chore(findings): avocado/orchestrator/avocado-web
Summary
avocado/orchestrator/avocado-web has 471 new findings discovered during continuous monitoring.
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=avocado/orchestrator/avocado-web&tag=3.2.18&branch=master
EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.
KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.
id | source | severity | package | impact | workaround | epss_score | kev |
---|---|---|---|---|---|---|---|
CVE-2023-44487 | Twistlock CVE | High | tomcat-embed-core-10.1.5 | 0.94379 | true | ||
CVE-2023-44487 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.94379 | true | ||
CVE-2023-44487 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.94379 | true | ||
CVE-2025-24813 | Anchore CVE | Critical | tomcat-embed-el-10.1.5 | 0.94157 | true | ||
CVE-2025-24813 | Anchore CVE | Critical | tomcat-embed-websocket-10.1.5 | 0.94157 | true | ||
CVE-2025-24813 | Twistlock CVE | Critical | tomcat-embed-core-10.1.5 | 0.94157 | true | ||
CVE-2022-1471 | Twistlock CVE | Critical | org.yaml_snakeyaml-1.33 | 0.93849 | false | ||
CVE-2022-1471 | Twistlock CVE | Critical | org.yaml_snakeyaml-1.29 | 0.93849 | false | ||
CVE-2024-38816 | Twistlock CVE | High | spring-webmvc-6.0.4 | 0.93097 | false | ||
CVE-2024-50379 | Anchore CVE | Critical | tomcat-embed-el-10.1.5 | 0.85716 | false | ||
CVE-2024-50379 | Anchore CVE | Critical | tomcat-embed-websocket-10.1.5 | 0.85716 | false | ||
CVE-2024-50379 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.85716 | false | ||
CVE-2024-38819 | Twistlock CVE | High | spring-webmvc-6.0.4 | 0.64445 | false | ||
CVE-2023-20860 | Twistlock CVE | High | spring-web-6.0.4 | 0.55534 | false | ||
CVE-2023-20860 | Twistlock CVE | High | spring-core-6.0.4 | 0.55534 | false | ||
CVE-2023-20860 | Anchore CVE | High | spring-core-6.0.4 | 0.55534 | false | ||
CVE-2024-22243 | Twistlock CVE | High | spring-web-6.0.4 | 0.48232 | false | ||
CVE-2023-34034 | Twistlock CVE | Critical | spring-security-core-6.0.1 | 0.44571 | false | ||
CVE-2023-34034 | Twistlock CVE | Critical | spring-security-config-6.0.1 | 0.44571 | false | ||
CVE-2023-34034 | Anchore CVE | Critical | spring-security-core-6.0.1 | 0.44571 | false | ||
CVE-2024-24549 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.42098 | false | ||
CVE-2024-24549 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.42098 | false | ||
CVE-2024-24549 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.42098 | false | ||
CVE-2023-46589 | Twistlock CVE | High | tomcat-embed-core-10.1.5 | 0.37658 | false | ||
CVE-2023-46589 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.37658 | false | ||
CVE-2023-46589 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.37658 | false | ||
CVE-2024-22259 | Twistlock CVE | Low | spring-web-6.0.4 | 0.30512 | false | ||
CVE-2024-22259 | Twistlock CVE | Low | spring-core-6.0.4 | 0.30512 | false | ||
CVE-2024-22259 | Anchore CVE | High | spring-core-6.0.4 | 0.30512 | false | ||
CVE-2023-34040 | Twistlock CVE | High | org.springframework.kafka_spring-kafka-3.0.2 | 0.21443 | false | ||
CVE-2024-34750 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.17458 | false | ||
CVE-2024-34750 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.17458 | false | ||
CVE-2024-34750 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.17458 | false | ||
CVE-2024-38821 | Twistlock CVE | Critical | spring-security-web-6.0.1 | 0.14554 | false | ||
CVE-2022-34169 | Twistlock CVE | High | java-1.8.0_211 | 0.11680 | false | ||
CVE-2017-9096 | Twistlock CVE | High | com.lowagie_itext-2.1.7.js10 | 0.10980 | false | ||
CVE-2023-41080 | Twistlock CVE | Medium | tomcat-embed-core-10.1.5 | 0.10593 | false | ||
CVE-2023-41080 | Anchore CVE | Medium | tomcat-embed-websocket-10.1.5 | 0.10593 | false | ||
CVE-2023-41080 | Anchore CVE | Medium | tomcat-embed-el-10.1.5 | 0.10593 | false | ||
CVE-2024-56337 | Anchore CVE | Critical | tomcat-embed-el-10.1.5 | 0.10366 | false | ||
CVE-2024-56337 | Anchore CVE | Critical | tomcat-embed-websocket-10.1.5 | 0.10366 | false | ||
CVE-2024-56337 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.10366 | false | ||
CVE-2022-21340 | Twistlock CVE | Medium | java-1.8.0_211 | 0.08274 | false | ||
CVE-2024-22262 | Twistlock CVE | High | spring-web-6.0.4 | 0.04703 | false | ||
CVE-2024-54677 | Anchore CVE | Medium | tomcat-embed-websocket-10.1.5 | 0.03412 | false | ||
CVE-2024-54677 | Anchore CVE | Medium | tomcat-embed-el-10.1.5 | 0.03412 | false | ||
CVE-2024-54677 | Anchore CVE | Medium | tomcat-embed-core-10.1.5 | 0.03412 | false | ||
CVE-2024-54677 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.03412 | false | ||
CVE-2020-26939 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.52.0 | 0.02351 | false | ||
CVE-2023-34035 | Twistlock CVE | High | spring-security-config-6.0.1 | 0.02176 | false | ||
CVE-2023-34035 | Twistlock CVE | Medium | spring-security-core-6.0.1 | 0.02176 | false | ||
CVE-2023-34035 | Anchore CVE | Medium | spring-security-core-6.0.1 | 0.02176 | false | ||
