Add 46 Advisories
CVE Exclusion List
Please check all CVEs which are to be excluded when running the exclusion job:
START EXCLUSION LIST
-
go/github.com/consensys/gnark-crypto GMS-2023-4035 -
go/github.com/kubernetes/client-go CVE-2023-3676 -
go/github.com/kubernetes/client-go CVE-2023-3955 -
go/github.com/kubernetes/kubelet CVE-2023-3676 -
go/github.com/kubernetes/kubelet CVE-2023-3955 -
go/github.com/kubernetes/kubernetes CVE-2023-3676 -
go/github.com/kubernetes/kubernetes CVE-2023-3955 -
go/github.com/kubernetes/kubernetes/pkg/kubectl/cmd/cp CVE-2023-3676 -
go/github.com/kubernetes/kubernetes/pkg/kubectl/cmd/cp CVE-2023-3955 -
go/github.com/kubernetes/pkg/kubelet/server CVE-2023-3676 -
go/github.com/kubernetes/pkg/kubelet/server CVE-2023-3955 -
go/github.com/lucas-clemente/quic-go CVE-2023-46239 -
go/github.com/mattermost/mattermost-server/v6 CVE-2023-5967 -
go/github.com/mattermost/mattermost-server/v6 CVE-2023-5968 -
go/github.com/mattermost/mattermost-server/v6 CVE-2023-5969 -
go/github.com/mattermost/mattermost/server/v8 CVE-2023-5967 -
go/github.com/mattermost/mattermost/server/v8 CVE-2023-5968 -
go/github.com/mattermost/mattermost/server/v8 CVE-2023-5969 -
go/github.com/projectcalico/calico CVE-2023-41378 -
go/github.com/sigstore/cosign CVE-2023-46737 -
go/github.com/slsa-framework/slsa-verifier GMS-2023-4063 -
go/github.com/slsa-framework/slsa-verifier/v2 GMS-2023-4064 -
go/github.com/zitadel/zitadel CVE-2023-47111 -
go/k8s.io/kubernetes/pkg/apis/apps/validation CVE-2023-3676 -
go/k8s.io/kubernetes/pkg/apis/apps/validation CVE-2023-3955 -
go/k8s.io/kubernetes/pkg/kubelet/server CVE-2023-3676 -
go/k8s.io/kubernetes/pkg/kubelet/server CVE-2023-3955 -
maven/org.apache.activemq/activemq-all CVE-2023-46604 -
maven/org.apache.activemq/activemq-broker CVE-2023-46604 -
maven/org.apache.activemq/activemq-core CVE-2023-46604 -
maven/org.apache.activemq/activemq-jaas CVE-2023-46604 -
maven/org.apache.activemq/activemq-web-console CVE-2023-46604 -
maven/org.apache.activemq/artemis-server CVE-2023-46604 -
maven/org.apache.uima/uimaj CVE-2023-39913 -
maven/org.wildfly.core/wildfly-controller CVE-2023-4061 -
maven/org.xwiki.platform/xwiki-platform-administration CVE-2023-46731 -
maven/org.xwiki.platform/xwiki-platform-administration-ui CVE-2023-46731 -
maven/org.xwiki.platform/xwiki-platform-flamingo-skin-resources CVE-2023-46732 -
packagist/codeigniter/framework CVE-2023-46240 -
packagist/floriangaerber/magnesium CVE-2017-20187 -
packagist/microweber/microweber CVE-2023-47379 -
packagist/prestashop/blockreassurance CVE-2023-47109 -
pypi/PyPDF2 CVE-2023-46250 -
pypi/apache-airflow-providers-celery CVE-2023-46215 -
pypi/ethyca-fides CVE-2023-47114 -
pypi/pypdf2 CVE-2023-46250
END EXCLUSION LIST
To be checked:
-
I have evaluated the MR acceptance checklist for this MR.