## Overview │ Analyzed Image ────────────────────┼───────────────────────────────────────────────────────────────── Target │ docker.arty-1.base.safe.com/fmeflow/fmeflow-core:devops-4448 digest │ 437d9e698a32 platform │ linux/amd64 vulnerabilities │ 5C 58H 46M 22L 2? size │ 310 MB packages │ 438 ## Packages and Vulnerabilities 3C 39H 14M 1L stdlib 1.16.4 pkg:golang/stdlib@1.16.4 x CRITICAL CVE-2023-24540 https://scout.docker.com/v/CVE-2023-24540 Affected range : <1.19.9 Fixed version : 1.19.9 x CRITICAL CVE-2023-24538 https://scout.docker.com/v/CVE-2023-24538 Affected range : <1.19.8 Fixed version : 1.19.8 x CRITICAL CVE-2022-23806 https://scout.docker.com/v/CVE-2022-23806 Affected range : <1.16.14 Fixed version : 1.16.14 x HIGH CVE-2023-29403 https://scout.docker.com/v/CVE-2023-29403 Affected range : <1.19.10 Fixed version : 1.19.10 x HIGH CVE-2022-30580 https://scout.docker.com/v/CVE-2022-30580 Affected range : <1.17.11 Fixed version : 1.17.11 x HIGH CVE-2023-44487 https://scout.docker.com/v/CVE-2023-44487 Affected range : <1.20.10 Fixed version : 1.20.10 x HIGH CVE-2023-39325 https://scout.docker.com/v/CVE-2023-39325 Affected range : <1.20.10 Fixed version : 1.20.10 x HIGH CVE-2023-24537 https://scout.docker.com/v/CVE-2023-24537 Affected range : <1.19.8 Fixed version : 1.19.8 x HIGH CVE-2023-24536 https://scout.docker.com/v/CVE-2023-24536 Affected range : <1.19.8 Fixed version : 1.19.8 x HIGH CVE-2023-24534 https://scout.docker.com/v/CVE-2023-24534 Affected range : <1.19.8 Fixed version : 1.19.8 x HIGH CVE-2022-41725 https://scout.docker.com/v/CVE-2022-41725 Affected range : <1.19.6 Fixed version : 1.19.6 x HIGH CVE-2022-41724 https://scout.docker.com/v/CVE-2022-41724 Affected range : <1.19.6 Fixed version : 1.19.6 x HIGH CVE-2022-41723 https://scout.docker.com/v/CVE-2022-41723 Affected range : <1.19.6 Fixed version : 1.19.6 x HIGH CVE-2022-41722 https://scout.docker.com/v/CVE-2022-41722 Affected range : <1.19.6 Fixed version : 1.19.6 x HIGH CVE-2022-41720 https://scout.docker.com/v/CVE-2022-41720 Affected range : <1.18.9 Fixed version : 1.18.9 x HIGH CVE-2022-41716 https://scout.docker.com/v/CVE-2022-41716 Affected range : <1.18.8 Fixed version : 1.18.8 x HIGH CVE-2022-41715 https://scout.docker.com/v/CVE-2022-41715 Affected range : <1.18.7 Fixed version : 1.18.7 x HIGH CVE-2022-32189 https://scout.docker.com/v/CVE-2022-32189 Affected range : <1.17.13 Fixed version : 1.17.13 x HIGH CVE-2022-30635 https://scout.docker.com/v/CVE-2022-30635 Affected range : <1.17.12 Fixed version : 1.17.12 x HIGH CVE-2022-30634 https://scout.docker.com/v/CVE-2022-30634 Affected range : <1.17.11 Fixed version : 1.17.11 x HIGH CVE-2022-30633 https://scout.docker.com/v/CVE-2022-30633 Affected range : <1.17.12 Fixed version : 1.17.12 x HIGH CVE-2022-30632 https://scout.docker.com/v/CVE-2022-30632 Affected range : <1.17.12 Fixed version : 1.17.12 x HIGH CVE-2022-30631 https://scout.docker.com/v/CVE-2022-30631 Affected range : <1.17.12 Fixed version : 1.17.12 x HIGH CVE-2022-30630 https://scout.docker.com/v/CVE-2022-30630 Affected range : <1.17.12 Fixed version : 1.17.12 x HIGH CVE-2022-29804 https://scout.docker.com/v/CVE-2022-29804 Affected range : <1.17.11 Fixed version : 1.17.11 x HIGH CVE-2022-2880 https://scout.docker.com/v/CVE-2022-2880 Affected range : <1.18.7 Fixed version : 1.18.7 x HIGH CVE-2022-2879 