | hadoop-hdfs-2.6.0 |
CVE-2017-3162 | Anchore CVE | High | hadoop-auth-2.6.0 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-http-9.4.19.v20190610 |
GHSA-m394-8rww-3jr7 | Anchore CVE | Medium | jetty-server-9.4.19.v20190610 |
GHSA-rvwf-54qp-4r6v | Anchore CVE | High | snakeyaml-1.15 |
CVE-2016-3086 | Anchore CVE | Critical | hadoop-auth-2.6.0 |
CVE-2018-8009 | Anchore CVE | High | hadoop-hdfs-2.6.0 |
CVE-2016-5001 | Anchore CVE | Medium | hadoop-auth-2.6.0 |
GHSA-fg3j-q579-v8x4 | Anchore CVE | Medium | pdfbox-2.0.17 |
CVE-2021-28165 | Anchore CVE | High | jetty-jndi-9.4.19.v20190610 |
GHSA-c43q-5hpj-4crv | Anchore CVE | Medium | jersey-common-2.31 |
CVE-2021-28165 | Anchore CVE | High | jetty-server-9.4.19.v20190610 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-webapp-9.4.19.v20190610 |
GHSA-gwrp-pvrq-jmwv | Anchore CVE | Medium | commons-io-1.3.2 |
GHSA-57j2-w4cx-62h2 | Anchore CVE | High | jackson-databind-2.10.1 |
CVE-2021-34428 | Anchore CVE | Low | jetty-jndi-9.4.19.v20190610 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-servlets-9.4.19.v20190610 |
CVE-2018-11768 | Anchore CVE | High | hadoop-auth-2.6.0 |
CVE-2018-11768 | Anchore CVE | High | hadoop-hdfs-2.6.0 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-http-9.4.19.v20190610 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-client-9.4.19.v20190610 |
CVE-2021-28165 | Anchore CVE | High | jetty-jmx-9.4.19.v20190610 |
CVE-2015-1832 | Anchore CVE | Critical | derbynet-10.8.2.2 |
CVE-2021-44548 | Anchore CVE | Critical | solr-core-4.9.1 |
GHSA-q77q-vx4q-xx6q | Anchore CVE | Medium | esapi-2.0.1 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-jmx-9.4.19.v20190610 |
CVE-2016-5001 | Anchore CVE | Medium | hadoop-hdfs-2.6.0 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-xml-9.4.19.v20190610 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-rewrite-9.4.19.v20190610 |
CVE-2019-0193 | Anchore CVE | High | solr-core-4.9.1 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-deploy-9.4.19.v20190610 |
GHSA-v7wg-cpwc-24m4 | Anchore CVE | High | postgresql-42.2.5 |
CVE-2020-27216 | Anchore CVE | High | jetty-annotations-9.4.19.v20190610 |
CVE-2020-27216 | Anchore CVE | High | jetty-deploy-9.4.19.v20190610 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-quickstart-9.4.19.v20190610 |
CVE-2018-11802 | Anchore CVE | Medium | solr-core-4.9.1 |
CVE-2021-34428 | Anchore CVE | Low | jetty-deploy-9.4.19.v20190610 |
CVE-2018-8029 | Anchore CVE | High | hadoop-hdfs-2.6.0 |
CVE-2020-13956 | Anchore CVE | Medium | commons-httpclient-3.1 |
CVE-2020-27216 | Anchore CVE | High | jetty-quickstart-9.4.19.v20190610 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-io-9.4.19.v20190610 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-xml-9.4.19.v20190610 |
CVE-2016-6811 | Anchore CVE | High | hadoop-hdfs-2.6.0 |
CVE-2017-15713 | Anchore CVE | Medium | hadoop-hdfs-2.6.0 |