CVE-2020-2604 | Twistlock CVE | High | java-1.8.0_211 | 0.01865 | false | ||
CVE-2020-7226 | Twistlock CVE | High | org.cryptacular_cryptacular-1.1.0 | 0.01648 | false | ||
CVE-2023-21939 | Twistlock CVE | Low | java-17.0.5 | 0.01490 | false | ||
CVE-2023-21939 | Anchore CVE | Medium | jdk-17.0.5 | 0.01490 | false | ||
CVE-2019-2766 | Twistlock CVE | Low | java-1.8.0_211 | 0.01448 | false | ||
CVE-2024-38286 | Anchore CVE | High | tomcat-embed-core-10.1.5 | 0.01287 | false | ||
CVE-2024-38286 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.01287 | false | ||
CVE-2024-38286 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.01287 | false | ||
CVE-2024-38286 | Twistlock CVE | High | tomcat-embed-core-10.1.5 | 0.01287 | false | ||
CVE-2020-2805 | Twistlock CVE | High | java-1.8.0_211 | 0.01100 | false | ||
CVE-2023-22102 | Twistlock CVE | High | com.mysql_mysql-connector-j-8.0.32 | 0.00901 | false | ||
CVE-2023-34453 | Twistlock CVE | Medium | org.xerial.snappy_snappy-java-1.1.8.4 | 0.00796 | false | ||
CVE-2023-20863 | Twistlock CVE | High | spring-expression-6.0.4 | 0.00756 | false | ||
CVE-2023-20863 | Twistlock CVE | Medium | spring-core-6.0.4 | 0.00756 | false | ||
CVE-2023-20863 | Twistlock CVE | Medium | spring-web-6.0.4 | 0.00756 | false | ||
CVE-2023-20863 | Anchore CVE | Medium | spring-core-6.0.4 | 0.00756 | false | ||
CVE-2024-21147 | Anchore CVE | High | jdk-17.0.5 | 0.00721 | false | ||
CVE-2022-45688 | Twistlock CVE | High | org.json_json-20180813 | 0.00705 | false | ||
CVE-2020-2803 | Twistlock CVE | High | java-1.8.0_211 | 0.00677 | false | ||
CVE-2023-34053 | Twistlock CVE | High | spring-webmvc-6.0.4 | 0.00625 | false | ||
CVE-2023-34053 | Twistlock CVE | High | spring-core-6.0.4 | 0.00625 | false | ||
CVE-2023-34053 | Twistlock CVE | High | spring-web-6.0.4 | 0.00625 | false | ||
CVE-2023-34053 | Anchore CVE | High | spring-core-6.0.4 | 0.00625 | false | ||
CVE-2024-52316 | Anchore CVE | Critical | tomcat-embed-websocket-10.1.5 | 0.00614 | false | ||
CVE-2024-52316 | Anchore CVE | Critical | tomcat-embed-core-10.1.5 | 0.00614 | false | ||
CVE-2024-52316 | Anchore CVE | Critical | tomcat-embed-el-10.1.5 | 0.00614 | false | ||
CVE-2024-52316 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.00614 | false | ||
CVE-2022-40152 | Twistlock CVE | Medium | com.fasterxml.woodstox_woodstox-core-6.2.7 | 0.00567 | false | ||
CVE-2023-7272 | Twistlock CVE | Critical | org.eclipse.parsson_parsson-1.0.0 | 0.00566 | false | ||
CVE-2022-38749 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.29 | 0.00534 | false | ||
CVE-2023-5072 | Twistlock CVE | High | org.json_json-20180813 | 0.00525 | false | ||
CVE-2020-2773 | Twistlock CVE | Low | java-1.8.0_211 | 0.00525 | false | ||
CVE-2023-45648 | Twistlock CVE | Medium | tomcat-embed-core-10.1.5 | 0.00511 | false | ||
CVE-2023-45648 | Anchore CVE | Medium | tomcat-embed-websocket-10.1.5 | 0.00511 | false | ||
CVE-2023-45648 | Anchore CVE | Medium | tomcat-embed-el-10.1.5 | 0.00511 | false | ||
CVE-2025-27819 | Anchore CVE | High | kafka-clients-3.3.2 | 0.00492 | false | ||
CVE-2024-23672 | Twistlock CVE | Medium | tomcat-embed-websocket-10.1.5 | 0.00464 | false | ||
CVE-2024-23672 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.00464 | false | ||
CVE-2024-23672 | Anchore CVE | Medium | tomcat-embed-el-10.1.5 | 0.00464 | false | ||
CVE-2024-23672 | Anchore CVE | Medium | tomcat-embed-core-10.1.5 | 0.00464 | false | ||
CVE-2023-34455 | Twistlock CVE | High | org.xerial.snappy_snappy-java-1.1.8.4 | 0.00447 | false | ||
CVE-2016-1000338 | Twistlock CVE | High | org.bouncycastle_bcprov-jdk15on-1.52.0 | 0.00430 | false | ||
CVE-2024-21217 | Anchore CVE | Low | jdk-17.0.5 | 0.00425 | false | ||
CVE-2024-21140 | Anchore CVE | Medium | jdk-17.0.5 | 0.00419 | false | ||
CVE-2023-20883 | Twistlock CVE | High | spring-boot-autoconfigure-3.0.2 | 0.00409 | false | ||
CVE-2024-21068 | Anchore CVE | Low | jdk-17.0.5 | 0.00398 | false | ||
CVE-2020-2800 | Twistlock CVE | Medium | java-1.8.0_211 | 0.00397 | false | ||
CVE-2023-20862 | Twistlock CVE | Medium | spring-security-core-6.0.1 | 0.00388 | false | ||
CVE-2023-20873 | Twistlock CVE | Critical | spring-boot-actuator-autoconfigure-3.0.2 | 0.00385 | false | ||
CVE-2023-20861 | Twistlock CVE | Medium | spring-web-6.0.4 | 0.00373 | false | ||
CVE-2023-20861 | Twistlock CVE | Medium | spring-expression-6.0.4 | 0.00373 | false | ||
CVE-2023-20861 | Twistlock CVE | Medium | spring-core-6.0.4 | 0.00373 | false | ||
CVE-2023-20861 | Anchore CVE | Medium | spring-core-6.0.4 | 0.00373 | false | ||
CVE-2024-20952 | Anchore CVE | High | jdk-17.0.5 | 0.00347 | false | ||
CVE-2024-20952 | Twistlock CVE | High | java-17.0.5 | 0.00347 | false | ||
CVE-2019-2762 | Twistlock CVE | Medium | java-1.8.0_211 | 0.00341 | false | ||
CVE-2024-21145 | Anchore CVE | Medium | jdk-17.0.5 | 0.00331 | false | ||
CVE-2024-21131 | Anchore CVE | Low | jdk-17.0.5 | 0.00326 | false | ||
CVE-2021-2161 | Twistlock CVE | Medium | java-1.8.0_211 | 0.00325 | false | ||
CVE-2021-35517 | Twistlock CVE | High | org.apache.commons_commons-compress-1.19 | 0.00313 | false | ||