https://scout.docker.com/v/CVE-2022-2879 Affected range : <1.18.7 Fixed version : 1.18.7 x HIGH CVE-2022-28327 https://scout.docker.com/v/CVE-2022-28327 Affected range : <1.17.9 Fixed version : 1.17.9 x HIGH CVE-2022-28131 https://scout.docker.com/v/CVE-2022-28131 Affected range : <1.17.12 Fixed version : 1.17.12 x HIGH CVE-2022-27664 https://scout.docker.com/v/CVE-2022-27664 Affected range : <1.18.6 Fixed version : 1.18.6 x HIGH CVE-2022-24921 https://scout.docker.com/v/CVE-2022-24921 Affected range : <1.16.15 Fixed version : 1.16.15 x HIGH CVE-2022-24675 https://scout.docker.com/v/CVE-2022-24675 Affected range : <1.17.9 Fixed version : 1.17.9 x HIGH CVE-2022-23772 https://scout.docker.com/v/CVE-2022-23772 Affected range : <1.16.14 Fixed version : 1.16.14 x HIGH CVE-2021-44716 https://scout.docker.com/v/CVE-2021-44716 Affected range : <1.16.12 Fixed version : 1.16.12 x HIGH CVE-2021-41772 https://scout.docker.com/v/CVE-2021-41772 Affected range : <1.16.10 Fixed version : 1.16.10 x HIGH CVE-2021-41771 https://scout.docker.com/v/CVE-2021-41771 Affected range : <1.16.10 Fixed version : 1.16.10 x HIGH CVE-2021-39293 https://scout.docker.com/v/CVE-2021-39293 Affected range : <1.16.8 Fixed version : 1.16.8 x HIGH CVE-2021-33198 https://scout.docker.com/v/CVE-2021-33198 Affected range : >=1.16.0-0 : <1.16.5 Fixed version : 1.16.5 x HIGH CVE-2021-33196 https://scout.docker.com/v/CVE-2021-33196 Affected range : >=1.16.0-0 : <1.16.5 Fixed version : 1.16.5 x HIGH CVE-2023-29400 https://scout.docker.com/v/CVE-2023-29400 Affected range : <1.19.9 Fixed version : 1.19.9 x HIGH CVE-2023-24539 https://scout.docker.com/v/CVE-2023-24539 Affected range : <1.19.9 Fixed version : 1.19.9 x HIGH CVE-2021-33195 https://scout.docker.com/v/CVE-2021-33195 Affected range : >=1.16.0-0 : <1.16.5 Fixed version : 1.16.5 x MEDIUM CVE-2023-29406 https://scout.docker.com/v/CVE-2023-29406 Affected range : <1.19.11 Fixed version : 1.19.11 x MEDIUM CVE-2022-32148 https://scout.docker.com/v/CVE-2022-32148 Affected range : <1.17.12 Fixed version : 1.17.12 x MEDIUM CVE-2022-1705 https://scout.docker.com/v/CVE-2022-1705 Affected range : <1.17.12 Fixed version : 1.17.12 x MEDIUM CVE-2021-34558 https://scout.docker.com/v/CVE-2021-34558 Affected range : >=1.16.0-0 : <1.16.6 Fixed version : 1.16.6 x MEDIUM CVE-2023-39319 https://scout.docker.com/v/CVE-2023-39319 Affected range : <1.20.8 Fixed version : 1.20.8 x MEDIUM CVE-2023-39318 https://scout.docker.com/v/CVE-2023-39318 Affected range : <1.20.8 Fixed version : 1.20.8 x MEDIUM CVE-2021-36221 https://scout.docker.com/v/CVE-2021-36221 Affected range : >=1.16.0-0 : <1.16.7 Fixed version : 1.16.7 x MEDIUM CVE-2022-1962 https://scout.docker.com/v/CVE-2022-1962 Affected range : <1.17.12 Fixed version : 1.17.12 x MEDIUM CVE-2023-29409 https://scout.docker.com/v/CVE-2023-29409 Affected range : <1.19.12 Fixed version : 1.19.12 x MEDIUM CVE-2023-24532 https://scout.docker.com/v/CVE-2023-24532 Affected range : <1.19.7 Fixed version : 1.19.7 x MEDIUM CVE-2022-41717 https://scout.docker.com/v/CVE-2022-41717 Affected range : <1.18.9 Fixed version : 1.18.9 x MEDIUM CVE-2022-29526 https://scout.docker.com/v/CVE-2022-29526 Affected range : <1.17.10 Fixed version : 1.17.10 x MEDIUM CVE-2021-33197 https://scout.docker.com/v/CVE-2021-33197 Affected range : >=1.16.0-0 : <1.16.5 Fixed version : 