chore(findings): atlassian/jira-node-813
Summary
atlassian/jira-node-813 has 1515 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
CVE-2021-33037 | twistlock_cve | Medium | apache tomcat-8.5.60 |
CVE-2021-30640 | twistlock_cve | Medium | apache tomcat-8.5.60 |
CVE-2021-41079 | twistlock_cve | High | apache tomcat-8.5.60 |
CVE-2021-42340 | twistlock_cve | High | apache tomcat-8.5.60 |
CVE-2021-29425 | twistlock_cve | Medium | commons-io_commons-io-2.6 |
CVE-2021-29505 | twistlock_cve | High | com.thoughtworks.xstream_xstream-1.4.15 |
CVE-2021-39146 | twistlock_cve | High | com.thoughtworks.xstream_xstream-1.4.15 |
CVE-2021-39145 | twistlock_cve | High | com.thoughtworks.xstream_xstream-1.4.15 |
CVE-2021-39139 | twistlock_cve | High | com.thoughtworks.xstream_xstream-1.4.15 |
CVE-2021-39148 | twistlock_cve | High | com.thoughtworks.xstream_xstream-1.4.15 |
CVE-2021-39149 | twistlock_cve | High | com.thoughtworks.xstream_xstream-1.4.15 |
CVE-2021-39150 | twistlock_cve | High | com.thoughtworks.xstream_xstream-1.4.15 |
CVE-2021-39154 | twistlock_cve | High | com.thoughtworks.xstream_xstream-1.4.15 |
CVE-2021-39147 | twistlock_cve | High | com.thoughtworks.xstream_xstream-1.4.15 |
CVE-2021-39153 | twistlock_cve | High | com.thoughtworks.xstream_xstream-1.4.15 |
CVE-2021-39140 | twistlock_cve | Medium | com.thoughtworks.xstream_xstream-1.4.15 |
CVE-2021-39151 | twistlock_cve | High | com.thoughtworks.xstream_xstream-1.4.15 |
CVE-2021-39152 | twistlock_cve | High | com.thoughtworks.xstream_xstream-1.4.15 |
CVE-2021-39144 | twistlock_cve | High | com.thoughtworks.xstream_xstream-1.4.15 |
CVE-2021-39141 | twistlock_cve | High | com.thoughtworks.xstream_xstream-1.4.15 |
PRISMA-2021-0081 | twistlock_cve | High | org.apache.lucene_lucene-core-7.3.1 |
CVE-2021-37714 | twistlock_cve | High | org.jsoup_jsoup-1.8.3 |
CVE-2021-34428 | twistlock_cve | Low | org.eclipse.jetty_jetty-io-8.1.15.v20140411 |
CVE-2021-28169 | twistlock_cve | Medium | org.eclipse.jetty_jetty-io-8.1.15.v20140411 |
CVE-2021-35515 | twistlock_cve | High | org.apache.commons_commons-compress-1.18 |
CVE-2021-35517 | twistlock_cve | High | org.apache.commons_commons-compress-1.18 |
CVE-2021-35516 | twistlock_cve | High | org.apache.commons_commons-compress-1.18 |
CVE-2021-36090 | twistlock_cve | High | org.apache.commons_commons-compress-1.18 |
CVE-2019-10172 | twistlock_cve | High | org.codehaus.jackson_jackson-mapper-asl-1.9.13 |
GHSA-qrx8-8545-4wg2 | anchore_cve | High | xstream-1.4.15 |
GHSA-6w62-hx7r-mw68 | anchore_cve | High | xstream-1.4.15 |
GHSA-64xx-cq4q-mf44 | anchore_cve | High | xstream-1.4.15 |
GHSA-m72m-mhq2-9p6c | anchore_cve | High | jsoup-1.8.3 |
GHSA-v528-7hrm-frqp | anchore_cve | Critical | json-smart-2.3 |
GHSA-645p-88qh-w398 | anchore_cve | Critical | jackson-databind-2.3.3 |
GHSA-cxfm-5m4g-x7xp | anchore_cve | High | xstream-1.4.15 |
GHSA-p8pq-r894-fm8f | anchore_cve | High | xstream-1.4.15 |
GHSA-h7v4-7xg3-hxcc | anchore_cve | High | xstream-1.4.15 |
GHSA-6wf9-jmg9-vxcc | anchore_cve | Medium | xstream-1.4.15 |
GHSA-cxfm-5m4g-x7xp | anchore_cve | High | xstream-1.4.15 |
GHSA-2q8x-2p7f-574v | anchore_cve | High | xstream-1.4.15 |
GHSA-hph2-m3g5-xxv4 | anchore_cve | High | xstream-1.4.15 |
GHSA-7r82-7xv7-xcpj | anchore_cve | Medium | httpclient-4.5.10 |
GHSA-7r82-7xv7-xcpj | anchore_cve | Medium | httpclient-4.4.1 |
GHSA-j8wc-gxx9-82hx | anchore_cve | High | xmlsec-2.0.7 |
GHSA-j8wc-gxx9-82hx | anchore_cve | High | xmlsec-1.5.6 |
GHSA-8jrj-525p-826v | anchore_cve | High | xstream-1.4.15 |
GHSA-7chv-rrw6-w6fc | anchore_cve | High | xstream-1.4.15 |
GHSA-7chv-rrw6-w6fc | anchore_cve | High | xstream-1.4.15 |
GHSA-h7v4-7xg3-hxcc | anchore_cve | High | xstream-1.4.15 |
GHSA-xw4p-crpj-vjx2 | anchore_cve | High | xstream-1.4.15 |
GHSA-3ccq-5vw3-2p6x | anchore_cve | High | xstream-1.4.15 |
GHSA-j9h8-phrw-h4fh | anchore_cve | High | xstream-1.4.15 |
GHSA-g5w6-mrj7-75h2 | anchore_cve | High | xstream-1.4.15 |
GHSA-hph2-m3g5-xxv4 | anchore_cve | High | xstream-1.4.15 |
GHSA-xw4p-crpj-vjx2 | anchore_cve | High | xstream-1.4.15 |
GHSA-6w62-hx7r-mw68 | anchore_cve | High | xstream-1.4.15 |
GHSA-64xx-cq4q-mf44 | anchore_cve | High | xstream-1.4.15 |
GHSA-g5w6-mrj7-75h2 | anchore_cve | High | xstream-1.4.15 |
GHSA-m6cp-vxjx-65j6 | anchore_cve | Low | jetty-server-8.1.15.v20140411 |
GHSA-64xx-cq4q-mf44 | anchore_cve | High | xstream-1.4.15 |
GHSA-8jrj-525p-826v | anchore_cve | High | xstream-1.4.15 |
GHSA-qrx8-8545-4wg2 | anchore_cve | High | xstream-1.4.15 |
GHSA-j9h8-phrw-h4fh | anchore_cve | High | xstream-1.4.15 |
GHSA-j9h8-phrw-h4fh | anchore_cve | High | xstream-1.4.15 |
GHSA-3ccq-5vw3-2p6x | anchore_cve | High | xstream-1.4.15 |
GHSA-m72m-mhq2-9p6c | anchore_cve | High | jsoup-1.8.3 |
GHSA-m72m-mhq2-9p6c | anchore_cve | High | jsoup-1.8.3 |
GHSA-qrx8-8545-4wg2 | anchore_cve | High | xstream-1.4.15 |
GHSA-7r82-7xv7-xcpj | anchore_cve | Medium | httpclient-4.4.1 |
GHSA-cxfm-5m4g-x7xp | anchore_cve | High | xstream-1.4.15 |
GHSA-p8pq-r894-fm8f | anchore_cve | High | xstream-1.4.15 |
GHSA-6wf9-jmg9-vxcc | anchore_cve | Medium | xstream-1.4.15 |
GHSA-6wf9-jmg9-vxcc | anchore_cve | Medium | xstream-1.4.15 |
GHSA-p8pq-r894-fm8f | anchore_cve | High | xstream-1.4.15 |
GHSA-2q8x-2p7f-574v | anchore_cve | High | xstream-1.4.15 |
GHSA-hph2-m3g5-xxv4 | anchore_cve | High | xstream-1.4.15 |
GHSA-hph2-m3g5-xxv4 | anchore_cve | High | xstream-1.4.15 |
GHSA-4gq5-ch57-c2mg | anchore_cve | Critical | jackson-databind-2.3.3 |
GHSA-9c8w-jrw3-q2c3 | anchore_cve | Medium | antisamy-1.5.8 |
GHSA-7r82-7xv7-xcpj | anchore_cve | Medium | httpclient-4.4.1 |
GHSA-8jrj-525p-826v | anchore_cve | High | xstream-1.4.15 |
GHSA-6wf9-jmg9-vxcc | anchore_cve | Medium | xstream-1.4.15 |
GHSA-7chv-rrw6-w6fc | anchore_cve | High | xstream-1.4.15 |
GHSA-v528-7hrm-frqp | anchore_cve | Critical | json-smart-1.3.1 |
GHSA-8jrj-525p-826v | anchore_cve | High | xstream-1.4.15 |
GHSA-h7v4-7xg3-hxcc | anchore_cve | High | xstream-1.4.15 |
GHSA-v528-7hrm-frqp | anchore_cve | Critical | json-smart-2.3 |
GHSA-qrx8-8545-4wg2 | anchore_cve | High | xstream-1.4.15 |
GHSA-cxfm-5m4g-x7xp | anchore_cve | High | xstream-1.4.15 |
GHSA-p8pq-r894-fm8f | anchore_cve | High | xstream-1.4.15 |
GHSA-xw4p-crpj-vjx2 | anchore_cve | High | xstream-1.4.15 |
GHSA-3ccq-5vw3-2p6x | anchore_cve | High | xstream-1.4.15 |
GHSA-2q8x-2p7f-574v | anchore_cve | High | xstream-1.4.15 |
GHSA-g5w6-mrj7-75h2 | anchore_cve | High | xstream-1.4.15 |
GHSA-j9h8-phrw-h4fh | anchore_cve | High | xstream-1.4.15 |
GHSA-3ccq-5vw3-2p6x | anchore_cve | High | xstream-1.4.15 |
GHSA-6w62-hx7r-mw68 | anchore_cve | High | xstream-1.4.15 |
GHSA-64xx-cq4q-mf44 | anchore_cve | High | xstream-1.4.15 |
GHSA-6w62-hx7r-mw68 | anchore_cve | High | xstream-1.4.15 |
GHSA-7chv-rrw6-w6fc | anchore_cve | High | xstream-1.4.15 |
GHSA-7r82-7xv7-xcpj | anchore_cve | Medium | httpclient-4.5.10 |
GHSA-2q8x-2p7f-574v | anchore_cve | High | xstream-1.4.15 |
GHSA-h7v4-7xg3-hxcc | anchore_cve | High | xstream-1.4.15 |
GHSA-9c8w-jrw3-q2c3 | anchore_cve | Medium | antisamy-1.5.8 |
GHSA-rmrm-75hp-phr2 | anchore_cve | Medium | hibernate-validator-6.0.18.Final |
GHSA-7r82-7xv7-xcpj | anchore_cve | Medium | httpclient-4.5.5 |
GHSA-xw4p-crpj-vjx2 | anchore_cve | High | xstream-1.4.15 |
GHSA-v528-7hrm-frqp | anchore_cve | Critical | json-smart-1.3.1 |
GHSA-g5w6-mrj7-75h2 | anchore_cve | High | xstream-1.4.15 |
GHSA-v528-7hrm-frqp | anchore_cve | Critical | json-smart-1.3.1 |
GHSA-v585-23hc-c647 | anchore_cve | High | jackson-databind-2.3.3 |
GHSA-r695-7vr9-jgc2 | anchore_cve | High | jackson-databind-2.3.3 |
GHSA-8c4j-34r4-xr8g | anchore_cve | High | jackson-databind-2.3.3 |
GHSA-h3cw-g4mq-c5x2 | anchore_cve | High | jackson-databind-2.3.3 |
GHSA-89qr-369f-5m5x | anchore_cve | High | jackson-databind-2.3.3 |
GHSA-wh8g-3j2c-rqj5 | anchore_cve | High | jackson-databind-2.3.3 |
GHSA-9m6f-7xcq-8vf8 | anchore_cve | High | jackson-databind-2.3.3 |
GHSA-vfqx-33qm-g869 | anchore_cve | High | jackson-databind-2.3.3 |
GHSA-9gph-22xh-8x98 | anchore_cve | High | jackson-databind-2.3.3 |
GHSA-m6x4-97wx-4q27 | anchore_cve | High | jackson-databind-2.3.3 |
GHSA-f9xh-2qgp-cq57 | anchore_cve | High | jackson-databind-2.3.3 |
GHSA-cvm9-fjm9-3572 | anchore_cve | High | jackson-databind-2.3.3 |
GHSA-8w26-6f25-cm9x | anchore_cve | High | jackson-databind-2.3.3 |
GHSA-qjw2-hr98-qgfh | anchore_cve | High | jackson-databind-2.3.3 |
GHSA-r3gr-cxrf-hg25 | anchore_cve | High | jackson-databind-2.3.3 |
CVE-2021-4104 | twistlock_cve | Medium | log4j_log4j-1.2.17-atlassian-3 |
CVE-2021-4104 | twistlock_cve | Medium | log4j_log4j-1.2.17 |
PRISMA-2021-0182 | twistlock_cve | Medium | org.eclipse.jetty_jetty-servlet-8.1.15.v20140411 |
PRISMA-2021-0182 | twistlock_cve | Medium | org.eclipse.jetty_jetty-server-8.1.15.v20140411 |
PRISMA-2021-0213 | twistlock_cve | Medium | com.fasterxml.jackson.core_jackson-databind-2.10.0 |
PRISMA-2021-0213 | twistlock_cve | Medium | com.fasterxml.jackson.core_jackson-databind-2.10.3 |
PRISMA-2021-0213 | twistlock_cve | Medium | com.fasterxml.jackson.core_jackson-databind-2.10.2 |
CCE-85987-6 | oscap_comp | Medium | |
GHSA-2h63-qp69-fwvw | anchore_cve | High | batik-util-1.10 |
GHSA-2h63-qp69-fwvw | anchore_cve | High | batik-xml-1.10 |
GHSA-59j4-wjwp-mw9m | anchore_cve | High | velocity-1.6.4-atlassian-21 |
CVE-2021-27568 | twistlock_cve | Critical | net.minidev_json-smart-2.3 |
CVE-2021-27568 | twistlock_cve | Critical | net.minidev_json-smart-1.3.1 |
GHSA-wrvw-hg22-4m67 | anchore_cve | High | protobuf-java-3.0.2 |
CVE-2022-23307 | twistlock_cve | High | log4j_log4j-1.2.17-atlassian-3 |
CVE-2022-23307 | twistlock_cve | High | log4j_log4j-1.2.17 |
CVE-2022-23302 | twistlock_cve | High | log4j_log4j-1.2.17 |
CVE-2022-23305 | twistlock_cve | Critical | log4j_log4j-1.2.17 |
CVE-2022-23181 | twistlock_cve | High | apache tomcat-8.5.60 |
CVE-2021-28165 | anchore_cve | High | jetty-security-8.1.15.v20140411 |
CVE-2021-26076 | anchore_cve | Low | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2018-5231 | anchore_cve | High | jira-projects-api-6.0.12 |
CVE-2020-14167 | anchore_cve | High | jira-mobile-rest-3.1.2 |
CVE-2021-26075 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2019-15005 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2018-20232 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2017-7657 | anchore_cve | Critical | jetty-util-8.1.15.v20140411 |
CVE-2021-43045 | anchore_cve | High | avro-1.7.7 |
CVE-2021-39124 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-41306 | anchore_cve | High | jira-software-application-8.13.6 |
CVE-2017-7656 | anchore_cve | High | jetty-util-8.1.15.v20140411 |
CVE-2018-13402 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-11588 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-14172 | anchore_cve | Critical | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-36236 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-14178 | anchore_cve | High | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2017-18033 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-41307 | anchore_cve | High | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-39119 | anchore_cve | Medium | jira-software-application-8.13.6 |
CVE-2018-13402 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-41308 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-8442 | anchore_cve | High | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2017-16863 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-14174 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-39113 | anchore_cve | High | jira-projects-api-6.0.12 |
CVE-2014-2314 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-43947 | anchore_cve | High | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2014-9390 | anchore_cve | Critical | org.eclipse.egit.github.core-2.1.5 |
CVE-2020-14184 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2017-18098 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-15005 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2018-20826 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-14183 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2018-5230 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-39119 | anchore_cve | Medium | jira-lucene-dmz-8.13.6 |
CVE-2021-41304 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-8443 | anchore_cve | High | jira-projects-api-6.0.12 |