CVE-2023-42795 | Twistlock CVE | Medium | tomcat-embed-core-10.1.5 | 0.00312 | false | ||
CVE-2023-42795 | Anchore CVE | Medium | tomcat-embed-websocket-10.1.5 | 0.00312 | false | ||
CVE-2023-42795 | Anchore CVE | Medium | tomcat-embed-el-10.1.5 | 0.00312 | false | ||
CVE-2021-35516 | Twistlock CVE | High | org.apache.commons_commons-compress-1.19 | 0.00311 | false | ||
CVE-2025-48924 | Twistlock CVE | Medium | org.apache.commons_commons-lang3-3.12.0 | 0.00309 | false | ||
CVE-2024-21094 | Anchore CVE | Low | jdk-17.0.5 | 0.00307 | false | ||
CVE-2024-21235 | Anchore CVE | Medium | jdk-17.0.5 | 0.00304 | false | ||
CVE-2022-25857 | Twistlock CVE | High | org.yaml_snakeyaml-1.29 | 0.00299 | false | ||
CVE-2022-21296 | Twistlock CVE | Medium | java-1.8.0_211 | 0.00296 | false | ||
CVE-2022-21282 | Twistlock CVE | Medium | java-1.8.0_211 | 0.00296 | false | ||
CVE-2024-56128 | Anchore CVE | Medium | kafka-streams-examples-3.8.0 | 0.00295 | false | ||
CVE-2024-56128 | Anchore CVE | Medium | kafka-shell-3.8.0 | 0.00295 | false | ||
CVE-2024-56128 | Anchore CVE | Medium | kafka-clients-3.3.2 | 0.00295 | false | ||
CVE-2024-56128 | Anchore CVE | Medium | kafka-log4j-appender-3.8.0 | 0.00295 | false | ||
CVE-2024-56128 | Anchore CVE | Medium | kafka-clients-3.8.0 | 0.00295 | false | ||
CVE-2024-56128 | Anchore CVE | Medium | kafka-server-common-3.8.0 | 0.00295 | false | ||
CVE-2024-56128 | Anchore CVE | Medium | kafka-tools-api-3.8.0 | 0.00295 | false | ||
CVE-2024-56128 | Anchore CVE | Medium | kafka-storage-api-3.8.0 | 0.00295 | false | ||
CVE-2024-56128 | Anchore CVE | Medium | kafka-metadata-3.8.0 | 0.00295 | false | ||
CVE-2024-56128 | Anchore CVE | Medium | kafka-storage-3.8.0 | 0.00295 | false | ||
CVE-2024-56128 | Anchore CVE | Medium | kafka-streams-test-utils-3.8.0 | 0.00295 | false | ||
CVE-2024-56128 | Anchore CVE | Medium | kafka-raft-3.8.0 | 0.00295 | false | ||
CVE-2024-56128 | Anchore CVE | Medium | kafka-tools-3.8.0 | 0.00295 | false | ||
CVE-2024-56128 | Anchore CVE | Medium | kafka-group-coordinator-3.8.0 | 0.00295 | false | ||
CVE-2024-56128 | Anchore CVE | Medium | kafka-streams-3.8.0 | 0.00295 | false | ||
CVE-2024-56128 | Anchore CVE | Medium | kafka-streams-scala_2.13-3.8.0 | 0.00295 | false | ||
CVE-2023-33201 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.70.0 | 0.00289 | false | ||
CVE-2023-33201 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.52.0 | 0.00289 | false | ||
CVE-2021-36090 | Twistlock CVE | High | org.apache.commons_commons-compress-1.19 | 0.00279 | false | ||
CVE-2024-47554 | Twistlock CVE | Low | commons-io_commons-io-2.11.0 | 0.00266 | false | ||
CVE-2024-22257 | Twistlock CVE | High | spring-security-core-6.0.1 | 0.00264 | false | ||
CVE-2022-21305 | Twistlock CVE | Medium | java-1.8.0_211 | 0.00259 | false | ||
CVE-2024-20918 | Anchore CVE | High | jdk-17.0.5 | 0.00255 | false | ||
CVE-2024-21011 | Anchore CVE | Low | jdk-17.0.5 | 0.00250 | false | ||
CVE-2024-38809 | Twistlock CVE | Medium | spring-web-6.0.4 | 0.00244 | false | ||
CVE-2020-15522 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.52.0 | 0.00243 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-storage-api-3.8.0 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka_2.13-3.8.0 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-storage-3.8.0 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-clients-3.8.0 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-streams-test-utils-3.8.0 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-tools-api-3.8.0 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-shell-3.8.0 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-log4j-appender-3.8.0 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-streams-scala_2.13-3.8.0 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-metadata-3.8.0 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-streams-examples-3.8.0 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-server-common-3.8.0 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-tools-3.8.0 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-streams-3.8.0 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-group-coordinator-3.8.0 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-raft-3.8.0 | 0.00226 | false | ||
CVE-2025-27818 | Anchore CVE | High | kafka-clients-3.3.2 | 0.00226 | false | ||
CVE-2020-2757 | Twistlock CVE | Low | java-1.8.0_211 | 0.00219 | false | ||
CVE-2020-2756 | Twistlock CVE | Low | java-1.8.0_211 | 0.00219 | false | ||
CVE-2024-21208 | Anchore CVE | Low | jdk-17.0.5 | 0.00212 | false | ||
CVE-2024-29857 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.70.0 | 0.00209 | false | ||
CVE-2024-29857 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.52.0 | 0.00209 | false | ||
CVE-2022-38752 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.29 | 0.00209 | false | ||
CVE-2019-2786 | Twistlock CVE | Low | java-1.8.0_211 | 0.00209 | false | ||
CVE-2023-34454 | Twistlock CVE | Medium | org.xerial.snappy_snappy-java-1.1.8.4 | 0.00201 | false | ||