1.16.5 x MEDIUM CVE-2021-44717 https://scout.docker.com/v/CVE-2021-44717 Affected range : <1.16.12 Fixed version : 1.16.12 x LOW CVE-2022-30629 https://scout.docker.com/v/CVE-2022-30629 Affected range : <1.17.11 Fixed version : 1.17.11 1C 2H 5M 0L io.netty/netty 3.10.6.Final pkg:maven/io.netty/netty@3.10.6.Final x CRITICAL CVE-2019-20444 [Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')] https://scout.docker.com/v/CVE-2019-20444 Affected range : <4.0.0 Fixed version : not fixed CVSS Score : 9.1 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N x HIGH CVE-2021-37137 [Uncontrolled Resource Consumption] https://scout.docker.com/v/CVE-2021-37137 Affected range : <4.0.0 Fixed version : not fixed CVSS Score : 7.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H x HIGH CVE-2021-37136 [Uncontrolled Resource Consumption] https://scout.docker.com/v/CVE-2021-37136 Affected range : <4.0.0 Fixed version : not fixed CVSS Score : 7.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H x MEDIUM CVE-2021-43797 [Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')] https://scout.docker.com/v/CVE-2021-43797 Affected range : <4.0.0 Fixed version : not fixed CVSS Score : 6.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N x MEDIUM CVE-2021-21290 [Creation of Temporary File With Insecure Permissions] https://scout.docker.com/v/CVE-2021-21290 Affected range : <4.0.0 Fixed version : not fixed CVSS Score : 6.2 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N x MEDIUM CVE-2021-21409 [Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')] https://scout.docker.com/v/CVE-2021-21409 Affected range : <4.0.0 Fixed version : not fixed CVSS Score : 5.9 CVSS Vector : CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N x MEDIUM CVE-2021-21295 [Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')] https://scout.docker.com/v/CVE-2021-21295 Affected range : <4.0.0 Fixed version : not fixed CVSS Score : 5.9 CVSS Vector : CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N x MEDIUM CVE-2019-20445 [Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')] https://scout.docker.com/v/CVE-2019-20445 Affected range : <4.0.0 Fixed version : not fixed 1C 0H 0M 0L org.apache.activemq/activemq-client 5.16.3 pkg:maven/org.apache.activemq/activemq-client@5.16.3 x CRITICAL CVE-2023-46604 [Deserialization of Untrusted Data] https://scout.docker.com/v/CVE-2023-46604 Affected range : >=5.16.0 : <5.16.7 Fixed version : 5.16.7 CVSS Score : 10.0 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H 0C 4H 0M 0L 2? org.json/json 20140107 pkg:maven/org.json/json@20140107 x HIGH CVE-2023-5072 [Allocation of Resources Without Limits or Throttling] https://scout.docker.com/v/CVE-2023-5072 Affected range : <=20230618 Fixed version : 20231013 CVSS Score : 7.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H x HIGH CVE-2022-45690 [OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities] https://scout.docker.com/v/CVE-2022-45690 Affected range : <20220320 Fixed version : 20220320 CVSS Score : 7.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H x HIGH CVE-2022-45689 [OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities] https://scout.docker.com/v/CVE-2022-45689 Affected range : <20220320 Fixed version : 20220320 CVSS Score : 7.