CVE-2020-36235 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-3401 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2017-18033 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-26078 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2017-18113 | anchore_cve | High | jira-projects-api-6.0.12 |
CVE-2021-39125 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2016-6285 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-20411 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2016-6285 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-14183 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2008-6531 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-39119 | anchore_cve | Medium | jira-rest-api-8.13.6 |
CVE-2021-28165 | anchore_cve | High | jetty-server-8.1.15.v20140411 |
CVE-2014-2313 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-39117 | anchore_cve | Medium | jira-less-integration-8.13.6 |
CVE-2021-43947 | anchore_cve | High | jira-languages-8.13.6 |
CVE-2017-18097 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-4022 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2018-20826 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2019-15005 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2017-7658 | anchore_cve | Critical | jetty-io-8.1.15.v20140411 |
CVE-2018-13395 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2018-13404 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2018-5230 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2019-20897 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-39113 | anchore_cve | High | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-20416 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-36231 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2019-15005 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-20402 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2019-20410 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-36237 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-20409 | anchore_cve | Critical | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-26075 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-34428 | anchore_cve | Low | jetty-servlet-8.1.15.v20140411 |
CVE-2019-20901 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-39113 | anchore_cve | High | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2017-18104 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-20411 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2017-14594 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2016-1181 | anchore_cve | High | struts-taglib-1.3.8 |
CVE-2019-20418 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-20414 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2016-6285 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2017-7657 | anchore_cve | Critical | jetty-io-8.1.15.v20140411 |
CVE-2018-5232 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2006-5391 | anchore_cve | Medium | xfire-aegis-1.2.6 |
CVE-2021-26082 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-20901 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2018-13391 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-14184 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-41312 | anchore_cve | High | jira-mobile-rest-3.1.2 |
CVE-2021-41307 | anchore_cve | High | jira-software-application-8.13.6 |
CVE-2019-8443 | anchore_cve | High | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-39111 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-20413 | anchore_cve | High | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-20410 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2012-2928 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2017-18113 | anchore_cve | High | jira-configurator-8.13.6 |
CVE-2019-11588 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2018-20826 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-20898 | anchore_cve | High | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2016-4319 | anchore_cve | High | jira-projects-api-6.0.12 |
CVE-2016-4318 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2020-14184 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-36235 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-15005 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-41305 | anchore_cve | High | jira-dmz-api-8.13.6 |
CVE-2021-39122 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-4025 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-39111 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-39123 | anchore_cve | High | jira-projects-api-6.0.12 |
CVE-2019-11585 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-43947 | anchore_cve | High | jira-software-application-8.13.6 |
CVE-2017-7658 | anchore_cve | Critical | jetty-servlet-8.1.15.v20140411 |
CVE-2021-39112 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-3399 | anchore_cve | High | jira-projects-api-6.0.12 |
CVE-2020-29451 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-20101 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2017-7657 | anchore_cve | Critical | jetty-security-8.1.15.v20140411 |
CVE-2019-20415 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2018-13404 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2017-18098 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-36288 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-39125 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2017-18097 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2018-13400 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-41307 | anchore_cve | High | jira-less-integration-8.13.6 |
CVE-2018-13387 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-39122 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2020-4022 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-39118 | anchore_cve | Medium | jira-lucene-dmz-8.13.6 |
CVE-2021-26071 | anchore_cve | Low | jira-mobile-rest-3.1.2 |
CVE-2021-39118 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-20412 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-14168 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-41306 | anchore_cve | High | jira-ical-feed-1.5.0 |
CVE-2020-4021 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2018-13404 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2018-20824 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2013-5319 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-14181 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2013-4390 | anchore_cve | Medium | org.apache.sling.commons.osgi-2.0.4-incubator |
CVE-2019-3401 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-11583 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-26081 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-39119 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-39122 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-36289 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-41305 | anchore_cve | High | jira-less-integration-8.13.6 |
CVE-2018-13403 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-4025 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-11585 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2020-9488 | anchore_cve | Low | log4j2-stacktrace-origins-2.2-atlassian-2 |
CVE-2019-11586 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-26071 | anchore_cve | Low | jira-ical-feed-1.5.0 |
CVE-2021-41304 | anchore_cve | Medium | jira-languages-8.13.6 |
CVE-2021-39118 | anchore_cve | Medium | jira-languages-8.13.6 |
CVE-2021-26071 | anchore_cve | Low | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2007-6619 | anchore_cve | High | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-39124 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2012-2928 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-29451 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-41304 | anchore_cve | Medium | jira-rest-api-8.13.6 |
CVE-2019-20101 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-14172 | anchore_cve | Critical | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-20410 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-3403 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-29451 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-41306 | anchore_cve | High | jira-rest-api-8.13.6 |
CVE-2019-3401 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-39123 | anchore_cve | High | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-36236 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2008-6531 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2018-13395 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2020-14169 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-20897 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2020-14167 | anchore_cve | High | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-3402 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-26071 | anchore_cve | Low | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-39121 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-14172 | anchore_cve | Critical | jira-projects-api-6.0.12 |
CVE-2007-2379 | anchore_cve | Medium | jquery-2.2.4.7 |
CVE-2021-39125 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-41305 | anchore_cve | High | jira-mobile-rest-3.1.2 |
CVE-2007-6619 | anchore_cve | High | jira-mobile-rest-3.1.2 |
CVE-2018-13391 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2018-13400 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2019-3399 | anchore_cve | High | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-4025 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-36236 | anchore_cve | Medium | jira-projects-api-6.0.12 |
GHSA-fp5r-v3w9-4333 | anchore_cve | High | log4j-1.2.17-atlassian-3 |
CVE-2021-26078 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-41306 | anchore_cve | High | jira-projects-api-6.0.12 |
CVE-2019-20410 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-3403 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2018-13395 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-39113 | anchore_cve | High | jira-configurator-8.13.6 |
CVE-2012-2928 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2018-13395 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2019-20408 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2018-5230 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2014-2313 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2022-23307 | anchore_cve | High | log4j-1.2.17-atlassian-3 |
CVE-2021-39125 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-39119 | anchore_cve | Medium | jira-less-integration-8.13.6 |
CVE-2020-36237 | anchore_cve | Medium | jira-configurator-8.13.6 |
CVE-2020-14174 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-27216 | anchore_cve | High | jetty-servlet-8.1.15.v20140411 |
CVE-2018-13391 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2018-20232 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-34428 | anchore_cve | Low | jetty-continuation-8.1.15.v20140411 |
CVE-2021-41304 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-36231 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-39119 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2017-18101 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2016-4318 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-26069 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-20415 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2019-20106 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-20409 | anchore_cve | Critical | jira-mobile-rest-3.1.2 |
CVE-2017-18113 | anchore_cve | High | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-14168 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-20414 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-26070 | anchore_cve | High | jira-projects-api-6.0.12 |
CVE-2019-20408 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-36234 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-33813 | anchore_cve | High | com.springsource.org.jdom-1.0.0 |
CVE-2017-18113 | anchore_cve | High | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-14184 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2016-4319 | anchore_cve | High | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2017-18100 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-4021 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2019-11588 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-36237 | anchore_cve | Medium | jira-languages-8.13.6 |