CVE-2024-20921 | Anchore CVE | Medium | jdk-17.0.5 | 0.00199 | false | ||
CVE-2024-7254 | Twistlock CVE | High | protobuf-java-3.23.4 | 0.00189 | false | ||
CVE-2022-21540 | Twistlock CVE | Low | java-1.8.0_211 | 0.00189 | false | ||
CVE-2022-21541 | Twistlock CVE | Low | java-1.8.0_211 | 0.00186 | false | ||
CVE-2023-28708 | Twistlock CVE | Medium | tomcat-embed-core-10.1.5 | 0.00183 | false | ||
CVE-2023-28708 | Anchore CVE | Medium | tomcat-embed-core-10.1.5 | 0.00183 | false | ||
CVE-2023-28708 | Anchore CVE | Medium | tomcat-embed-el-10.1.5 | 0.00183 | false | ||
CVE-2023-28708 | Anchore CVE | Medium | tomcat-embed-websocket-10.1.5 | 0.00183 | false | ||
CVE-2022-21365 | Twistlock CVE | Medium | java-1.8.0_211 | 0.00183 | false | ||
CVE-2022-21360 | Twistlock CVE | Medium | java-1.8.0_211 | 0.00183 | false | ||
CVE-2022-21341 | Twistlock CVE | Medium | java-1.8.0_211 | 0.00183 | false | ||
CVE-2022-21294 | Twistlock CVE | Medium | java-1.8.0_211 | 0.00183 | false | ||
CVE-2025-53506 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.00182 | false | ||
CVE-2025-53506 | Anchore CVE | High | tomcat-embed-core-10.1.5 | 0.00182 | false | ||
CVE-2025-53506 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.00182 | false | ||
CVE-2025-53506 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.00182 | false | ||
CVE-2022-42004 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.13.3 | 0.00181 | false | ||
CVE-2021-37533 | Twistlock CVE | Medium | commons-net_commons-net-3.6 | 0.00178 | false | ||
CVE-2025-48989 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.00177 | false | ||
CVE-2025-48989 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.00177 | false | ||
CVE-2025-48989 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.00177 | false | ||
CVE-2024-12798 | Twistlock CVE | Medium | ch.qos.logback_logback-core-1.2.13 | 0.00175 | false | ||
CVE-2025-50106 | Anchore CVE | High | jdk-17.0.5 | 0.00174 | false | ||
CVE-2025-30749 | Anchore CVE | High | jdk-17.0.5 | 0.00174 | false | ||
CVE-2020-2781 | Twistlock CVE | Medium | java-1.8.0_211 | 0.00174 | false | ||
CVE-2022-38751 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.29 | 0.00173 | false | ||
CVE-2024-21138 | Anchore CVE | Low | jdk-17.0.5 | 0.00170 | false | ||
CVE-2023-34055 | Twistlock CVE | Medium | spring-boot-actuator-3.0.2 | 0.00170 | false | ||
CVE-2022-42003 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.13.3 | 0.00169 | false | ||
CVE-2019-2769 | Twistlock CVE | Medium | java-1.8.0_211 | 0.00168 | false | ||
CVE-2020-2659 | Twistlock CVE | Low | java-1.8.0_211 | 0.00166 | false | ||
CVE-2022-21293 | Twistlock CVE | Medium | java-1.8.0_211 | 0.00157 | false | ||
CVE-2025-24970 | Twistlock CVE | High | io.netty_netty-handler-4.1.113.Final | 0.00156 | false | ||
CVE-2025-24970 | Twistlock CVE | High | io.netty_netty-handler-4.1.110.Final | 0.00156 | false | ||
CVE-2023-22044 | Anchore CVE | Low | jdk-17.0.5 | 0.00156 | false | ||
CVE-2025-52520 | Anchore CVE | High | tomcat-embed-core-10.1.5 | 0.00153 | false | ||
CVE-2025-52520 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.00153 | false | ||
CVE-2025-52520 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.00153 | false | ||
CVE-2025-52520 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.00153 | false | ||
CVE-2020-2830 | Twistlock CVE | Medium | java-1.8.0_211 | 0.00151 | false | ||
CVE-2022-21476 | Twistlock CVE | High | java-1.8.0_211 | 0.00145 | false | ||
CVE-2024-20919 | Anchore CVE | Medium | jdk-17.0.5 | 0.00141 | false | ||
CVE-2023-22025 | Anchore CVE | Low | jdk-17.0.5 | 0.00140 | false | ||
CVE-2019-2816 | Twistlock CVE | Medium | java-1.8.0_211 | 0.00137 | false | ||
CVE-2023-21930 | Twistlock CVE | Low | java-17.0.5 | 0.00134 | false | ||
CVE-2023-21930 | Anchore CVE | High | jdk-17.0.5 | 0.00134 | false | ||
CVE-2024-20932 | Anchore CVE | High | jdk-17.0.5 | 0.00126 | false | ||
CVE-2023-22045 | Anchore CVE | Low | jdk-17.0.5 | 0.00123 | false | ||
CVE-2023-22006 | Anchore CVE | Low | jdk-17.0.5 | 0.00123 | false | ||
CVE-2021-35515 | Twistlock CVE | High | org.apache.commons_commons-compress-1.19 | 0.00119 | false | ||
CVE-2025-25193 | Twistlock CVE | Medium | io.netty_netty-common-4.1.110.Final | 0.00113 | false | ||
CVE-2025-25193 | Twistlock CVE | Medium | io.netty_netty-common-4.1.113.Final | 0.00113 | false | ||
CVE-2024-8184 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.54.v20240208 | 0.00113 | false | ||
CVE-2024-8184 | Anchore CVE | Medium | jetty-servlets-9.4.54.v20240208 | 0.00113 | false | ||
CVE-2024-8184 | Anchore CVE | Medium | jetty-io-9.4.54.v20240208 | 0.00113 | false | ||
CVE-2024-8184 | Anchore CVE | Medium | jetty-http-9.4.54.v20240208 | 0.00113 | false | ||
CVE-2024-8184 | Anchore CVE | Medium | jetty-client-9.4.54.v20240208 | 0.00113 | false | ||
CVE-2024-8184 | Anchore CVE | Medium | jetty-servlet-9.4.54.v20240208 | 0.00113 | false | ||
CVE-2024-8184 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.54.v20240208 | 0.00113 | false | ||
CVE-2020-14579 | Twistlock CVE | Medium | java-1.8.0_211 | 0.00113 | false | ||