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H x HIGH CVE-2022-45688 [Out-of-bounds Write] https://scout.docker.com/v/CVE-2022-45688 Affected range : <20230227 Fixed version : 20230227 CVSS Score : 7.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H x UNSPECIFIED GMS-2023-1112 [OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities] https://scout.docker.com/v/GMS-2023-1112 Affected range : <20200518 Fixed version : 20200518 x UNSPECIFIED GMS-2023-1111 [OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities] https://scout.docker.com/v/GMS-2023-1111 Affected range : <20180130 Fixed version : 20180130 0C 3H 1M 0L golang.org/x/net 0.0.0-20210119194325-5f4716e94777 pkg:golang/golang.org/x/net@0.0.0-20210119194325-5f4716e94777 x HIGH CVE-2022-27664 https://scout.docker.com/v/CVE-2022-27664 Affected range : <0.0.0-20220906165146-f3363e06e74c Fixed version : 0.0.0-20220906165146-f3363e06e74c CVSS Score : 7.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H x HIGH CVE-2021-44716 https://scout.docker.com/v/CVE-2021-44716 Affected range : <0.0.0-20211209124913-491a49abca63 Fixed version : 0.0.0-20211209124913-491a49abca63 x HIGH CVE-2021-33194 [Loop with Unreachable Exit Condition ('Infinite Loop')] https://scout.docker.com/v/CVE-2021-33194 Affected range : <0.0.0-20210520170846-37e1c6afe023 Fixed version : 0.0.0-20210520170846-37e1c6afe023 CVSS Score : 7.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H x MEDIUM CVE-2021-31525 [Uncontrolled Recursion] https://scout.docker.com/v/CVE-2021-31525 Affected range : <0.0.0-20210428140749-89ef3d95e781 Fixed version : 0.0.0-20210428140749-89ef3d95e781 CVSS Score : 5.9 CVSS Vector : CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H 0C 2H 0M 0L golang.org/x/text 0.3.5 pkg:golang/golang.org/x/text@0.3.5 x HIGH CVE-2022-32149 [Missing Release of Resource after Effective Lifetime] https://scout.docker.com/v/CVE-2022-32149 Affected range : <0.3.8 Fixed version : 0.3.8 CVSS Score : 7.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H x HIGH CVE-2021-38561 [Out-of-bounds Read] https://scout.docker.com/v/CVE-2021-38561 Affected range : <0.3.7 Fixed version : 0.3.7 CVSS Score : 7.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 0C 2H 0M 0L golang.org/x/crypto 0.0.0-20201221181555-eec23a3978ad pkg:golang/golang.org/x/crypto@0.0.0-20201221181555-eec23a3978ad x HIGH CVE-2022-27191 [Use of a Broken or Risky Cryptographic Algorithm] https://scout.docker.com/v/CVE-2022-27191 Affected range : <0.0.0-20220314234659-1baeb1ce4c0b Fixed version : 0.0.0-20220314234659-1baeb1ce4c0b CVSS Score : 7.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H x HIGH CVE-2021-43565 https://scout.docker.com/v/CVE-2021-43565 Affected range : <0.0.0-20211202192323-5770296d904e Fixed version : 0.0.0-20211202192323-5770296d904e CVSS Score : 7.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 0C 2H 0M 0L io.netty/netty-codec 4.1.65.Final pkg:maven/io.netty/netty-codec@4.1.65.Final x HIGH CVE-2021-37137 [Uncontrolled Resource Consumption] https://scout.docker.com/v/CVE-2021-37137 Affected range : >=4.0.0 : <4.1.68.Final Fixed version : 4.1.68.Final CVSS Score : 7.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H x HIGH CVE-2021-37136 [Uncontrolled Resource Consumption] https://scout.docker.com/v/CVE-2021-37136 Affected range : <4.1.68.Final Fixed version : 4.1.68.Final CVSS Score : 7.