CVE-2021-28165 | Anchore CVE | High | jetty-client-9.4.19.v20190610 |
CVE-2022-26612 | Anchore CVE | Critical | hadoop-hdfs-2.6.0 |
CVE-2017-3162 | Anchore CVE | High | hadoop-common-2.6.0 |
GHSA-wrvw-hg22-4m67 | Anchore CVE | High | protobuf-java-2.5.0 |
GHSA-3gp6-hhfw-4gqx | Anchore CVE | Medium | esapi-2.0.1 |
CVE-2021-34428 | Anchore CVE | Low | jetty-client-9.4.19.v20190610 |
CVE-2018-8029 | Anchore CVE | High | hadoop-common-2.6.0 |
CVE-2021-28165 | Anchore CVE | High | jetty-webapp-9.4.19.v20190610 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-xml-9.4.19.v20190610 |
CVE-2021-34428 | Anchore CVE | Low | jetty-annotations-9.4.19.v20190610 |
CVE-2018-8029 | Anchore CVE | High | hadoop-auth-2.6.0 |
CVE-2021-29943 | Anchore CVE | Critical | solr-core-4.9.1 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-client-9.4.19.v20190610 |
GHSA-7r82-7xv7-xcpj | Anchore CVE | Medium | httpclient-4.5.5 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-io-9.4.19.v20190610 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-jmx-9.4.19.v20190610 |
GHSA-mvr2-9pj6-7w5j | Anchore CVE | Medium | guava-20.0 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-annotations-9.4.19.v20190610 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-plus-9.4.19.v20190610 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-deploy-9.4.19.v20190610 |
CVE-2020-27216 | Anchore CVE | High | jetty-http-9.4.19.v20190610 |
GHSA-88cc-g835-76rp | Anchore CVE | High | postgresql-42.2.5 |
CVE-2021-34428 | Anchore CVE | Low | jetty-servlet-9.4.19.v20190610 |
GHSA-9vjp-v76f-g363 | Anchore CVE | High | netty-codec-4.1.48.Final |
CVE-2021-34428 | Anchore CVE | Low | jetty-xml-9.4.19.v20190610 |
CVE-2020-27216 | Anchore CVE | High | jetty-io-9.4.19.v20190610 |
CVE-2021-34428 | Anchore CVE | Low | jetty-servlets-9.4.19.v20190610 |
CVE-2020-27216 | Anchore CVE | High | jetty-jmx-9.4.19.v20190610 |
CVE-2018-1296 | Anchore CVE | High | hadoop-auth-2.6.0 |
CVE-2017-3163 | Anchore CVE | High | solr-core-4.9.1 |
CVE-2022-26612 | Anchore CVE | Critical | hadoop-auth-2.6.0 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-servlet-9.4.19.v20190610 |
CVE-2020-27216 | Anchore CVE | High | jetty-client-9.4.19.v20190610 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-servlets-9.4.19.v20190610 |
CVE-2017-3162 | Anchore CVE | High | hadoop-hdfs-2.6.0 |
CVE-2017-15713 | Anchore CVE | Medium | hadoop-common-2.6.0 |
GHSA-gwcr-j4wh-j3cq | Anchore CVE | Medium | jetty-servlets-9.4.19.v20190610 |
GHSA-288c-cq4h-88gq | Anchore CVE | High | jackson-databind-2.10.1 |
CVE-2018-8009 | Anchore CVE | High | hadoop-common-2.6.0 |
CVE-2018-11768 | Anchore CVE | High | hadoop-common-2.6.0 |
CVE-2015-1832 | Anchore CVE | Critical | derby-10.8.2.2 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-webapp-9.4.19.v20190610 |
GHSA-hrmr-f5m6-m9pq | Anchore CVE | Medium | commons-compress-1.12 |