CVE-2019-8443 | anchore_cve | High | jira-mobile-rest-3.1.2 |
CVE-2019-3403 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2007-6617 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2017-18101 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2016-4319 | anchore_cve | High | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2017-18097 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2019-11583 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-26078 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2016-4318 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-43947 | anchore_cve | High | jira-languages-8.13.6 |
CVE-2019-20415 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-26069 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-43947 | anchore_cve | High | jira-projects-api-6.0.12 |
CVE-2007-6618 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-15005 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-14185 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2019-20411 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2016-6285 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-20409 | anchore_cve | Critical | jira-ical-feed-1.5.0 |
CVE-2021-26079 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-41304 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-14169 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-41304 | anchore_cve | Medium | jira-api-8.13.6 |
CVE-2019-20415 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-39118 | anchore_cve | Medium | jira-api-8.13.6 |
CVE-2019-3402 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-14165 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-39119 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2013-5319 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2018-5231 | anchore_cve | High | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-11022 | anchore_cve | Medium | jquery-2.2.4.7 |
CVE-2020-14173 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-4021 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-20899 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-41304 | anchore_cve | Medium | jira-dmz-api-8.13.6 |
CVE-2021-41312 | anchore_cve | High | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2018-13387 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-39124 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-39124 | anchore_cve | Medium | jira-languages-8.13.6 |
CVE-2021-26076 | anchore_cve | Low | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2012-2928 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2017-14594 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-4022 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2018-5232 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-39118 | anchore_cve | Medium | jira-dmz-api-8.13.6 |
CVE-2021-41308 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2020-14168 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2018-13401 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-39113 | anchore_cve | High | jira-dmz-api-8.13.6 |
CVE-2020-14178 | anchore_cve | High | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-26069 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-4025 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2018-13402 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-20418 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-10517 | anchore_cve | Medium | org.eclipse.egit.github.core-2.1.2 |
CVE-2021-33813 | anchore_cve | High | jdom-1.0 |
CVE-2019-11583 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2008-6531 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-36236 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-44228 | anchore_cve | Critical | log4j2-stacktrace-origins-2.2-atlassian-2 |
CVE-2021-39121 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-39123 | anchore_cve | High | jira-less-integration-8.13.6 |
CVE-2019-11586 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-26078 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-26076 | anchore_cve | Low | jira-projects-api-6.0.12 |
CVE-2017-16865 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2020-14181 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-11583 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2019-20402 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-14168 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2018-5230 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-39125 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-20416 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-41304 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2014-2313 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-41312 | anchore_cve | High | jira-lucene-dmz-8.13.6 |
CVE-2019-3399 | anchore_cve | High | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-4022 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2018-20824 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-20106 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-39124 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-20402 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-20901 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-20417 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-11587 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-11022 | anchore_cve | Medium | jquery-2.2.4.7 |
CVE-2019-3402 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-41304 | anchore_cve | Medium | jira-languages-8.13.6 |
CVE-2019-11585 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-14168 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2007-6618 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-39127 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-14184 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-29451 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-41306 | anchore_cve | High | jira-dmz-api-8.13.6 |
CVE-2021-41312 | anchore_cve | High | jira-languages-8.13.6 |
CVE-2019-20414 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-39112 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-39119 | anchore_cve | Medium | jira-configurator-8.13.6 |
CVE-2018-20232 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2017-18101 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-20897 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-14168 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-10518 | anchore_cve | High | org.eclipse.egit.github.core-2.1.2 |
CVE-2020-4022 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2020-36289 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-14183 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-14185 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2014-2314 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2018-13391 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-36237 | anchore_cve | Medium | jira-less-integration-8.13.6 |
CVE-2021-41304 | anchore_cve | Medium | jira-software-application-8.13.6 |
CVE-2018-13401 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-39113 | anchore_cve | High | jira-mobile-rest-3.1.2 |
CVE-2017-18033 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-36288 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-28169 | anchore_cve | Medium | jetty-security-8.1.15.v20140411 |
CVE-2021-39119 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2017-18104 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-28165 | anchore_cve | High | jetty-servlet-8.1.15.v20140411 |
CVE-2021-26079 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-41307 | anchore_cve | High | jira-languages-8.13.6 |
CVE-2021-39112 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-20408 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-26083 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-14183 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-36237 | anchore_cve | Medium | jira-lucene-dmz-8.13.6 |
CVE-2021-41305 | anchore_cve | High | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2017-18113 | anchore_cve | High | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-20416 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2020-36235 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-36287 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-20901 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2015-0899 | anchore_cve | High | struts-taglib-1.3.8 |
CVE-2021-41312 | anchore_cve | High | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-41307 | anchore_cve | High | jira-mobile-rest-3.1.2 |
CVE-2018-13395 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2019-11588 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-4024 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2013-4390 | anchore_cve | Medium | org.apache.sling.commons.osgi-2.0.4-incubator |
CVE-2020-36238 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2017-16862 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-4024 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-39113 | anchore_cve | High | jira-languages-8.13.6 |
CVE-2021-41305 | anchore_cve | High | jira-rest-api-8.13.6 |
CVE-2021-43947 | anchore_cve | High | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2019-20418 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2016-4319 | anchore_cve | High | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-41307 | anchore_cve | High | jira-api-8.13.6 |
CVE-2020-29451 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-41306 | anchore_cve | High | jira-languages-8.13.6 |
CVE-2021-26071 | anchore_cve | Low | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-39121 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-20101 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-11587 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2017-7656 | anchore_cve | High | jetty-security-8.1.15.v20140411 |
CVE-2020-4029 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2018-13401 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-28169 | anchore_cve | Medium | jetty-io-8.1.15.v20140411 |
CVE-2021-41307 | anchore_cve | High | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-41304 | anchore_cve | Medium | jira-less-integration-8.13.6 |
CVE-2019-20408 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-20416 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2017-14594 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2006-2839 | anchore_cve | Medium | webwork-1.4-atlassian-30 |
CVE-2008-0732 | anchore_cve | Low | geronimo-stax-api_1.0_spec-1.0.1 |
CVE-2017-16864 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-27216 | anchore_cve | High | jetty-continuation-8.1.15.v20140411 |
CVE-2021-39113 | anchore_cve | High | jira-api-8.13.6 |
CVE-2020-4021 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-41305 | anchore_cve | High | jira-api-8.13.6 |
CVE-2019-8443 | anchore_cve | High | jira-ical-feed-1.5.0 |
CVE-2020-36287 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-26070 | anchore_cve | High | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2013-5319 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-36234 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-20412 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-20415 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-11583 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-39123 | anchore_cve | High | jira-api-8.13.6 |
CVE-2019-3403 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2019-20897 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-39117 | anchore_cve | Medium | jira-api-8.13.6 |
CVE-2019-20414 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-36286 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-15013 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-8442 | anchore_cve | High | jira-mobile-rest-3.1.2 |
CVE-2021-41308 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-36289 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-26069 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-14173 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-39118 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-39112 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-11583 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2019-20106 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-14183 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-41307 | anchore_cve | High | jira-configurator-8.13.6 |