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 0C 1H 1M 0L io.netty/netty-handler 4.1.65.Final pkg:maven/io.netty/netty-handler@4.1.65.Final x HIGH CVE-2023-4586 [OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities] https://scout.docker.com/v/CVE-2023-4586 Affected range : >=4.1.0 : <5.0.0 Fixed version : not fixed CVSS Score : 7.4 CVSS Vector : CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N x MEDIUM CVE-2023-34462 [Uncontrolled Resource Consumption] https://scout.docker.com/v/CVE-2023-34462 Affected range : <4.1.94.Final Fixed version : 4.1.94.Final CVSS Score : 6.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H 0C 1H 1M 0L google.golang.org/grpc 1.26.0 pkg:golang/google.golang.org/grpc@1.26.0 x HIGH GHSA-m425-mq94-257g https://scout.docker.com/v/GHSA-m425-mq94-257g Affected range : <1.56.3 Fixed version : 1.56.3 CVSS Score : 7.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H x MEDIUM CVE-2023-44487 [Uncontrolled Resource Consumption] https://scout.docker.com/v/CVE-2023-44487 Affected range : <1.56.3 Fixed version : 1.56.3 CVSS Score : 5.3 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L 0C 1H 0M 0L net.minidev/json-smart 2.4.7 pkg:maven/net.minidev/json-smart@2.4.7 x HIGH CVE-2023-1370 [Uncontrolled Recursion] https://scout.docker.com/v/CVE-2023-1370 Affected range : <2.4.9 Fixed version : 2.4.9 CVSS Score : 7.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 0C 1H 0M 0L org.eclipse.jgit/org.eclipse.jgit 4.4.1.201607150455-r pkg:maven/org.eclipse.jgit/org.eclipse.jgit@4.4.1.201607150455-r x HIGH CVE-2023-4759 [Improper Handling of Case Sensitivity] https://scout.docker.com/v/CVE-2023-4759 Affected range : <=6.6.0.202305301015-r Fixed version : 6.6.1.202309021850-r CVSS Score : 8.8 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 0C 0H 11M 6L binutils 2.38-4ubuntu2.3 pkg:deb/ubuntu/binutils@2.38-4ubuntu2.3?os_distro=jammy&os_name=ubuntu&os_version=22.04 x MEDIUM CVE-2022-47695 https://scout.docker.com/v/CVE-2022-47695 Affected range : >=0 Fixed version : not fixed CVSS Score : 7.8 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H x MEDIUM CVE-2022-45703 https://scout.docker.com/v/CVE-2022-45703 Affected range : >=0 Fixed version : not fixed CVSS Score : 7.8 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H x MEDIUM CVE-2022-44840 https://scout.docker.com/v/CVE-2022-44840 Affected range : >=0 Fixed version : not fixed CVSS Score : 7.8 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H x MEDIUM CVE-2022-48065 https://scout.docker.com/v/CVE-2022-48065 Affected range : >=0 Fixed version : not fixed CVSS Score : 5.5 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H x MEDIUM CVE-2022-48063 https://scout.docker.com/v/CVE-2022-48063 Affected range : >=0 Fixed version : not fixed CVSS Score : 5.5 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H x MEDIUM CVE-2022-47011 https://scout.docker.com/v/CVE-2022-47011 Affected range : >=0 Fixed version : not fixed CVSS Score : 5.5 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H x MEDIUM CVE-2022-47010 https://scout.docker.com/v/CVE-2022-47010 Affected range : >=0 Fixed version : not fixed CVSS Score : 5.5 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H x MEDIUM CVE-2022-47008 https://scout.docker.com/v/CVE-2022-47008 Affected range : >=0 Fixed version : not fixed CVSS Score : 5.5 