CVE-2015-8796 | Anchore CVE | Medium | solr-core-4.9.1 |
CVE-2016-5393 | Anchore CVE | High | hadoop-auth-2.6.0 |
CVE-2017-3161 | Anchore CVE | Medium | hadoop-hdfs-2.6.0 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-jmx-9.4.19.v20190610 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-plus-9.4.19.v20190610 |
CVE-2021-28165 | Anchore CVE | High | jetty-quickstart-9.4.19.v20190610 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-plus-9.4.19.v20190610 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-client-9.4.19.v20190610 |
GHSA-g3wg-6mcf-8jj6 | Anchore CVE | High | jetty-webapp-9.4.19.v20190610 |
CVE-2020-27216 | Anchore CVE | High | jetty-plus-9.4.19.v20190610 |
CVE-2020-27216 | Anchore CVE | High | jetty-servlets-9.4.19.v20190610 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-servlet-9.4.19.v20190610 |
CVE-2016-3086 | Anchore CVE | Critical | hadoop-common-2.6.0 |
CVE-2021-27905 | Anchore CVE | Critical | solr-core-4.9.1 |
CVE-2021-34428 | Anchore CVE | Low | jetty-jmx-9.4.19.v20190610 |
CVE-2015-1776 | Anchore CVE | Medium | hadoop-hdfs-2.6.0 |
GHSA-7hfm-57qf-j43q | Anchore CVE | High | commons-compress-1.12 |
CVE-2021-28165 | Anchore CVE | High | jetty-annotations-9.4.19.v20190610 |
CVE-2021-28165 | Anchore CVE | High | jetty-plus-9.4.19.v20190610 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-deploy-9.4.19.v20190610 |
CVE-2018-1313 | Anchore CVE | Medium | derby-10.8.2.2 |
GHSA-26vr-8j45-3r4w | Anchore CVE | High | jetty-io-9.4.19.v20190610 |
GHSA-m6cp-vxjx-65j6 | Anchore CVE | Low | jetty-server-9.4.19.v20190610 |
CVE-2021-34428 | Anchore CVE | Low | jetty-webapp-9.4.19.v20190610 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-rewrite-9.4.19.v20190610 |
CVE-2021-34428 | Anchore CVE | Low | jetty-plus-9.4.19.v20190610 |
CVE-2015-8797 | Anchore CVE | Medium | solr-core-4.9.1 |
CVE-2021-34428 | Anchore CVE | Low | jetty-http-9.4.19.v20190610 |
GHSA-gx2c-fvhc-ph4j | Anchore CVE | Critical | hadoop-common-2.6.0 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-quickstart-9.4.19.v20190610 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-webapp-9.4.19.v20190610 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-20.0 |
GHSA-j8wc-gxx9-82hx | Anchore CVE | High | xmlsec-1.5.4 |
CVE-2019-12401 | Anchore CVE | High | solr-core-4.9.1 |
CVE-2020-27216 | Anchore CVE | High | jetty-rewrite-9.4.19.v20190610 |
CVE-2021-28165 | Anchore CVE | High | jetty-http-9.4.19.v20190610 |
CVE-2020-27216 | Anchore CVE | High | jetty-jndi-9.4.19.v20190610 |
CVE-2017-15713 | Anchore CVE | Medium | hadoop-auth-2.6.0 |
CVE-2021-28165 | Anchore CVE | High | jetty-servlets-9.4.19.v20190610 |
CVE-2021-34428 | Anchore CVE | Low | jetty-io-9.4.19.v20190610 |
CVE-2020-27216 | Anchore CVE | High | jetty-server-9.4.19.v20190610 |
CVE-2021-28165 | Anchore CVE | High | jetty-rewrite-9.4.19.v20190610 |