CVE-2021-39125 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-36236 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2011-5034 | anchore_cve | High | geronimo-stax-api_1.0_spec-1.0.1 |
CVE-2019-11584 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-14168 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-11586 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-39119 | anchore_cve | Medium | jira-languages-8.13.6 |
CVE-2019-8449 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-39118 | anchore_cve | Medium | jira-configurator-8.13.6 |
CVE-2018-20824 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-26071 | anchore_cve | Low | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-20412 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-36287 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-14172 | anchore_cve | Critical | jira-ical-feed-1.5.0 |
CVE-2019-11581 | anchore_cve | Critical | jira-projects-api-6.0.12 |
CVE-2020-14173 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-20417 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-26070 | anchore_cve | High | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-39118 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2017-14594 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-39119 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2019-3399 | anchore_cve | High | jira-mobile-rest-3.1.2 |
CVE-2018-13395 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2017-18113 | anchore_cve | High | jira-ical-feed-1.5.0 |
CVE-2014-0114 | anchore_cve | High | struts-tiles-1.3.8 |
CVE-2019-20897 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-26081 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-39127 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-39127 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2007-6617 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-39118 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-10517 | anchore_cve | Medium | org.eclipse.egit.github.core-2.1.5 |
CVE-2020-14164 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-39124 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-39125 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2012-2926 | anchore_cve | Critical | jira-ical-feed-1.5.0 |
CVE-2012-2926 | anchore_cve | Critical | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2018-13404 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-41306 | anchore_cve | High | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-11358 | anchore_cve | Medium | jquery-2.2.4.7 |
CVE-2020-36287 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-8449 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-11586 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2017-18097 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2016-1181 | anchore_cve | High | struts-tiles-1.3.8 |
CVE-2020-36235 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2019-11588 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2014-0114 | anchore_cve | High | struts-taglib-1.3.8 |
CVE-2021-26083 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-20416 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2018-20826 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2017-18113 | anchore_cve | High | jira-rest-api-8.13.6 |
CVE-2018-13400 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-11588 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-39124 | anchore_cve | Medium | jira-configurator-8.13.6 |
CVE-2019-20413 | anchore_cve | High | jira-mobile-rest-3.1.2 |
CVE-2019-8443 | anchore_cve | High | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-20899 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2017-16862 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-36288 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2018-13403 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-15013 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-39119 | anchore_cve | Medium | jira-api-8.13.6 |
CVE-2021-41306 | anchore_cve | High | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-39121 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-20412 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-41304 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2018-13404 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2019-8443 | anchore_cve | High | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-26070 | anchore_cve | High | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-39123 | anchore_cve | High | jira-software-application-8.13.6 |
CVE-2020-14174 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2007-6617 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2014-9390 | anchore_cve | Critical | org.eclipse.egit.github.core-2.1.2 |
CVE-2021-34428 | anchore_cve | Low | jetty-http-8.1.15.v20140411 |
CVE-2020-14185 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-39124 | anchore_cve | Medium | jira-api-8.13.6 |
CVE-2017-18101 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-39111 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-4021 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2020-14181 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-20413 | anchore_cve | High | jira-projects-api-6.0.12 |
CVE-2018-5230 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-4028 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-14165 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-8442 | anchore_cve | High | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-43947 | anchore_cve | High | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-14185 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-11585 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-11588 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-14184 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-28165 | anchore_cve | High | jetty-http-8.1.15.v20140411 |
CVE-2007-2379 | anchore_cve | Medium | jquery-2.2.4 |
CVE-2021-39113 | anchore_cve | High | jira-software-application-8.13.6 |
CVE-2019-11584 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-11587 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2018-13401 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-39117 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-41305 | anchore_cve | High | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2007-6619 | anchore_cve | High | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2017-7656 | anchore_cve | High | jetty-continuation-8.1.15.v20140411 |
CVE-2021-39111 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2016-4318 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-11587 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2018-20232 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-14181 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-36238 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-20899 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-41304 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-14165 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2017-16864 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-3401 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2017-16863 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2017-18033 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-41307 | anchore_cve | High | jira-languages-8.13.6 |
CVE-2020-36234 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2014-2313 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2018-13402 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-39123 | anchore_cve | High | jira-languages-8.13.6 |
CVE-2021-26079 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-4028 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2017-7657 | anchore_cve | Critical | jetty-http-8.1.15.v20140411 |
CVE-2017-7657 | anchore_cve | Critical | jetty-servlet-8.1.15.v20140411 |
CVE-2019-15013 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-20409 | anchore_cve | Critical | jira-projects-api-6.0.12 |
CVE-2021-41312 | anchore_cve | High | jira-rest-api-8.13.6 |
CVE-2021-39124 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-39123 | anchore_cve | High | jira-ical-feed-1.5.0 |
CVE-2021-39119 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2006-5391 | anchore_cve | Medium | xfire-core-1.2.6 |
CVE-2018-13387 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-3402 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-39113 | anchore_cve | High | jira-languages-8.13.6 |
CVE-2021-34428 | anchore_cve | Low | jetty-io-8.1.15.v20140411 |
CVE-2021-26079 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2018-13387 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2017-9735 | anchore_cve | High | jetty-security-8.1.15.v20140411 |
CVE-2020-4029 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-28165 | anchore_cve | High | jetty-continuation-8.1.15.v20140411 |
CVE-2019-11584 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2018-13403 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-26070 | anchore_cve | High | jira-mobile-rest-3.1.2 |
CVE-2020-36289 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2017-18098 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2014-2314 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2017-9735 | anchore_cve | High | jetty-http-8.1.15.v20140411 |
CVE-2021-41307 | anchore_cve | High | jira-rest-api-8.13.6 |
CVE-2020-14164 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-3401 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-8908 | anchore_cve | Low | guava-rate-limiter-15.0-atlassian-1 |
CVE-2017-16865 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-26076 | anchore_cve | Low | jira-ical-feed-1.5.0 |
CVE-2021-39123 | anchore_cve | High | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2007-6619 | anchore_cve | High | jira-ical-feed-1.5.0 |
CVE-2018-20824 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-14173 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-26075 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-14184 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-36286 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-14164 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2018-20232 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-39118 | anchore_cve | Medium | jira-less-integration-8.13.6 |
CVE-2017-16862 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-39122 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2014-2313 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-26082 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-20411 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-41308 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-36288 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-26078 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2017-16865 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-39118 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-39117 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-8442 | anchore_cve | High | jira-ical-feed-1.5.0 |
CVE-2020-36237 | anchore_cve | Medium | jira-rest-api-8.13.6 |
CVE-2021-39124 | anchore_cve | Medium | jira-software-application-8.13.6 |
CVE-2019-20413 | anchore_cve | High | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2019-20418 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2016-4318 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2017-16865 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-26079 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2017-18104 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-39117 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2018-20826 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-41304 | anchore_cve | Medium | jira-lucene-dmz-8.13.6 |
CVE-2020-27216 | anchore_cve | High | jetty-util-8.1.15.v20140411 |
CVE-2017-16864 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-41312 | anchore_cve | High | jira-ical-feed-1.5.0 |
CVE-2014-2314 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-26075 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2019-20410 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-41305 | anchore_cve | High | jira-ical-feed-1.5.0 |