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H x MEDIUM CVE-2022-47007 https://scout.docker.com/v/CVE-2022-47007 Affected range : >=0 Fixed version : not fixed CVSS Score : 5.5 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H x MEDIUM CVE-2022-35206 https://scout.docker.com/v/CVE-2022-35206 Affected range : >=0 Fixed version : not fixed CVSS Score : 5.5 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H x MEDIUM CVE-2022-35205 https://scout.docker.com/v/CVE-2022-35205 Affected range : >=0 Fixed version : not fixed CVSS Score : 5.5 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H x LOW CVE-2018-20657 https://scout.docker.com/v/CVE-2018-20657 Affected range : >=0 Fixed version : not fixed CVSS Score : 7.5 CVSS Vector : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H x LOW CVE-2022-48064 https://scout.docker.com/v/CVE-2022-48064 Affected range : >=0 Fixed version : not fixed CVSS Score : 5.5 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H x LOW CVE-2022-4285 https://scout.docker.com/v/CVE-2022-4285 Affected range : >=0 Fixed version : not fixed CVSS Score : 5.5 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H x LOW CVE-2022-27943 https://scout.docker.com/v/CVE-2022-27943 Affected range : >=0 Fixed version : not fixed CVSS Score : 5.5 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H x LOW CVE-2019-1010204 https://scout.docker.com/v/CVE-2019-1010204 Affected range : >=0 Fixed version : not fixed CVSS Score : 5.5 CVSS Vector : CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H x LOW CVE-2017-13716 https://scout.docker.com/v/CVE-2017-13716 Affected range : >=0 Fixed version : not fixed CVSS Score : 5.5 CVSS Vector : CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H 0C 0H 2M 0L io.netty/netty-codec-http 4.1.65.Final pkg:maven/io.netty/netty-codec-http@4.1.65.Final x MEDIUM CVE-2021-43797 [Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')] https://scout.docker.com/v/CVE-2021-43797 Affected range : >=4.0.0 : <4.1.71.Final Fixed version : 4.1.71.Final CVSS Score : 6.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N x MEDIUM CVE-2022-24823 [Creation of Temporary File With Insecure Permissions] https://scout.docker.com/v/CVE-2022-24823 Affected range : <=4.1.76.Final Fixed version : 4.1.77.Final CVSS Score : 5.5 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N 0C 0H 1M 3L glibc 2.35-0ubuntu3.4 pkg:deb/ubuntu/glibc@2.35-0ubuntu3.4?os_distro=jammy&os_name=ubuntu&os_version=22.04 x MEDIUM CVE-2023-5156 https://scout.docker.com/v/CVE-2023-5156 Affected range : >=0 Fixed version : not fixed CVSS Score : 7.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H x LOW CVE-2016-20013 https://scout.docker.com/v/CVE-2016-20013 Affected range : >=0 Fixed version : not fixed CVSS Score : 7.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H x LOW CVE-2023-4813 https://scout.docker.com/v/CVE-2023-4813 Affected range : >=0 Fixed version : not fixed CVSS Score : 5.9 CVSS Vector : CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H x LOW CVE-2023-4806 https://scout.docker.com/v/CVE-2023-4806 Affected range : >=0 Fixed version : not fixed CVSS Score : 5.9 CVSS Vector : CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H 0C 0H 1M 1L github.com/aws/aws-sdk-go 1.37.12 pkg:golang/github.com/aws/aws-sdk-go@1.37.12 x MEDIUM CVE-2020-8911 