CVE-2012-5783 | Anchore CVE | Medium | commons-httpclient-3.1 |
CVE-2020-13941 | Anchore CVE | High | solr-core-4.9.1 |
CVE-2014-3628 | Anchore CVE | Medium | solr-core-4.9.1 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-io-9.4.19.v20190610 |
CVE-2018-1296 | Anchore CVE | High | hadoop-common-2.6.0 |
CVE-2017-3164 | Anchore CVE | High | solr-core-4.9.1 |
GHSA-f8vc-wfc8-hxqh | Anchore CVE | High | hadoop-common-2.6.0 |
CVE-2022-25647 | Anchore CVE | High | gson-1.7.2 |
GHSA-rmpj-7c96-mrg8 | Anchore CVE | Critical | hadoop-common-2.6.0 |
CVE-2021-33036 | Anchore CVE | High | hadoop-auth-2.6.0 |
CVE-2021-33036 | Anchore CVE | High | hadoop-common-2.6.0 |
CVE-2021-33036 | Anchore CVE | High | hadoop-hdfs-2.6.0 |
GHSA-2rpm-4x8c-pvqg | Anchore CVE | Medium | zip4j-1.3.2 |
GHSA-7q56-mp4c-gggg | Anchore CVE | High | hadoop-common-2.6.0 |
GHSA-mf7c-35mq-75pj | Anchore CVE | High | hadoop-common-2.6.0 |
GHSA-6r5v-hp32-fjqw | Anchore CVE | Medium | wss4j-1.6.10 |
GHSA-g48f-ff5h-5f64 | Anchore CVE | Medium | hadoop-common-2.6.0 |
GHSA-78fq-w796-q537 | Anchore CVE | Medium | opensaml-2.5.3 |
GHSA-8r28-r8cp-g6cp | Anchore CVE | Medium | hadoop-common-2.6.0 |
GHSA-cj7v-27pg-wf7q | Anchore CVE | Low | jetty-http-9.4.19.v20190610 |
GHSA-cmxj-wx9v-52qr | Anchore CVE | Medium | not-yet-commons-ssl-0.3.9 |
GHSA-4p4w-6h54-g885 | Anchore CVE | Medium | xmlsec-1.5.4 |
GHSA-v723-58jv-2qc4 | Anchore CVE | Medium | opensaml-2.5.3 |
GHSA-99v3-9x35-c5vf | Anchore CVE | Medium | wss4j-1.6.10 |
GHSA-2g56-7jv7-wxxq | Anchore CVE | Medium | esapi-2.0.1 |
GHSA-jcp9-796g-pv9p | Anchore CVE | Low | esapi-2.0.1 |
GHSA-rm7v-gqfg-p2wc | Anchore CVE | Medium | opensaml-2.5.3 |
CVE-2022-2048 | Anchore CVE | High | jetty-server-9.4.19.v20190610 |
CVE-2022-2047 | Anchore CVE | Low | jetty-jndi-9.4.19.v20190610 |
CVE-2022-2048 | Anchore CVE | High | jetty-annotations-9.4.19.v20190610 |
CVE-2022-2048 | Anchore CVE | High | jetty-deploy-9.4.19.v20190610 |
CVE-2022-2048 | Anchore CVE | High | jetty-xml-9.4.19.v20190610 |
CVE-2022-2047 | Anchore CVE | Low | jetty-deploy-9.4.19.v20190610 |
CVE-2022-2047 | Anchore CVE | Low | jetty-annotations-9.4.19.v20190610 |
CVE-2022-2047 | Anchore CVE | Low | jetty-jmx-9.4.19.v20190610 |
CVE-2022-2047 | Anchore CVE | Low | jetty-servlets-9.4.19.v20190610 |
CVE-2022-2048 | Anchore CVE | High | jetty-jndi-9.4.19.v20190610 |
GHSA-c28r-hw5m-5gv3 | Anchore CVE | High | aws-java-sdk-s3-1.11.38 |
CVE-2022-2047 | Anchore CVE | Low | jetty-rewrite-9.4.19.v20190610 |
CVE-2022-2047 | Anchore CVE | Low | jetty-xml-9.4.19.v20190610 |
CVE-2022-2047 | Anchore CVE | Low | jetty-webapp-9.4.19.v20190610 |
CVE-2022-2048 | Anchore CVE | High | jetty-jmx-9.4.19.v20190610 |
CVE-2022-2047 | Anchore CVE | Low | jetty-io-9.4.19.v20190610 |
CVE-2022-2048 | Anchore CVE | High | jetty-servlets-9.4.19.v20190610 |
CVE-2022-2047 | Anchore CVE | Low | jetty-plus-9.4.19.v20190610 |