CVE-2019-11358 | anchore_cve | Medium | jquery-2.2.4.7 |
CVE-2019-20106 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-39119 | anchore_cve | Medium | jira-languages-8.13.6 |
CVE-2021-39122 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-11585 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2017-7658 | anchore_cve | Critical | jetty-util-8.1.15.v20140411 |
CVE-2020-36237 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2017-9735 | anchore_cve | High | jetty-io-8.1.15.v20140411 |
CVE-2020-14181 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-26082 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2017-18100 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-11584 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-41312 | anchore_cve | High | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-36286 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2017-18101 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-4021 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-26076 | anchore_cve | Low | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-14178 | anchore_cve | High | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-20410 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-45105 | anchore_cve | Medium | log4j2-stacktrace-origins-2.2-atlassian-2 |
CVE-2017-16862 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2013-5319 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-39117 | anchore_cve | Medium | jira-configurator-8.13.6 |
CVE-2019-20106 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-20411 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-39117 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2015-0899 | anchore_cve | High | struts-tiles-1.3.8 |
CVE-2018-5231 | anchore_cve | High | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-41305 | anchore_cve | High | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-4028 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-26069 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2016-6285 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2019-11584 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-36231 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2020-14181 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2017-18098 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-20417 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2017-18101 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-14174 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-14185 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-39123 | anchore_cve | High | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-39124 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2018-5232 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-14172 | anchore_cve | Critical | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-14181 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-26082 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2019-20899 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2020-14183 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-36238 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-4028 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2017-16864 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-20418 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-36238 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2019-20413 | anchore_cve | High | jira-ical-feed-1.5.0 |
CVE-2018-13401 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-41305 | anchore_cve | High | jira-configurator-8.13.6 |
CVE-2019-3399 | anchore_cve | High | jira-ical-feed-1.5.0 |
CVE-2021-43947 | anchore_cve | High | jira-rest-api-8.13.6 |
CVE-2019-11586 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-41306 | anchore_cve | High | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2018-5232 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-11587 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-39117 | anchore_cve | Medium | jira-dmz-api-8.13.6 |
CVE-2021-41312 | anchore_cve | High | jira-projects-api-6.0.12 |
CVE-2017-18104 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-41305 | anchore_cve | High | jira-projects-api-6.0.12 |
CVE-2020-4028 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-41308 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2017-16862 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-20101 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-26083 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-15005 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-36237 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-20901 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2017-18097 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-41312 | anchore_cve | High | jira-dmz-api-8.13.6 |
CVE-2017-18098 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-41307 | anchore_cve | High | jira-projects-api-6.0.12 |
CVE-2021-39111 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2019-20412 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-41304 | anchore_cve | Medium | jira-configurator-8.13.6 |
CVE-2019-11587 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2018-13402 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2016-4319 | anchore_cve | High | jira-mobile-rest-3.1.2 |
CVE-2020-36235 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-26081 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2018-5231 | anchore_cve | High | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-14173 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-14178 | anchore_cve | High | jira-mobile-rest-3.1.2 |
CVE-2021-39118 | anchore_cve | Medium | jira-languages-8.13.6 |
CVE-2020-14164 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2018-13402 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2008-6531 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2015-9251 | anchore_cve | Medium | jquery-2.2.4.7 |
CVE-2017-16863 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2019-20402 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2018-5231 | anchore_cve | High | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2015-5237 | anchore_cve | High | protobuf-java-3.0.2 |
CVE-2019-20409 | anchore_cve | Critical | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-13959 | anchore_cve | Medium | velocity-tools-1.3 |
CVE-2017-18098 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-20901 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-45046 | anchore_cve | Critical | log4j2-stacktrace-origins-2.2-atlassian-2 |
CVE-2021-39111 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-36237 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2017-18100 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2020-11023 | anchore_cve | Medium | jquery-2.2.4.7 |
CVE-2020-14167 | anchore_cve | High | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-39119 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-39127 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2018-5232 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2017-7658 | anchore_cve | Critical | jetty-continuation-8.1.15.v20140411 |
CVE-2017-7658 | anchore_cve | Critical | jetty-server-8.1.15.v20140411 |
CVE-2007-6618 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-43947 | anchore_cve | High | jira-api-8.13.6 |
CVE-2020-14174 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-36287 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2018-13400 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2017-18104 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-14169 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2017-16865 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-20414 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-20413 | anchore_cve | High | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2012-2928 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-10519 | anchore_cve | High | org.eclipse.egit.github.core-2.1.2 |
CVE-2016-1182 | anchore_cve | High | struts-tiles-1.3.8 |
CVE-2019-20106 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2019-20417 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2020-14173 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-20898 | anchore_cve | High | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-26069 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-20402 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-41312 | anchore_cve | High | jira-configurator-8.13.6 |
CVE-2020-14185 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2017-18097 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-8442 | anchore_cve | High | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-26070 | anchore_cve | High | jira-ical-feed-1.5.0 |
CVE-2017-7656 | anchore_cve | High | jetty-servlet-8.1.15.v20140411 |
CVE-2021-41307 | anchore_cve | High | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-4029 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-36289 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-14165 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-39119 | anchore_cve | Medium | jira-dmz-api-8.13.6 |
CVE-2012-2926 | anchore_cve | Critical | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2017-18100 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-43947 | anchore_cve | High | jira-lucene-dmz-8.13.6 |
CVE-2017-7657 | anchore_cve | Critical | jetty-continuation-8.1.15.v20140411 |
CVE-2021-26083 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2017-18113 | anchore_cve | High | jira-api-8.13.6 |
CVE-2019-20901 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-41306 | anchore_cve | High | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-26075 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-39117 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-14165 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2017-14594 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2014-2313 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-39118 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-26079 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-11586 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-8442 | anchore_cve | High | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-28165 | anchore_cve | High | jetty-util-8.1.15.v20140411 |
CVE-2021-41308 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-4021 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2018-13391 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-41312 | anchore_cve | High | jira-less-integration-8.13.6 |
CVE-2018-13391 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-14185 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-39127 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2018-13387 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-39117 | anchore_cve | Medium | jira-languages-8.13.6 |
CVE-2018-13403 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-26081 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2019-20409 | anchore_cve | Critical | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-41305 | anchore_cve | High | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-4028 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-4025 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2018-20824 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-28169 | anchore_cve | Medium | jetty-servlet-8.1.15.v20140411 |
CVE-2020-4024 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-36237 | anchore_cve | Medium | jira-languages-8.13.6 |
CVE-2017-16864 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2019-20898 | anchore_cve | High | jira-mobile-rest-3.1.2 |
CVE-2019-8449 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-41305 | anchore_cve | High | jira-software-application-8.13.6 |
CVE-2017-16865 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-14164 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2007-6617 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2017-16863 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2019-20899 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-14169 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-43947 | anchore_cve | High | jira-ical-feed-1.5.0 |
CVE-2020-4025 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