https://scout.docker.com/v/CVE-2020-8911 Affected range : >=0 Fixed version : not fixed x LOW CVE-2020-8912 https://scout.docker.com/v/CVE-2020-8912 Affected range : >=0 Fixed version : not fixed 0C 0H 1M 0L wget 1.21.2-2ubuntu1 pkg:deb/ubuntu/wget@1.21.2-2ubuntu1?os_distro=jammy&os_name=ubuntu&os_version=22.04 x MEDIUM CVE-2021-31879 https://scout.docker.com/v/CVE-2021-31879 Affected range : >=0 Fixed version : not fixed CVSS Score : 6.1 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N 0C 0H 1M 0L com.jcraft/jsch 0.1.51 pkg:maven/com.jcraft/jsch@0.1.51 x MEDIUM CVE-2016-5725 [Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')] https://scout.docker.com/v/CVE-2016-5725 Affected range : <=0.1.53 Fixed version : 0.1.54 CVSS Score : 5.9 CVSS Vector : CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N 0C 0H 1M 0L io.netty/netty-codec-http2 4.1.65.Final pkg:maven/io.netty/netty-codec-http2@4.1.65.Final x MEDIUM GHSA-xpw8-rcwv-8f8p https://scout.docker.com/v/GHSA-xpw8-rcwv-8f8p Affected range : <4.1.100.Final Fixed version : 4.1.100.Final CVSS Score : 5.3 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L 0C 0H 1M 0L com.squareup.okio/okio 1.15.0 pkg:maven/com.squareup.okio/okio@1.15.0 x MEDIUM CVE-2023-3635 [Signed to Unsigned Conversion Error] https://scout.docker.com/v/CVE-2023-3635 Affected range : <3.4.0 Fixed version : 3.4.0 CVSS Score : 5.9 CVSS Vector : CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H 0C 0H 1M 0L io.netty/netty-common 4.1.65.Final pkg:maven/io.netty/netty-common@4.1.65.Final x MEDIUM CVE-2022-24823 [OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities] https://scout.docker.com/v/CVE-2022-24823 Affected range : <4.1.77.Final Fixed version : 4.1.77.Final CVSS Score : 5.5 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N 0C 0H 1M 0L krb5 1.19.2-2ubuntu0.2 pkg:deb/ubuntu/krb5@1.19.2-2ubuntu0.2?os_distro=jammy&os_name=ubuntu&os_version=22.04 x MEDIUM CVE-2023-36054 https://scout.docker.com/v/CVE-2023-36054 Affected range : <1.19.2-2ubuntu0.3 Fixed version : 1.19.2-2ubuntu0.3 CVSS Score : 6.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H 0C 0H 1M 0L go.etcd.io/etcd 3.3.25+incompatible pkg:golang/go.etcd.io/etcd@3.3.25+incompatible x MEDIUM CVE-2018-1099 [Improper Input Validation] https://scout.docker.com/v/CVE-2018-1099 Affected range : <3.4.0 Fixed version : 3.4.0 CVSS Score : 5.5 CVSS Vector : CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N 0C 0H 1M 0L org.bouncycastle/bcprov-jdk15on 1.70 pkg:maven/org.bouncycastle/bcprov-jdk15on@1.70 x MEDIUM CVE-2023-33201 [Improper Certificate Validation] https://scout.docker.com/v/CVE-2023-33201 Affected range : >=1.49 : <=1.70 Fixed version : not fixed CVSS Score : 5.3 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N 0C 0H 1M 0L golang.org/x/sys 0.0.0-20210216224549-f992740a1bac pkg:golang/golang.org/x/sys@0.0.0-20210216224549-f992740a1bac x MEDIUM CVE-2022-29526 [Improper Privilege Management] https://scout.docker.com/v/CVE-2022-29526 Affected range : <0.0.0-20220412211240-33da011f77ad Fixed version : 0.0.0-20220412211240-33da011f77ad CVSS Score : 5.3 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N 0C 0H 0M 1L libzstd 1.4.8+dfsg-3build1 pkg:deb/ubuntu/libzstd@1.4.8+dfsg-3build1?os_distro=jammy&os_name=ubuntu&os_version=22.04 x LOW CVE-2022-4899 https://scout.docker.com/v/CVE-2022-4899 Affected range : >=0 Fixed version : not fixed CVSS Score : 7.