CVE-2020-14578 | Twistlock CVE | Medium | java-1.8.0_211 | 0.00113 | false | ||
CVE-2024-38827 | Twistlock CVE | Medium | spring-security-core-6.0.1 | 0.00111 | false | ||
CVE-2022-21248 | Twistlock CVE | Medium | java-1.8.0_211 | 0.00111 | false | ||
CVE-2024-21210 | Anchore CVE | Low | jdk-17.0.5 | 0.00109 | false | ||
CVE-2021-2163 | Twistlock CVE | Low | java-1.8.0_211 | 0.00109 | false | ||
CVE-2024-21012 | Anchore CVE | Low | jdk-17.0.5 | 0.00099 | false | ||
CVE-2023-21938 | Twistlock CVE | Low | java-17.0.5 | 0.00095 | false | ||
CVE-2023-21938 | Anchore CVE | Low | jdk-17.0.5 | 0.00095 | false | ||
CVE-2023-21937 | Twistlock CVE | Low | java-17.0.5 | 0.00095 | false | ||
CVE-2023-21937 | Anchore CVE | Low | jdk-17.0.5 | 0.00095 | false | ||
CVE-2024-6763 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-http-9.4.56.v20240826 | 0.00090 | false | ||
CVE-2024-6763 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-http-9.4.54.v20240208 | 0.00090 | false | ||
CVE-2024-6763 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.54.v20240208 | 0.00090 | false | ||
CVE-2024-6763 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.56.v20240826 | 0.00090 | false | ||
CVE-2023-21830 | Twistlock CVE | Low | java-17.0.5 | 0.00089 | false | ||
CVE-2023-21968 | Twistlock CVE | Low | java-17.0.5 | 0.00086 | false | ||
CVE-2023-21968 | Anchore CVE | Low | jdk-17.0.5 | 0.00086 | false | ||
CVE-2023-21843 | Twistlock CVE | Low | java-17.0.5 | 0.00086 | false | ||
CVE-2025-21587 | Anchore CVE | High | jdk-17.0.5 | 0.00085 | false | ||
CVE-2023-22049 | Anchore CVE | Low | jdk-17.0.5 | 0.00083 | false | ||
CVE-2022-21299 | Twistlock CVE | Medium | java-1.8.0_211 | 0.00083 | false | ||
CVE-2025-30698 | Anchore CVE | Medium | jdk-17.0.5 | 0.00082 | false | ||
CVE-2025-48060 | Anchore CVE | High | jq-1.6 | 0.00081 | false | ||
CVE-2022-38750 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.29 | 0.00079 | false | ||
CVE-2023-52428 | Twistlock CVE | High | com.nimbusds_nimbus-jose-jwt-9.31 | 0.00078 | false | ||
CVE-2023-21967 | Twistlock CVE | Low | java-17.0.5 | 0.00076 | false | ||
CVE-2023-21967 | Anchore CVE | Medium | jdk-17.0.5 | 0.00076 | false | ||
CVE-2022-41854 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.29 | 0.00076 | false | ||
CVE-2023-28709 | Twistlock CVE | High | tomcat-embed-core-10.1.5 | 0.00075 | false | ||
CVE-2023-28709 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.00075 | false | ||
CVE-2023-28709 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.00075 | false | ||
CVE-2023-43642 | Twistlock CVE | High | org.xerial.snappy_snappy-java-1.1.8.4 | 0.00073 | false | ||
CVE-2025-52999 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-core-2.13.3 | 0.00072 | false | ||
CVE-2025-52999 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-core-2.14.1 | 0.00072 | false | ||
CVE-2024-38820 | Twistlock CVE | Medium | spring-context-6.0.4 | 0.00070 | false | ||
CVE-2024-38820 | Twistlock CVE | Medium | spring-core-6.0.4 | 0.00070 | false | ||
CVE-2024-38820 | Twistlock CVE | Medium | spring-web-6.0.4 | 0.00070 | false | ||
CVE-2024-38820 | Anchore CVE | Medium | spring-core-6.0.4 | 0.00070 | false | ||
CVE-2023-22081 | Anchore CVE | Medium | jdk-17.0.5 | 0.00067 | false | ||
CVE-2025-22233 | Twistlock CVE | Low | spring-context-6.0.4 | 0.00063 | false | ||
CVE-2022-21349 | Twistlock CVE | Medium | java-1.8.0_211 | 0.00061 | false | ||
CVE-2024-20945 | Anchore CVE | Medium | jdk-17.0.5 | 0.00059 | false | ||
CVE-2023-33202 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.52.0 | 0.00059 | false | ||
CVE-2023-22036 | Anchore CVE | Low | jdk-17.0.5 | 0.00059 | false | ||
CVE-2023-22041 | Anchore CVE | Medium | jdk-17.0.5 | 0.00058 | false | ||
CVE-2025-48734 | Twistlock CVE | Low | commons-beanutils_commons-beanutils-1.9.4 | 0.00056 | false | ||
CVE-2025-49125 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.00055 | false | ||
CVE-2025-49125 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.00055 | false | ||
CVE-2025-49125 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.00055 | false | ||
CVE-2024-23337 | Anchore CVE | Medium | jq-1.6 | 0.00055 | false | ||
CVE-2023-25193 | Anchore CVE | High | jdk-17.0.5 | 0.00055 | false | ||
CVE-2025-50059 | Anchore CVE | High | jdk-17.0.5 | 0.00054 | false | ||
CVE-2023-21954 | Twistlock CVE | Low | java-17.0.5 | 0.00053 | false | ||
CVE-2023-21954 | Anchore CVE | Medium | jdk-17.0.5 | 0.00053 | false | ||
CVE-2025-48988 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.00052 | false | ||
CVE-2025-48988 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.00052 | false | ||
CVE-2025-48988 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.00052 | false | ||
CVE-2025-31651 | Anchore CVE | Critical | tomcat-embed-core-10.1.5 | 0.00051 | false | ||
CVE-2025-31651 | Anchore CVE | Critical | tomcat-embed-websocket-10.1.5 | 0.00051 | false | ||
CVE-2025-31651 | Anchore CVE | Critical | tomcat-embed-el-10.1.5 | 0.00051 | false | ||
CVE-2025-31651 | Twistlock CVE | Critical | tomcat-embed-core-10.1.5 | 0.00051 | false | ||