GHSA-65fg-84f6-3jq3 | anchore_cve | Critical | log4j-1.2.17-atlassian-3 |
CVE-2019-20898 | anchore_cve | High | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-14178 | anchore_cve | High | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-29451 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-39127 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2007-6618 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2008-6531 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-39124 | anchore_cve | Medium | jira-dmz-api-8.13.6 |
CVE-2021-26070 | anchore_cve | High | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-41308 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2018-13402 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-39113 | anchore_cve | High | jira-less-integration-8.13.6 |
CVE-2017-16865 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2018-20232 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2012-2928 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-4028 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2018-20824 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-20402 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-8449 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2018-13401 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2018-13400 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-39118 | anchore_cve | Medium | jira-rest-api-8.13.6 |
CVE-2019-3399 | anchore_cve | High | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2017-18113 | anchore_cve | High | jira-mobile-rest-3.1.2 |
CVE-2020-14169 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-41305 | anchore_cve | High | jira-languages-8.13.6 |
CVE-2019-20416 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-20898 | anchore_cve | High | jira-ical-feed-1.5.0 |
CVE-2019-3402 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-41306 | anchore_cve | High | jira-configurator-8.13.6 |
CVE-2021-26083 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2007-6619 | anchore_cve | High | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-41305 | anchore_cve | High | jira-lucene-dmz-8.13.6 |
CVE-2020-14167 | anchore_cve | High | jira-projects-api-6.0.12 |
CVE-2017-18113 | anchore_cve | High | jira-less-integration-8.13.6 |
CVE-2021-26078 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-36286 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-14164 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-20417 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2017-14594 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2013-5319 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-39123 | anchore_cve | High | jira-configurator-8.13.6 |
CVE-2021-41307 | anchore_cve | High | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2019-20408 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-39123 | anchore_cve | High | jira-languages-8.13.6 |
CVE-2019-20413 | anchore_cve | High | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-39124 | anchore_cve | Medium | jira-lucene-dmz-8.13.6 |
CVE-2018-20232 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2018-10237 | anchore_cve | Medium | guava-rate-limiter-15.0-atlassian-1 |
CVE-2018-20826 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2018-13395 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-11587 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-41306 | anchore_cve | High | jira-api-8.13.6 |
CVE-2019-20415 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2017-18101 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2019-15013 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-20101 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-41305 | anchore_cve | High | jira-languages-8.13.6 |
CVE-2021-26079 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2016-4318 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-20408 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-11586 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-41307 | anchore_cve | High | jira-dmz-api-8.13.6 |
CVE-2018-13387 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-14174 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-36235 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2019-15013 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-39124 | anchore_cve | Medium | jira-languages-8.13.6 |
CVE-2017-16862 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-3401 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-36286 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2017-16863 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-39123 | anchore_cve | High | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-36234 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-26082 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2016-1182 | anchore_cve | High | struts-taglib-1.3.8 |
CVE-2021-39112 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-4029 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-11584 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2013-5319 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2018-13403 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-4029 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2012-2926 | anchore_cve | Critical | jira-mobile-rest-3.1.2 |
CVE-2020-14174 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-36231 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2014-0114 | anchore_cve | High | struts-core-1.3.8 |
CVE-2021-41306 | anchore_cve | High | jira-mobile-rest-3.1.2 |
CVE-2020-36238 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2019-8449 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2020-27216 | anchore_cve | High | jetty-server-8.1.15.v20140411 |
CVE-2007-6618 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-20101 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-20402 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-36286 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-41312 | anchore_cve | High | jira-languages-8.13.6 |
CVE-2021-28657 | anchore_cve | Medium | tika-core-1.22 |
CVE-2021-39117 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2017-18113 | anchore_cve | High | jira-software-application-8.13.6 |
CVE-2020-14165 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2008-6531 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-4029 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2017-16863 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-39113 | anchore_cve | High | jira-lucene-dmz-8.13.6 |
CVE-2020-14164 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-36231 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2018-13404 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2017-18033 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2017-18104 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-27216 | anchore_cve | High | jetty-security-8.1.15.v20140411 |
CVE-2020-14165 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-4024 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-15013 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-26082 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-20416 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2019-20408 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
GHSA-w9p3-5cr8-m3jj | anchore_cve | High | log4j-1.2.17-atlassian-3 |
CVE-2020-14169 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-39112 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-39113 | anchore_cve | High | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2019-11584 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2018-20824 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2017-18113 | anchore_cve | High | jira-lucene-dmz-8.13.6 |
CVE-2020-14178 | anchore_cve | High | jira-ical-feed-1.5.0 |
CVE-2012-5817 | anchore_cve | Medium | xfire-aegis-1.2.6 |
CVE-2017-18100 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-39122 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-3402 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-41306 | anchore_cve | High | jira-languages-8.13.6 |
CVE-2017-18033 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-26078 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-39118 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-20412 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-36289 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-26076 | anchore_cve | Low | jira-mobile-rest-3.1.2 |
CVE-2019-3401 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2017-18113 | anchore_cve | High | jira-languages-8.13.6 |
CVE-2020-27216 | anchore_cve | High | jetty-http-8.1.15.v20140411 |
CVE-2021-39121 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-3399 | anchore_cve | High | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2017-7656 | anchore_cve | High | jetty-http-8.1.15.v20140411 |
CVE-2019-20414 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-4024 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-36236 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-4024 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2014-2314 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-34428 | anchore_cve | Low | jetty-security-8.1.15.v20140411 |
CVE-2021-28169 | anchore_cve | Medium | jetty-server-8.1.15.v20140411 |
CVE-2021-39117 | anchore_cve | Medium | jira-languages-8.13.6 |
CVE-2017-9735 | anchore_cve | High | jetty-continuation-8.1.15.v20140411 |
CVE-2007-6618 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-36234 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2007-6619 | anchore_cve | High | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-39118 | anchore_cve | Medium | jira-software-application-8.13.6 |
CVE-2019-11585 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-8449 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-41306 | anchore_cve | High | jira-less-integration-8.13.6 |
CVE-2020-1950 | anchore_cve | Medium | tika-core-1.22 |
CVE-2020-36289 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2014-2314 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-20418 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2016-4318 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2017-9735 | anchore_cve | High | jetty-server-8.1.15.v20140411 |
CVE-2020-10518 | anchore_cve | High | org.eclipse.egit.github.core-2.1.5 |
CVE-2021-39111 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-3402 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-28169 | anchore_cve | Medium | jetty-continuation-8.1.15.v20140411 |
CVE-2019-11585 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-36231 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2019-20412 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-4024 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2020-36288 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-20414 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-41312 | anchore_cve | High | jira-api-8.13.6 |
CVE-2016-0956 | anchore_cve | High | org.apache.sling.commons.osgi-2.0.4-incubator |
CVE-2020-14169 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2020-14172 | anchore_cve | Critical | jira-mobile-rest-3.1.2 |
CVE-2020-14167 | anchore_cve | High | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-39123 | anchore_cve | High | jira-lucene-dmz-8.13.6 |
CVE-2021-26069 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-39117 | anchore_cve | Medium | jira-lucene-dmz-8.13.6 |
CVE-2017-18098 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2020-14172 | anchore_cve | Critical | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2018-5230 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-20411 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-36237 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2018-13387 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-44832 | anchore_cve | Medium | log4j2-stacktrace-origins-2.2-atlassian-2 |
CVE-2020-36234 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2017-18100 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-39121 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2017-7656 | anchore_cve | High | jetty-io-8.1.15.v20140411 |
CVE-2019-3403 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-10519 | anchore_cve | High | org.eclipse.egit.github.core-2.1.5 |