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 0C 0H 0M 1L perl 5.34.0-3ubuntu1.2 pkg:deb/ubuntu/perl@5.34.0-3ubuntu1.2?os_distro=jammy&os_name=ubuntu&os_version=22.04 x LOW CVE-2022-48522 https://scout.docker.com/v/CVE-2022-48522 Affected range : >=0 Fixed version : not fixed CVSS Score : 9.8 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 0C 0H 0M 1L shadow 1:4.8.1-2ubuntu2.1 pkg:deb/ubuntu/shadow@1:4.8.1-2ubuntu2.1?os_distro=jammy&os_name=ubuntu&os_version=22.04 x LOW CVE-2023-29383 https://scout.docker.com/v/CVE-2023-29383 Affected range : >=0 Fixed version : not fixed CVSS Score : 3.3 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N 0C 0H 0M 1L gcc-12 12.3.0-1ubuntu1~22.04 pkg:deb/ubuntu/gcc-12@12.3.0-1ubuntu1~22.04?os_distro=jammy&os_name=ubuntu&os_version=22.04 x LOW CVE-2022-27943 https://scout.docker.com/v/CVE-2022-27943 Affected range : >=0 Fixed version : not fixed CVSS Score : 5.5 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H 0C 0H 0M 1L bash 5.1-6ubuntu1 pkg:deb/ubuntu/bash@5.1-6ubuntu1?os_distro=jammy&os_name=ubuntu&os_version=22.04 x LOW CVE-2022-3715 https://scout.docker.com/v/CVE-2022-3715 Affected range : >=0 Fixed version : not fixed CVSS Score : 7.8 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 0C 0H 0M 1L libpng1.6 1.6.37-3build5 pkg:deb/ubuntu/libpng1.6@1.6.37-3build5?os_distro=jammy&os_name=ubuntu&os_version=22.04 x LOW CVE-2022-3857 https://scout.docker.com/v/CVE-2022-3857 Affected range : >=0 Fixed version : not fixed CVSS Score : 5.5 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H 0C 0H 0M 1L gnupg2 2.2.27-3ubuntu2.1 pkg:deb/ubuntu/gnupg2@2.2.27-3ubuntu2.1?os_distro=jammy&os_name=ubuntu&os_version=22.04 x LOW CVE-2022-3219 https://scout.docker.com/v/CVE-2022-3219 Affected range : >=0 Fixed version : not fixed CVSS Score : 3.3 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L 0C 0H 0M 1L openldap 2.5.16+dfsg-0ubuntu0.22.04.1 pkg:deb/ubuntu/openldap@2.5.16+dfsg-0ubuntu0.22.04.1?os_distro=jammy&os_name=ubuntu&os_version=22.04 x LOW CVE-2023-2953 https://scout.docker.com/v/CVE-2023-2953 Affected range : >=0 Fixed version : not fixed CVSS Score : 7.5 CVSS Vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 0C 0H 0M 1L coreutils 8.32-4.1ubuntu1 pkg:deb/ubuntu/coreutils@8.32-4.1ubuntu1?os_distro=jammy&os_name=ubuntu&os_version=22.04 x LOW CVE-2016-2781 https://scout.docker.com/v/CVE-2016-2781 Affected range : >=0 Fixed version : not fixed CVSS Score : 6.5 CVSS Vector : CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N 0C 0H 0M 1L pcre3 2:8.39-13ubuntu0.22.04.1 pkg:deb/ubuntu/pcre3@2:8.39-13ubuntu0.22.04.1?os_distro=jammy&os_name=ubuntu&os_version=22.04 x LOW CVE-2017-11164 https://scout.docker.com/v/CVE-2017-11164 Affected range : >=0 Fixed version : not fixed CVSS Score : 7.5 CVSS Vector : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 0C 0H 0M 1L procps 2:3.3.17-6ubuntu2 pkg:deb/ubuntu/procps@2:3.3.17-6ubuntu2?os_distro=jammy&os_name=ubuntu&os_version=22.04 x LOW CVE-2023-4016 https://scout.docker.com/v/CVE-2023-4016 Affected range : >=0 Fixed version : not fixed CVSS Score : 5.5 CVSS Vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H 133 vulnerabilities found in 36 packages UNSPECIFIED 2 LOW 22 MEDIUM 46 HIGH 58 CRITICAL 5