CVE-2022-2048 | Anchore CVE | High | jetty-plus-9.4.19.v20190610 |
CVE-2022-2048 | Anchore CVE | High | jetty-quickstart-9.4.19.v20190610 |
CVE-2022-2047 | Anchore CVE | Low | jetty-quickstart-9.4.19.v20190610 |
CVE-2022-2047 | Anchore CVE | Low | jetty-server-9.4.19.v20190610 |
CVE-2022-2048 | Anchore CVE | High | jetty-client-9.4.19.v20190610 |
CVE-2022-2048 | Anchore CVE | High | jetty-http-9.4.19.v20190610 |
CVE-2022-2048 | Anchore CVE | High | jetty-servlet-9.4.19.v20190610 |
CVE-2022-2048 | Anchore CVE | High | jetty-webapp-9.4.19.v20190610 |
CVE-2022-2047 | Anchore CVE | Low | jetty-servlet-9.4.19.v20190610 |
CVE-2022-2048 | Anchore CVE | High | jetty-io-9.4.19.v20190610 |
CVE-2022-2048 | Anchore CVE | High | jetty-rewrite-9.4.19.v20190610 |
CVE-2022-2047 | Anchore CVE | Low | jetty-client-9.4.19.v20190610 |
CVE-2022-22968 | Anchore CVE | Medium | spring-core-5.0.17.release |
CVE-2022-22950 | Anchore CVE | Medium | spring-core-5.0.17.release |
CVE-2020-5421 | Anchore CVE | Medium | spring-core-5.0.17.release |
CVE-2022-22970 | Anchore CVE | Medium | spring-core-5.0.17.release |
CVE-2016-1000027 | Anchore CVE | Critical | spring-core-5.0.17.release |
CVE-2022-22965 | Anchore CVE | Critical | spring-core-5.0.17.release |
GHSA-r38f-c4h4-hqq2 | Anchore CVE | High | postgresql-42.2.5 |
CVE-2022-25168 | Anchore CVE | Critical | hadoop-hdfs-2.6.0 |
GHSA-8wm5-8h9c-47pc | Anchore CVE | Critical | hadoop-common-2.6.0 |
CVE-2022-25168 | Anchore CVE | Critical | hadoop-auth-2.6.0 |
GHSA-vjwc-5hfh-2vv5 | Anchore CVE | High | wss4j-1.6.10 |
GHSA-r237-w2w6-jq3p | Anchore CVE | Medium | xmlsec-1.5.4 |
GHSA-727h-hrw8-jg8q | Anchore CVE | Low | postgresql-42.2.5 |
GHSA-3mc7-4q67-w48m | Anchore CVE | High | snakeyaml-1.15 |
GHSA-9w3m-gqgf-c4p9 | Anchore CVE | Medium | snakeyaml-1.15 |
GHSA-c4r9-r8fh-9vj2 | Anchore CVE | Medium | snakeyaml-1.15 |
GHSA-98wm-3w3q-mw94 | Anchore CVE | Medium | snakeyaml-1.15 |
GHSA-hhhw-99gj-p3c3 | Anchore CVE | Medium | snakeyaml-1.15 |
GHSA-h4h5-3hr4-j3g2 | Anchore CVE | Medium | protobuf-java-2.5.0 |
GHSA-rgv9-q543-rqg4 | Anchore CVE | High | jackson-databind-2.10.1 |
GHSA-jjjh-jjxp-wpff | Anchore CVE | High | jackson-databind-2.10.1 |
GHSA-599f-7c49-w659 | Anchore CVE | Critical | commons-text-1.8 |
VAT: https://vat.dso.mil/vat/image?imageName=radiantone/fid&tag=7.4.1&branch=master
More information can be found in the failed pipeline located here: https://repo1.dso.mil/dsop/radiantone/fid/fid-7.4/-/jobs/11714320
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the ~"Approval" label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications -
Send approval request to Authorizing Official -
Close issue after approval from Authorizing Official
Note: If the above approval process is rejected for any reason, the
Approval
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theApproval
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.