CVE-2019-20897 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-26081 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-36235 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2018-13403 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2017-18113 | anchore_cve | High | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-39117 | anchore_cve | Medium | jira-rest-api-8.13.6 |
CVE-2021-41307 | anchore_cve | High | jira-lucene-dmz-8.13.6 |
CVE-2016-6285 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-20897 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-14167 | anchore_cve | High | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2017-16864 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-20410 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-26075 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-36237 | anchore_cve | Medium | jira-api-8.13.6 |
CVE-2016-4319 | anchore_cve | High | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-26083 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-14173 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2018-13404 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-26071 | anchore_cve | Low | jira-projects-api-6.0.12 |
CVE-2021-43947 | anchore_cve | High | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2017-16864 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2019-20409 | anchore_cve | Critical | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-39123 | anchore_cve | High | jira-dmz-api-8.13.6 |
CVE-2021-41304 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2018-13403 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-14178 | anchore_cve | High | jira-projects-api-6.0.12 |
CVE-2021-39122 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-39113 | anchore_cve | High | jira-rest-api-8.13.6 |
CVE-2019-20899 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-20898 | anchore_cve | High | jira-projects-api-6.0.12 |
CVE-2021-26081 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2020-36237 | anchore_cve | Medium | jira-dmz-api-8.13.6 |
CVE-2020-36288 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-27216 | anchore_cve | High | jetty-io-8.1.15.v20140411 |
CVE-2019-20899 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-43947 | anchore_cve | High | jira-dmz-api-8.13.6 |
CVE-2019-8449 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2016-6285 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2018-5232 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-36231 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-41312 | anchore_cve | High | jira-software-application-8.13.6 |
CVE-2021-26081 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-39121 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-14183 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-43947 | anchore_cve | High | jira-less-integration-8.13.6 |
CVE-2017-9735 | anchore_cve | High | jetty-servlet-8.1.15.v20140411 |
CVE-2021-41306 | anchore_cve | High | jira-lucene-dmz-8.13.6 |
CVE-2019-3403 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-4022 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2017-16862 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2017-16863 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-39124 | anchore_cve | Medium | jira-rest-api-8.13.6 |
CVE-2021-39113 | anchore_cve | High | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2018-5232 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2017-18100 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-36287 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2018-13400 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-14167 | anchore_cve | High | jira-ical-feed-1.5.0 |
CVE-2017-14594 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-41312 | anchore_cve | High | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-4022 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2017-18104 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-34428 | anchore_cve | Low | jetty-util-8.1.15.v20140411 |
CVE-2017-18113 | anchore_cve | High | jira-dmz-api-8.13.6 |
CVE-2021-43947 | anchore_cve | High | jira-mobile-rest-3.1.2 |
CVE-2019-20411 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-36288 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2017-7658 | anchore_cve | Critical | jetty-security-8.1.15.v20140411 |
CVE-2021-39127 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-36287 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-26082 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-41307 | anchore_cve | High | jira-ical-feed-1.5.0 |
CVE-2018-5230 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-15013 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-28169 | anchore_cve | Medium | jetty-util-8.1.15.v20140411 |
CVE-2019-20417 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2017-7658 | anchore_cve | Critical | jetty-http-8.1.15.v20140411 |
CVE-2021-26075 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2007-6617 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-39113 | anchore_cve | High | jira-ical-feed-1.5.0 |
CVE-2018-5231 | anchore_cve | High | jira-mobile-rest-3.1.2 |
CVE-2018-13400 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2012-2926 | anchore_cve | Critical | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2019-20898 | anchore_cve | High | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-39124 | anchore_cve | Medium | jira-less-integration-8.13.6 |
CVE-2021-28169 | anchore_cve | Medium | jetty-http-8.1.15.v20140411 |
CVE-2021-39112 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-36237 | anchore_cve | Medium | jira-software-application-8.13.6 |
CVE-2007-6617 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2017-18033 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-39123 | anchore_cve | High | jira-mobile-rest-3.1.2 |
CVE-2020-36286 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-43947 | anchore_cve | High | jira-configurator-8.13.6 |
CVE-2021-26083 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2012-2926 | anchore_cve | Critical | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-20106 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-8442 | anchore_cve | High | jira-projects-api-6.0.12 |
CVE-2016-0956 | anchore_cve | High | org.apache.sling.commons.osgi-2.0.4-incubator |
CVE-2007-2379 | anchore_cve | Medium | jquery-2.2.4.7 |
CVE-2019-20418 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2017-9735 | anchore_cve | High | jetty-util-8.1.15.v20140411 |
CVE-2021-26076 | anchore_cve | Low | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2018-20826 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2020-36237 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2017-8806 | anchore_cve | Medium | postgresql-42.2.16 |
CVE-2015-9251 | anchore_cve | Medium | jquery-2.2.4.7 |
CVE-2020-36238 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2018-13401 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2020-36237 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-39117 | anchore_cve | Medium | jira-software-application-8.13.6 |
CVE-2019-20417 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-4029 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-1951 | anchore_cve | Medium | tika-core-1.22 |
CVE-2020-36238 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2019-20415 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2019-8443 | anchore_cve | High | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2020-4025 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2020-36234 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-39123 | anchore_cve | High | jira-rest-api-8.13.6 |
CVE-2017-18113 | anchore_cve | High | jira-languages-8.13.6 |
CVE-2020-29451 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2016-4319 | anchore_cve | High | jira-ical-feed-1.5.0 |
CVE-2017-18097 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2020-36236 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2018-5231 | anchore_cve | High | jira-ical-feed-1.5.0 |
CVE-2019-11583 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2019-20101 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2019-3403 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2020-11023 | anchore_cve | Medium | jquery-2.2.4.7 |
CVE-2021-39117 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2018-13391 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-43859 | twistlock_cve | High | com.thoughtworks.xstream_xstream-1.4.15 |
CVE-2021-43953 | anchore_cve | Medium | jira-configurator-8.13.6 |
CVE-2021-43953 | anchore_cve | Medium | jira-api-8.13.6 |
CVE-2021-43953 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
GHSA-w9p3-5cr8-m3jj | anchore_cve | High | log4j-1.2.17 |
GHSA-mc84-pj99-q6hh | anchore_cve | High | commons-compress-1.18 |
CVE-2021-43953 | anchore_cve | Medium | jira-languages-8.13.6 |
CVE-2022-23307 | anchore_cve | High | log4j-1.2.17 |
GHSA-w9p3-5cr8-m3jj | anchore_cve | High | log4j-1.2.17 |
CVE-2021-43953 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-43953 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
GHSA-7hfm-57qf-j43q | anchore_cve | High | commons-compress-1.18 |
GHSA-fg2v-w576-w4v3 | anchore_cve | High | json-smart-1.3.1 |
CVE-2021-43953 | anchore_cve | Medium | jira-projects-api-6.0.12 |
GHSA-65fg-84f6-3jq3 | anchore_cve | Critical | log4j-1.2.17 |
GHSA-rmr5-cpv2-vgjf | anchore_cve | High | xstream-1.4.15 |
GHSA-fg2v-w576-w4v3 | anchore_cve | High | json-smart-1.3.1 |
CVE-2022-23307 | anchore_cve | High | log4j-1.2.17 |
GHSA-w9p3-5cr8-m3jj | anchore_cve | High | log4j-1.2.17 |
CVE-2021-43953 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
GHSA-65fg-84f6-3jq3 | anchore_cve | Critical | log4j-1.2.17 |
CVE-2022-23307 | anchore_cve | High | log4j-1.2.17 |
CVE-2021-43953 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-43953 | anchore_cve | Medium | jira-rest-api-8.13.6 |
CVE-2021-43953 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
GHSA-xqfj-vm6h-2x34 | anchore_cve | High | commons-compress-1.18 |
GHSA-fp5r-v3w9-4333 | anchore_cve | High | log4j-1.2.17 |
GHSA-65fg-84f6-3jq3 | anchore_cve | Critical | log4j-1.2.17 |
CVE-2021-43953 | anchore_cve | Medium | jira-less-integration-8.13.6 |
CVE-2021-43953 | anchore_cve | Medium | jira-languages-8.13.6 |
CVE-2021-43953 | anchore_cve | Medium | jira-software-application-8.13.6 |
GHSA-crv7-7245-f45f | anchore_cve | High | commons-compress-1.18 |
CVE-2021-43953 | anchore_cve | Medium | jira-lucene-dmz-8.13.6 |
GHSA-rmr5-cpv2-vgjf | anchore_cve | High | xstream-1.4.15 |
GHSA-rmr5-cpv2-vgjf | anchore_cve | High | xstream-1.4.15 |
GHSA-fp5r-v3w9-4333 | anchore_cve | High | log4j-1.2.17 |
CVE-2021-22570 | anchore_cve | Medium | protobuf-java-3.0.2 |
GHSA-fp5r-v3w9-4333 | anchore_cve | High | log4j-1.2.17 |
GHSA-rmr5-cpv2-vgjf | anchore_cve | High | xstream-1.4.15 |
GHSA-fg2v-w576-w4v3 | anchore_cve | High | json-smart-1.3.1 |
CVE-2021-43953 | anchore_cve | Medium | jira-dmz-api-8.13.6 |
CVE-2021-43945 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-api-0.28 |
CVE-2021-43945 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-factory-0.28 |
CVE-2021-43945 | anchore_cve | Medium | jira-less-integration-8.13.6 |
CVE-2021-43945 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-63-0.28 |
CVE-2021-43945 | anchore_cve | Medium | jira-ical-feed-1.5.0 |
CVE-2021-43945 | anchore_cve | Medium | jira-rest-api-8.13.6 |
CVE-2021-43945 | anchore_cve | Medium | jira-api-8.13.6 |
CVE-2021-43945 | anchore_cve | Medium | jira-languages-8.13.6 |
CVE-2021-43945 | anchore_cve | Medium | jira-lucene-dmz-8.13.6 |
CVE-2021-43945 | anchore_cve | Medium | jira-cross-compatibility-lib-bridge-70-0.28 |
CVE-2021-43945 | anchore_cve | Medium | jira-projects-api-6.0.12 |
CVE-2021-43945 | anchore_cve | Medium | jira-languages-8.13.6 |
CVE-2021-43945 | anchore_cve | Medium | jira-software-application-8.13.6 |
CVE-2021-43945 | anchore_cve | Medium | jira-mobile-rest-3.1.2 |
CVE-2021-43945 | anchore_cve | Medium | jira-dmz-api-8.13.6 |
CVE-2021-43945 | anchore_cve | Medium | jira-configurator-8.13.6 |
CVE-2020-36518 | twistlock_cve | High | com.fasterxml.jackson.core_jackson-databind-2.10.0 |
CVE-2020-36518 | twistlock_cve | High | com.fasterxml.jackson.core_jackson-databind-2.10.2 |
CVE-2020-36518 | twistlock_cve | High | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2020-36518 | twistlock_cve | High | com.fasterxml.jackson.core_jackson-databind-2.10.3 |