CVE-2025-41242 | Twistlock CVE | Medium | spring-webmvc-6.0.4 | 0.00048 | false | ||
CVE-2024-30171 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.70.0 | 0.00046 | false | ||
CVE-2024-30171 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.52.0 | 0.00046 | false | ||
CVE-2024-12801 | Twistlock CVE | Low | ch.qos.logback_logback-core-1.2.13 | 0.00046 | false | ||
CVE-2023-4043 | Anchore CVE | High | parsson-1.0.0 | 0.00044 | false | ||
CVE-2025-53864 | Twistlock CVE | Medium | com.nimbusds_nimbus-jose-jwt-9.31 | 0.00042 | false | ||
CVE-2023-2976 | Anchore CVE | High | guava-r05 | 0.00042 | false | ||
CVE-2023-21835 | Twistlock CVE | Low | java-17.0.5 | 0.00041 | false | ||
CVE-2024-13009 | Twistlock CVE | High | org.eclipse.jetty_jetty-server-9.4.54.v20240208 | 0.00040 | false | ||
CVE-2024-13009 | Anchore CVE | High | jetty-util-ajax-9.4.56.v20240826 | 0.00040 | false | ||
CVE-2024-13009 | Anchore CVE | High | jetty-server-9.4.56.v20240826 | 0.00040 | false | ||
CVE-2024-13009 | Anchore CVE | High | jetty-continuation-9.4.54.v20240208 | 0.00040 | false | ||
CVE-2024-13009 | Anchore CVE | High | jetty-http-9.4.56.v20240826 | 0.00040 | false | ||
CVE-2024-13009 | Anchore CVE | High | jetty-client-9.4.54.v20240208 | 0.00040 | false | ||
CVE-2024-13009 | Anchore CVE | High | jetty-http-9.4.54.v20240208 | 0.00040 | false | ||
CVE-2024-13009 | Anchore CVE | High | jetty-security-9.4.56.v20240826 | 0.00040 | false | ||
CVE-2024-13009 | Anchore CVE | High | jetty-io-9.4.56.v20240826 | 0.00040 | false | ||
CVE-2024-13009 | Anchore CVE | High | jetty-util-ajax-9.4.54.v20240208 | 0.00040 | false | ||
CVE-2024-13009 | Anchore CVE | High | jetty-io-9.4.54.v20240208 | 0.00040 | false | ||
CVE-2024-13009 | Anchore CVE | High | jetty-servlets-9.4.54.v20240208 | 0.00040 | false | ||
CVE-2024-13009 | Anchore CVE | High | jetty-servlet-9.4.56.v20240826 | 0.00040 | false | ||
CVE-2024-13009 | Anchore CVE | High | jetty-servlet-9.4.54.v20240208 | 0.00040 | false | ||
CVE-2024-13009 | Anchore CVE | High | jetty-util-9.4.54.v20240208 | 0.00040 | false | ||
CVE-2024-13009 | Anchore CVE | High | jetty-util-9.4.56.v20240826 | 0.00040 | false | ||
CVE-2024-13009 | Anchore CVE | High | jetty-security-9.4.54.v20240208 | 0.00040 | false | ||
CVE-2024-13009 | Twistlock CVE | Low | org.eclipse.jetty_jetty-io-9.4.56.v20240826 | 0.00040 | false | ||
CVE-2024-13009 | Twistlock CVE | Low | org.eclipse.jetty_jetty-io-9.4.54.v20240208 | 0.00040 | false | ||
CVE-2025-30754 | Anchore CVE | Medium | jdk-17.0.5 | 0.00036 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka-storage-api-3.8.0 | 0.00031 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka-log4j-appender-3.8.0 | 0.00031 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka-streams-scala_2.13-3.8.0 | 0.00031 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka-server-common-3.8.0 | 0.00031 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka-group-coordinator-3.8.0 | 0.00031 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka-tools-3.8.0 | 0.00031 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka-streams-3.8.0 | 0.00031 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka-streams-examples-3.8.0 | 0.00031 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka-shell-3.8.0 | 0.00031 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka-metadata-3.8.0 | 0.00031 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka-streams-test-utils-3.8.0 | 0.00031 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka-raft-3.8.0 | 0.00031 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka-tools-api-3.8.0 | 0.00031 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka_2.13-3.8.0 | 0.00031 | false | ||
CVE-2025-27817 | Anchore CVE | High | kafka-storage-3.8.0 | 0.00031 | false | ||
CVE-2025-46701 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.00030 | false | ||
CVE-2025-46701 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.00030 | false | ||
CVE-2025-46701 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.00030 | false | ||
CVE-2025-21502 | Anchore CVE | Medium | jdk-17.0.5 | 0.00024 | false | ||
CVE-2024-47535 | Twistlock CVE | Medium | io.netty_netty-common-4.1.110.Final | 0.00021 | false | ||
CVE-2024-47535 | Twistlock CVE | Medium | io.netty_netty-common-4.1.113.Final | 0.00021 | false | ||
CVE-2025-49124 | Anchore CVE | High | tomcat-embed-core-10.1.5 | 0.00016 | false | ||
CVE-2025-49124 | Anchore CVE | High | tomcat-embed-el-10.1.5 | 0.00016 | false | ||
CVE-2025-49124 | Anchore CVE | High | tomcat-embed-websocket-10.1.5 | 0.00016 | false | ||
CVE-2025-49124 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.00016 | false | ||
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.13.3 | 0.00015 | false | ||
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.14.1 | 0.00015 | false | ||
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.15.2 | 0.00015 | false | ||
CVE-2025-55668 | Anchore CVE | Medium | tomcat-embed-el-10.1.5 | 0.00012 | false | ||