GHSA-57j2-w4cx-62h2 | anchore_cve | High | jackson-databind-2.10.2 |
GHSA-57j2-w4cx-62h2 | anchore_cve | High | jackson-databind-2.3.3 |
GHSA-57j2-w4cx-62h2 | anchore_cve | High | jackson-databind-2.10.3 |
GHSA-57j2-w4cx-62h2 | anchore_cve | High | jackson-databind-2.10.0 |
CVE-2022-22965 | twistlock_cve | Critical | org.springframework_spring-core-5.1.18 |
CVE-2020-9493 | twistlock_cve | Critical | log4j_log4j-1.2.17-atlassian-3 |
CVE-2020-9493 | twistlock_cve | Critical | log4j_log4j-1.2.17 |
CVE-2020-9493 | anchore_cve | Critical | log4j-1.2.17 |
CVE-2020-9493 | anchore_cve | Critical | log4j-1.2.17-atlassian-3 |
CVE-2020-9493 | anchore_cve | Critical | log4j-1.2.17 |
CVE-2017-5645 | anchore_cve | Critical | log4j2-stacktrace-origins-2.2-atlassian-2 |
CVE-2020-9493 | anchore_cve | Critical | log4j-1.2.17 |
CVE-2022-22965 | twistlock_cve | Critical | org.springframework_spring-beans-5.1.18 |
GHSA-vp37-2f9p-3vr3 | anchore_cve | Medium | antisamy-1.5.8 |
GHSA-3pqg-4rqg-pg9g | anchore_cve | Medium | antisamy-1.5.8 |
GHSA-vp37-2f9p-3vr3 | anchore_cve | Medium | antisamy-1.5.8 |
GHSA-3pqg-4rqg-pg9g | anchore_cve | Medium | antisamy-1.5.8 |
CVE-2021-25329 | anchore_cve | High | tomcat-jdbc-8.5.60 |
CVE-2021-42340 | anchore_cve | High | tomcat-jdbc-8.5.60 |
CVE-2021-41079 | anchore_cve | High | tomcat-jdbc-8.5.60 |
CVE-2020-9484 | anchore_cve | High | tomcat-jdbc-8.5.60 |
CVE-2016-6325 | anchore_cve | High | tomcat-jdbc-8.5.60 |
CVE-2016-5425 | anchore_cve | High | tomcat-jdbc-8.5.60 |
CVE-2022-23181 | anchore_cve | High | tomcat-jdbc-8.5.60 |
CVE-2020-8022 | anchore_cve | High | tomcat-jdbc-8.5.60 |
CVE-2021-33037 | anchore_cve | Medium | tomcat-jdbc-8.5.60 |
CVE-2021-25122 | anchore_cve | High | tomcat-jdbc-8.5.60 |
CVE-2021-30640 | anchore_cve | Medium | tomcat-jdbc-8.5.60 |
CVE-2022-25647 | anchore_cve | High | gson-2.2.2-atlassian-1 |
CVE-2022-25647 | anchore_cve | High | gson-2.2.2-atlassian-1 |
CVE-2022-25647 | anchore_cve | High | gson-2.2.2 |
CVE-2022-25647 | anchore_cve | High | gson-2.2.2-atlassian-1 |
CVE-2022-25647 | anchore_cve | High | gson-2.2.2-atlassian-1 |
CVE-2022-25647 | anchore_cve | High | gson-2.3.1 |
CVE-2022-25647 | anchore_cve | High | gson-2.3.1 |
CVE-2022-29885 | twistlock_cve | High | apache tomcat-8.5.60 |
GHSA-4jrv-ppp4-jm57 | anchore_cve | High | gson-2.8.5 |
GHSA-4jrv-ppp4-jm57 | anchore_cve | High | gson-2.8.5 |
CVE-2022-29885 | anchore_cve | High | tomcat-jdbc-8.5.60 |
GHSA-4jrv-ppp4-jm57 | anchore_cve | High | gson-2.8.5 |
GHSA-4jrv-ppp4-jm57 | anchore_cve | High | gson-2.8.5 |
CVE-2022-25762 | twistlock_cve | High | apache tomcat-8.5.60 |
GHSA-pjch-4g28-fxx7 | anchore_cve | Critical | imageio-metadata-3.4.1 |
CVE-2022-30126 | twistlock_cve | Medium | org.apache.tika_tika-core-1.22 |
CVE-2022-25169 | twistlock_cve | Medium | org.apache.tika_tika-core-1.22 |
CVE-2022-25169 | anchore_cve | Medium | tika-core-1.22 |
CVE-2022-25762 | anchore_cve | High | tomcat-jdbc-8.5.60 |
CVE-2022-30126 | anchore_cve | Medium | tika-core-1.22 |
CVE-2022-30973 | twistlock_cve | Medium | org.apache.tika_tika-core-1.22 |
CVE-2022-30973 | anchore_cve | Medium | tika-core-1.22 |
CVE-2021-23792 | twistlock_cve | Critical | com.twelvemonkeys.imageio_imageio-metadata-3.4.1 |
CVE-2020-10683 | twistlock_cve | Critical | dom4j_dom4j-1.4 |
CVE-2017-7657 | twistlock_cve | Critical | org.eclipse.jetty_jetty-server-8.1.15.v20140411 |
CVE-2022-25647 | twistlock_cve | High | com.google.code.gson_gson-2.2.2-atlassian-1 |
CVE-2022-25647 | twistlock_cve | High | com.google.code.gson_gson-2.2.2 |
CVE-2022-25647 | twistlock_cve | High | com.google.code.gson_gson-2.8.5 |
CVE-2022-25647 | twistlock_cve | High | com.google.code.gson_gson-2.3.1 |
CVE-2022-22970 | twistlock_cve | High | org.springframework_spring-core-5.1.18 |
CVE-2022-22968 | twistlock_cve | High | org.springframework_spring-core-5.1.18 |
CVE-2021-40690 | twistlock_cve | High | org.apache.santuario_xmlsec-2.0.7 |
CVE-2021-40690 | twistlock_cve | High | org.apache.santuario_xmlsec-1.5.6 |
CVE-2021-31684 | twistlock_cve | High | net.minidev_json-smart-1.3.1 |
CVE-2021-22569 | twistlock_cve | High | com.google.protobuf_protobuf-java-3.0.2 |
CVE-2020-13936 | twistlock_cve | High | org.apache.velocity_velocity-1.6.4-atlassian-21 |
CVE-2020-11987 | twistlock_cve | High | org.apache.xmlgraphics_batik-xml-1.10 |
CVE-2020-11987 | twistlock_cve | High | org.apache.xmlgraphics_batik-util-1.10 |
CVE-2018-1000632 | twistlock_cve | High | dom4j_dom4j-1.4 |
CVE-2017-7656 | twistlock_cve | High | org.eclipse.jetty_jetty-server-8.1.15.v20140411 |
CVE-2015-2080 | twistlock_cve | High | org.eclipse.jetty_jetty-server-8.1.15.v20140411 |
CVE-2022-29577 | twistlock_cve | Medium | org.owasp.antisamy_antisamy-1.5.8 |
CVE-2022-28367 | twistlock_cve | Medium | org.owasp.antisamy_antisamy-1.5.8 |
CVE-2022-23437 | twistlock_cve | Medium | xerces_xercesImpl-2.12.1 |
CVE-2022-22971 | twistlock_cve | Medium | org.springframework_spring-core-5.1.18 |
CVE-2021-35043 | twistlock_cve | Medium | org.owasp.antisamy_antisamy-1.5.8 |
CVE-2020-13959 | twistlock_cve | Medium | org.apache.velocity_velocity-tools-1.3 |
CVE-2019-10247 | twistlock_cve | Medium | org.eclipse.jetty_jetty-server-8.1.15.v20140411 |
CVE-2019-10241 | twistlock_cve | Medium | org.eclipse.jetty_jetty-server-8.1.15.v20140411 |
CVE-2021-34428 | twistlock_cve | Low | org.eclipse.jetty_jetty-server-8.1.15.v20140411 |
CVE-2022-34305 | twistlock_cve | Medium | apache tomcat-8.5.60 |
CVE-2022-34305 | anchore_cve | Medium | tomcat-jdbc-8.5.60 |
CVE-2015-0899 | twistlock_cve | High | org.apache.struts_struts-core-1.3.8 |
GHSA-7jw3-5q4w-89qg | anchore_cve | High | struts-core-1.3.8 |
GHSA-5ggr-mpgw-3mgx | anchore_cve | High | struts-core-1.3.8 |
GHSA-cvvx-r33m-v7pq | anchore_cve | High | struts-core-1.3.8 |
CVE-2022-33879 | twistlock_cve | Low | org.apache.tika_tika-core-1.22 |
CVE-2022-2047 | twistlock_cve | Low | org.eclipse.jetty_jetty-http-8.1.15.v20140411 |
GHSA-cj7v-27pg-wf7q | anchore_cve | Low | jetty-http-8.1.15.v20140411 |
CVE-2022-33879 | anchore_cve | Low | tika-core-1.22 |
CVE-2012-5817 | twistlock_cve | Medium | org.codehaus.xfire_xfire-core-1.2.6 |
GHSA-5jc8-8xhv-g8qm | anchore_cve | Medium | xfire-core-1.2.6 |
CVE-2022-2048 | twistlock_cve | High | org.eclipse.jetty_jetty-io-8.1.15.v20140411 |
CVE-2022-31159 | twistlock_cve | High | com.amazonaws_aws-java-sdk-s3-1.11.310 |
CVE-2020-10650 | twistlock_cve | High | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2022-2047 | twistlock_cve | Low | org.eclipse.jetty_jetty-io-8.1.15.v20140411 |
GHSA-rpr3-cw39-3pxh | anchore_cve | High | jackson-databind-2.3.3 |
GHSA-c28r-hw5m-5gv3 | anchore_cve | High | aws-java-sdk-s3-1.11.310 |
PRISMA-2022-0239 | twistlock_cve | High | com.squareup.okhttp3_okhttp-3.5.0 |
CVE-2022-2048 | anchore_cve | High | jetty-continuation-8.1.15.v20140411 |
CVE-2022-2048 | anchore_cve | High | jetty-security-8.1.15.v20140411 |
CVE-2022-2048 | anchore_cve | High | jetty-http-8.1.15.v20140411 |
CVE-2022-2047 | anchore_cve | Low | jetty-server-8.1.15.v20140411 |
CVE-2022-2047 | anchore_cve | Low | jetty-io-8.1.15.v20140411 |
CVE-2022-2048 | anchore_cve | High | jetty-io-8.1.15.v20140411 |
CVE-2022-2048 | anchore_cve | High | jetty-util-8.1.15.v20140411 |
CVE-2022-2047 | anchore_cve | Low | jetty-security-8.1.15.v20140411 |
CVE-2022-2047 | anchore_cve | Low | jetty-continuation-8.1.15.v20140411 |
CVE-2022-2048 | anchore_cve | High | jetty-server-8.1.15.v20140411 |
CVE-2022-2048 | anchore_cve | High | jetty-servlet-8.1.15.v20140411 |
CVE-2022-2047 | anchore_cve | Low | jetty-util-8.1.15.v20140411 |
CVE-2022-2047 | anchore_cve | Low | jetty-servlet-8.1.15.v20140411 |
CVE-2016-1000027 | anchore_cve | Critical | spring-core-5.1.18.release |
CVE-2022-22965 | anchore_cve | Critical | spring-core-5.1.18.release |
CVE-2022-22968 | anchore_cve | Medium | spring-core-5.1.18.release |
CVE-2022-22950 | anchore_cve | Medium | spring-core-5.1.18.release |
CVE-2022-22970 | anchore_cve | Medium | spring-core-5.1.18.release |
CVE-2022-26137 | anchore_cve | High | crowd-common-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-server-api-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-events-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-core-tiny-4.1.6 |
CVE-2022-26137 | anchore_cve | High | crowd-persistence-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-ldap-4.1.6 |
CVE-2022-26137 | anchore_cve | High | crowd-core-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-integration-seraph-4.1.6 |
CVE-2022-26137 | anchore_cve | High | crowd-rest-common-4.1.6 |
CVE-2022-26137 | anchore_cve | High | crowd-api-4.1.6 |
CVE-2022-26137 | anchore_cve | High | crowd-integration-client-rest-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-integration-client-common-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-api-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-rest-common-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-core-4.1.6 |
CVE-2022-26137 | anchore_cve | High | crowd-server-common-4.1.6 |
CVE-2022-26137 | anchore_cve | High | crowd-query-language-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-integration-client-rest-4.1.6 |
CVE-2022-26137 | anchore_cve | High | crowd-ldap-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-remote-4.1.6 |
CVE-2022-26137 | anchore_cve | High | crowd-integration-seraph-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-azure-ad-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-server-common-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-query-language-4.1.6 |
CVE-2022-26137 | anchore_cve | High | crowd-integration-api-4.1.6 |
CVE-2022-26137 | anchore_cve | High | crowd-rest-common-4.1.6 |
CVE-2022-26137 | anchore_cve | High | crowd-integration-client-common-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-password-encoders-4.1.6 |
CVE-2022-26137 | anchore_cve | High | crowd-events-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-rest-common-4.1.6 |
CVE-2022-26137 | anchore_cve | High | crowd-remote-4.1.6 |
CVE-2022-26137 | anchore_cve | High | crowd-password-encoders-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-rest-application-management-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-synchronisation-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-integration-api-4.1.6 |
CVE-2022-26137 | anchore_cve | High | crowd-rest-common-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-common-4.1.6 |
CVE-2022-26137 | anchore_cve | High | crowd-rest-application-management-4.1.6 |
CVE-2022-26137 | anchore_cve | High | crowd-azure-ad-4.1.6 |
CVE-2022-26137 | anchore_cve | High | crowd-core-tiny-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-persistence-4.1.6 |
CVE-2022-26137 | anchore_cve | High | crowd-synchronisation-4.1.6 |
CVE-2022-26137 | anchore_cve | High | crowd-server-api-4.1.6 |
CVE-2022-26136 | anchore_cve | Critical | crowd-rest-common-4.1.6 |
CVE-2015-20107 | twistlock_cve | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2021-3733 | twistlock_cve | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2022-0391 | twistlock_cve | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2019-9674 | twistlock_cve | Low | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2021-3737 | twistlock_cve | Low | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2018-20406 | twistlock_cve | Low | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2021-28861 | anchore_cve | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2022-36033 | twistlock_cve | Medium | org.jsoup_jsoup-1.8.3 |
GHSA-gp7f-rwcx-9369 | anchore_cve | Medium | jsoup-1.8.3 |
GHSA-gp7f-rwcx-9369 | anchore_cve | Medium | jsoup-1.8.3 |
GHSA-gp7f-rwcx-9369 | anchore_cve | Medium | jsoup-1.8.3 |
CVE-2020-10735 | twistlock_cve | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
VAT: https://vat.dso.mil/vat/container/10562?branch=master
More information can be found in the failed pipeline located here: https://repo1.dso.mil/dsop/atlassian/jira-node-813/-/jobs/9125994
Definition of Done
Justifications:
-
All findings have been justified -
Justifications have been provided to the container hardening team
Approval Process:
-
Findings Approver has reviewed and approved all justifications -
Approval request has been sent to Authorizing Official -
Approval request has been processed by Authorizing Official
Edited by Ghost User