CVE-2025-55668 | Anchore CVE | Medium | tomcat-embed-core-10.1.5 | 0.00012 | false | ||
CVE-2025-55668 | Anchore CVE | Medium | tomcat-embed-websocket-10.1.5 | 0.00012 | false | ||
CVE-2025-55668 | Twistlock CVE | Low | tomcat-embed-core-10.1.5 | 0.00012 | false | ||
CVE-2024-53427 | Anchore CVE | High | jq-1.6 | 0.00012 | false | ||
CVE-2024-25710 | Twistlock CVE | Medium | org.apache.commons_commons-compress-1.19 | 0.00012 | false | ||
e43e16642621fd10e12d8bfdf140b09e | Anchore Compliance | Critical | N/A | N/A | |||
PRISMA-2023-0067 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-core-2.14.1 | N/A | N/A | ||
PRISMA-2023-0067 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-core-2.13.3 | N/A | N/A | ||
GHSA-xwmg-2g98-w7v9 | Anchore CVE | Medium | nimbus-jose-jwt-9.31 | N/A | N/A | ||
GHSA-xqfj-vm6h-2x34 | Anchore CVE | High | commons-compress-1.19 | N/A | N/A | ||
GHSA-xq3w-v528-46rv | Anchore CVE | Medium | netty-common-4.1.110.Final | N/A | N/A | ||
GHSA-xq3w-v528-46rv | Anchore CVE | Medium | netty-common-4.1.113.Final | N/A | N/A | ||
GHSA-xf96-w227-r7c4 | Anchore CVE | High | spring-boot-autoconfigure-3.0.2 | N/A | N/A | ||
GHSA-x873-6rgc-94jc | Anchore CVE | Medium | spring-security-core-6.0.1 | N/A | N/A | ||
GHSA-x64g-4xx9-fh6x | Anchore CVE | High | cryptacular-1.1.0 | N/A | N/A | ||
GHSA-wxr5-93ph-8wr9 | Anchore CVE | High | commons-beanutils-1.9.4 | N/A | N/A | ||
GHSA-wxr5-93ph-8wr9 | Anchore CVE | High | commons-beanutils-1.9.4 | N/A | N/A | ||
GHSA-wxr5-93ph-8wr9 | Anchore CVE | High | commons-beanutils-1.9.4 | N/A | N/A | ||
GHSA-wxqc-pxw9-g2p8 | Anchore CVE | High | spring-expression-6.0.4 | N/A | N/A | ||
GHSA-wm9w-rjj3-j356 | Anchore CVE | High | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-wjxj-5m7g-mg7q | Anchore CVE | Medium | bcprov-jdk15on-1.52 | N/A | N/A | ||
GHSA-wc4r-xq3c-5cf3 | Anchore CVE | Medium | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-w37g-rhq8-7m4j | Anchore CVE | Medium | snakeyaml-1.29 | N/A | N/A | ||
GHSA-w37g-rhq8-7m4j | Anchore CVE | Medium | snakeyaml-1.29 | N/A | N/A | ||
GHSA-vgq5-3255-v292 | Anchore CVE | Medium | kafka-clients-3.3.2 | N/A | N/A | ||
GHSA-vgq5-3255-v292 | Anchore CVE | Medium | kafka-clients-3.8.0 | N/A | N/A | ||
GHSA-v94h-hvhg-mf9h | Anchore CVE | High | spring-webmvc-6.0.4 | N/A | N/A | ||
GHSA-v682-8vv8-vpwr | Anchore CVE | Medium | tomcat-embed-websocket-10.1.5 | N/A | N/A | ||
GHSA-v435-xc8x-wvr9 | Anchore CVE | Medium | bcprov-jdk15on-1.70 | N/A | N/A | ||
GHSA-v435-xc8x-wvr9 | Anchore CVE | Medium | bcprov-jdk15on-1.52 | N/A | N/A | ||
GHSA-rgv9-q543-rqg4 | Anchore CVE | High | jackson-databind-2.13.3 | N/A | N/A | ||
GHSA-r936-gwx5-v52f | Anchore CVE | Medium | spring-webmvc-6.0.4 | N/A | N/A | ||
GHSA-r6j3-px5g-cq3x | Anchore CVE | Medium | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-qppj-fm5r-hxr3 | Anchore CVE | Medium | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-qh8g-58pp-2wxh | Anchore CVE | Medium | jetty-http-9.4.56.v20240826 | N/A | N/A | ||
GHSA-qh8g-58pp-2wxh | Anchore CVE | Medium | jetty-http-9.4.54.v20240208 | N/A | N/A | ||
GHSA-qcwq-55hx-v3vh | Anchore CVE | High | snappy-java-1.1.8.4 | N/A | N/A | ||
GHSA-q4rv-gq96-w7c5 | Anchore CVE | High | jetty-server-9.4.54.v20240208 | N/A | N/A | ||
GHSA-q3v6-hm2v-pw99 | Anchore CVE | Medium | spring-security-core-6.0.1 | N/A | N/A | ||
GHSA-q3mw-pvr8-9ggc | Anchore CVE | Medium | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-pr98-23f8-jwxv | Anchore CVE | Medium | logback-core-1.2.13 | N/A | N/A | ||
GHSA-pqr6-cmr2-h8hf | Anchore CVE | Medium | snappy-java-1.1.8.4 | N/A | N/A | ||
GHSA-p7c9-8xx8-h74f | Anchore CVE | Low | kafka_2.13-3.8.0 | N/A | N/A | ||
GHSA-mjmj-j48q-9wg2 | Anchore CVE | High | snakeyaml-1.29 | N/A | N/A | ||
GHSA-mjmj-j48q-9wg2 | Anchore CVE | High | snakeyaml-1.33 | N/A | N/A | ||
GHSA-mjmj-j48q-9wg2 | Anchore CVE | High | snakeyaml-1.29 | N/A | N/A | ||
GHSA-mg83-c7gq-rv5c | Anchore CVE | High | spring-security-crypto-6.0.1 | N/A | N/A | ||
GHSA-mc84-pj99-q6hh | Anchore CVE | High | commons-compress-1.19 | N/A | N/A | ||
GHSA-m6vm-37g8-gqvh | Anchore CVE | High | mysql-connector-j-8.0.32 | N/A | N/A | ||
GHSA-jjjh-jjxp-wpff | Anchore CVE | High | jackson-databind-2.13.3 | N/A | N/A | ||
GHSA-jjfh-589g-3hjx | Anchore CVE | Medium | spring-boot-actuator-3.0.2 | N/A | N/A | ||
GHSA-j288-q9x7-2f5v | Anchore CVE | Medium | commons-lang3-3.12.0 | N/A | N/A | ||
GHSA-j288-q9x7-2f5v | Anchore CVE | Medium | commons-lang3-3.12.0 | N/A | N/A | ||
GHSA-hr8g-6v94-x4m9 | Anchore CVE | Medium | bcprov-jdk15on-1.52 | N/A | N/A | ||
GHSA-hr8g-6v94-x4m9 | Anchore CVE | Medium | bcprov-jdk15on-1.70 | N/A | N/A | ||
GHSA-hhhw-99gj-p3c3 | Anchore CVE | Medium | snakeyaml-1.29 | N/A | N/A | ||
GHSA-hhhw-99gj-p3c3 | Anchore CVE | Medium | snakeyaml-1.29 | N/A | N/A | ||
GHSA-hgjh-9rj2-g67j | Anchore CVE | High | spring-web-6.0.4 | N/A | N/A | ||
GHSA-h46c-h94j-95f3 | Anchore CVE | High | jackson-core-2.14.1 | N/A | N/A | ||
GHSA-h46c-h94j-95f3 | Anchore CVE | High | jackson-core-2.13.3 | N/A | N/A | ||
GHSA-h3gc-qfqq-6h8f | Anchore CVE | High | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-h2fw-rfh5-95r3 | Anchore CVE | Low | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-gvpg-vgmx-xg6w | Anchore CVE | High | nimbus-jose-jwt-9.31 | N/A | N/A | ||
GHSA-gqp3-2cvr-x8m3 | Anchore CVE | High | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-g8pj-r55q-5c2v | Anchore CVE | Medium | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-g8m5-722r-8whq | Anchore CVE | Medium | jetty-server-9.4.54.v20240208 | N/A | N/A | ||
GHSA-g5vr-rgqm-vf78 | Anchore CVE | High | spring-webmvc-6.0.4 | N/A | N/A | ||
GHSA-g5h3-w546-pj7f | Anchore CVE | Critical | spring-boot-actuator-autoconfigure-3.0.2 | N/A | N/A | ||
GHSA-fjpj-2g6w-x25r | Anchore CVE | Medium | snappy-java-1.1.8.4 | N/A | N/A | ||
GHSA-fccv-jmmp-qg76 | Anchore CVE | High | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-f3jh-qvm4-mg39 | Anchore CVE | High | spring-security-core-6.0.1 | N/A | N/A | ||
GHSA-cx7f-g6mp-7hqm | Anchore CVE | High | spring-webmvc-6.0.4 | N/A | N/A | ||
GHSA-cx6h-86xw-9x34 | Anchore CVE | High | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-crv7-7245-f45f | Anchore CVE | High | commons-compress-1.19 | N/A | N/A | ||
GHSA-crqf-q9fp-hwjw | Anchore CVE | High | spring-kafka-3.0.2 | N/A | N/A | ||
GHSA-cgp8-4m63-fhh5 | Anchore CVE | Medium | commons-net-3.6 | N/A | N/A | ||
GHSA-ccgv-vj62-xf9h | Anchore CVE | High | spring-web-6.0.4 | N/A | N/A | ||
GHSA-c4r9-r8fh-9vj2 | Anchore CVE | Medium | snakeyaml-1.29 | N/A | N/A | ||
GHSA-c4r9-r8fh-9vj2 | Anchore CVE | Medium | snakeyaml-1.29 | N/A | N/A | ||
GHSA-c4q5-6c82-3qpw | Anchore CVE | Critical | spring-security-web-6.0.1 | N/A | N/A | ||
GHSA-9w3m-gqgf-c4p9 | Anchore CVE | Medium | snakeyaml-1.29 | N/A | N/A | ||
GHSA-9w3m-gqgf-c4p9 | Anchore CVE | Medium | snakeyaml-1.29 | N/A | N/A | ||
GHSA-98wm-3w3q-mw94 | Anchore CVE | Medium | snakeyaml-1.29 | N/A | N/A | ||
GHSA-98wm-3w3q-mw94 | Anchore CVE | Medium | snakeyaml-1.29 | N/A | N/A | ||
GHSA-8xfc-gm6g-vgpv | Anchore CVE | Medium | bcprov-jdk15on-1.52 | N/A | N/A | ||
GHSA-8xfc-gm6g-vgpv | Anchore CVE | Medium | bcprov-jdk15on-1.70 | N/A | N/A | ||
GHSA-83qj-6fr2-vhqg | Anchore CVE | Critical | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-7w75-32cg-r6g2 | Anchore CVE | Medium | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-7hfm-57qf-j43q | Anchore CVE | High | commons-compress-1.19 | N/A | N/A | ||
GHSA-78wr-2p64-hpwj | Anchore CVE | High | commons-io-2.11.0 | N/A | N/A | ||
GHSA-735f-pc8j-v9w8 | Anchore CVE | High | protobuf-java-3.23.4 | N/A | N/A | ||
GHSA-72m5-fvvv-55m6 | Anchore CVE | Medium | bcprov-jdk15on-1.52 | N/A | N/A | ||
GHSA-6xx3-rg99-gc3p | Anchore CVE | Medium | bcprov-jdk15on-1.52 | N/A | N/A | ||
GHSA-6v67-2wr5-gvf4 | Anchore CVE | Low | logback-core-1.2.13 | N/A | N/A | ||
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-r05 | N/A | N/A | ||
GHSA-5j33-cvvr-w245 | Anchore CVE | High | tomcat-embed-core-10.1.5 | N/A | N/A | ||
GHSA-564r-hj7v-mcr5 | Anchore CVE | Medium | spring-expression-6.0.4 | N/A | N/A | ||
GHSA-55g7-9cwv-5qfv | Anchore CVE | High | snappy-java-1.1.8.4 | N/A | N/A | ||
GHSA-4wp7-92pw-q264 | Anchore CVE | Low | spring-context-6.0.4 | N/A | N/A | ||
GHSA-4vpr-xfrp-cj64 | Anchore CVE | High | spring-security-config-6.0.1 | N/A | N/A | ||
GHSA-4jq9-2xhw-jpx7 | Anchore CVE | High | json-20180813 | N/A | N/A | ||
GHSA-4gc7-5j7h-4qph | Anchore CVE | Medium | spring-context-6.0.4 | N/A | N/A | ||
GHSA-4gc7-5j7h-4qph | Anchore CVE | Medium | spring-web-6.0.4 | N/A | N/A | ||
GHSA-4g9r-vxhx-9pgx | Anchore CVE | Medium | commons-compress-1.19 | N/A | N/A | ||
GHSA-4g8c-wm8x-jfhw | Anchore CVE | High | netty-handler-4.1.113.Final | N/A | N/A | ||
GHSA-4g8c-wm8x-jfhw | Anchore CVE | High | netty-handler-4.1.110.Final | N/A | N/A | ||
GHSA-3vqj-43w4-2q58 | Anchore CVE | High | json-20180813 | N/A | N/A | ||
GHSA-3mc7-4q67-w48m | Anchore CVE | High | snakeyaml-1.29 | N/A | N/A | ||
GHSA-3mc7-4q67-w48m | Anchore CVE | High | snakeyaml-1.29 | N/A | N/A | ||
GHSA-3h6f-g5f3-gc4w | Anchore CVE | Critical | spring-security-config-6.0.1 | N/A | N/A | ||
GHSA-3f7h-mf4q-vrm4 | Anchore CVE | Medium | woodstox-core-6.2.7 | N/A | N/A | ||
GHSA-389x-839f-4rhx | Anchore CVE | Medium | netty-common-4.1.113.Final | N/A | N/A | ||
GHSA-389x-839f-4rhx | Anchore CVE | Medium | netty-common-4.1.110.Final | N/A | N/A | ||
GHSA-2x2g-32r7-p4x8 | Anchore CVE | Medium | kafka-clients-3.3.2 | N/A | N/A | ||
GHSA-2wrp-6fg6-hmc5 | Anchore CVE | High | spring-web-6.0.4 | N/A | N/A | ||
GHSA-2rwm-xv5j-777p | Anchore CVE | Critical | parsson-1.0.0 | N/A | N/A | ||
GHSA-2rmj-mq67-h97g | Anchore CVE | Medium | spring-web-6.0.4 | N/A | N/A | ||
GHSA-27hp-xhwr-wr2m | Anchore CVE | High | tomcat-embed-core-10.1.5 | N/A | N/A | ||
7693f4a1b04f55978e99e0bff9dfcc39 | Anchore Compliance | Critical | N/A | N/A | |||
56746bc8a33fa0413cbae9610b473c4e | Anchore Compliance | Critical | N/A | N/A |
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=avocado/orchestrator/avocado-web&tag=3.2.18&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.