chore(findings): blackduck/seeker/seeker-sensor
Summary
blackduck/seeker/seeker-sensor has 467 new findings discovered during continuous monitoring.
Layer: redhat/ubi/ubi9:9.5 is EOL, please update if possible
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=blackduck/seeker/seeker-sensor&tag=2025.1.0&branch=master
EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.
KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.
| id | source | severity | package | impact | workaround | epss_score | kev |
|---|---|---|---|---|---|---|---|
| CVE-2025-24813 | Anchore CVE | Critical | tomcat-jdbc-10.1.26 | 0.94183 | true | ||
| CVE-2025-24813 | Anchore CVE | Critical | tomcat-juli-10.1.26 | 0.94183 | true | ||
| CVE-2024-50379 | Anchore CVE | Critical | tomcat-juli-10.1.26 | 0.88429 | false | ||
| CVE-2024-50379 | Anchore CVE | Critical | tomcat-jdbc-10.1.26 | 0.88429 | false | ||
| CVE-2024-22259 | Twistlock CVE | Low | spring-core-5.3.27 | 0.30512 | false | ||
| CVE-2024-22259 | Anchore CVE | High | spring-core-5.3.27 | 0.30512 | false | ||
| CVE-2024-56337 | Anchore CVE | Critical | tomcat-jdbc-10.1.26 | 0.29920 | false | ||
| CVE-2024-56337 | Anchore CVE | Critical | tomcat-juli-10.1.26 | 0.29920 | false | ||
| CVE-2024-54677 | Anchore CVE | Medium | tomcat-juli-10.1.26 | 0.09851 | false | ||
| CVE-2024-54677 | Anchore CVE | Medium | tomcat-jdbc-10.1.26 | 0.09851 | false | ||
| CVE-2024-1931 | Anchore CVE | Medium | unbound-libs-1.16.2-19.el9_6.1 | 0.06753 | false | ||
| CVE-2024-1931 | Twistlock CVE | Medium | unbound-1.16.2-19.el9_6.1 | 0.06753 | false | ||
| CVE-2024-7264 | Anchore CVE | Low | libcurl-minimal-7.76.1-31.el9_6.1 | 0.06460 | false | ||
| CVE-2024-7264 | Anchore CVE | Low | curl-minimal-7.76.1-31.el9_6.1 | 0.06460 | false | ||
| CVE-2024-7264 | Twistlock CVE | Low | curl-7.76.1-31.el9_6.1 | 0.06460 | false | ||
| CVE-2025-31650 | Anchore CVE | High | tomcat-jdbc-10.1.26 | 0.04536 | false | ||
| CVE-2025-31650 | Anchore CVE | High | tomcat-juli-10.1.26 | 0.04536 | false | ||
| CVE-2023-2728 | Twistlock CVE | Medium | python-decorator-4.4.2-6.el9 | 0.04348 | false | ||
| CVE-2024-33655 | Anchore CVE | Low | unbound-libs-1.16.2-19.el9_6.1 | 0.03995 | false | ||
| CVE-2024-33655 | Twistlock CVE | Low | unbound-1.16.2-19.el9_6.1 | 0.03995 | false | ||
| CVE-2024-56433 | Anchore CVE | Low | shadow-utils-2:4.9-12.el9 | 0.03604 | false | ||
| CVE-2022-25647 | Twistlock CVE | High | com.google.code.gson_gson-2.8.6 | 0.02658 | false | ||
| CVE-2024-52316 | Anchore CVE | Critical | tomcat-juli-10.1.26 | 0.00989 | false | ||
| CVE-2024-52316 | Anchore CVE | Critical | tomcat-jdbc-10.1.26 | 0.00989 | false | ||
| CVE-2022-1271 | Anchore CVE | High | xz-1.9 | 0.00716 | false | ||
| CVE-2022-1271 | Anchore CVE | High | xz-1.9 | 0.00716 | false | ||
| CVE-2015-4035 | Anchore CVE | High | xz-1.9 | 0.00612 | false | ||
| CVE-2015-4035 | Anchore CVE | High | xz-1.9 | 0.00612 | false | ||
| CVE-2024-9681 | Anchore CVE | Low | libcurl-minimal-7.76.1-31.el9_6.1 | 0.00571 | false | ||
| CVE-2024-9681 | Anchore CVE | Low | curl-minimal-7.76.1-31.el9_6.1 | 0.00571 | false | ||
| CVE-2024-9681 | Twistlock CVE | Low | curl-7.76.1-31.el9_6.1 | 0.00571 | false | ||
| CVE-2023-6378 | Twistlock CVE | High | ch.qos.logback_logback-core-1.2.12 | 0.00520 | false | ||
| CVE-2023-6378 | Twistlock CVE | High | ch.qos.logback_logback-classic-1.2.11 | 0.00520 | false | ||
| CVE-2024-21742 | Twistlock CVE | Medium | org.apache.james_apache-mime4j-core-0.8.9 | 0.00492 | false | ||
| CVE-2023-43804 | Twistlock CVE | Medium | python-urllib3-1.26.5-6.el9 | 0.00472 | false | ||
| CVE-2023-43804 | Twistlock CVE | Medium | python-pip-21.3.1-1.el9 | 0.00472 | false | ||
| CVE-2023-43804 | Anchore CVE | Medium | python3-pip-wheel-21.3.1-1.el9 | 0.00472 | false | ||
| CVE-2024-41996 | Twistlock CVE | Low | openssl-1:3.2.2-6.el9_5.1 | 0.00446 | false | ||
| CVE-2024-26308 | Twistlock CVE | Medium | org.apache.commons_commons-compress-1.21 | 0.00430 | false | ||
| CVE-2024-34459 | Anchore CVE | Low | libxml2-2.9.13-12.el9_6 | 0.00390 | false | ||
| CVE-2024-34459 | Twistlock CVE | Low | libxml2-2.9.13-12.el9_6 | 0.00390 | false | ||
| CVE-2024-8184 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-10.0.23 | 0.00388 | false | ||
| CVE-2024-8184 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-10.0.23 | 0.00388 | false | ||
| CVE-2024-8184 | Anchore CVE | Medium | jetty-alpn-client-10.0.23 | 0.00388 | false | ||
| CVE-2024-8184 | Anchore CVE | Medium | jetty-servlets-10.0.23 | 0.00388 | false | ||
| CVE-2024-8184 | Anchore CVE | Medium | jetty-annotations-10.0.23 | 0.00388 | false | ||
| CVE-2024-8184 | Anchore CVE | Medium | jetty-servlet-10.0.23 | 0.00388 | false | ||
| CVE-2024-8184 | Anchore CVE | Medium | jetty-webapp-10.0.23 | 0.00388 | false | ||
| CVE-2024-8184 | Anchore CVE | Medium | jetty-plus-10.0.23 | 0.00388 | false | ||
| CVE-2024-8184 | Anchore CVE | Medium | jetty-http-10.0.23 | 0.00388 | false | ||
| CVE-2024-8184 | Anchore CVE | Medium | jetty-client-10.0.23 | 0.00388 | false | ||
| CVE-2024-8184 | Anchore CVE | Medium | jetty-xml-10.0.23 | 0.00388 | false | ||
| CVE-2024-8184 | Anchore CVE | Medium | jetty-io-10.0.23 | 0.00388 | false | ||
| CVE-2024-8184 | Anchore CVE | Medium | jetty-jndi-10.0.23 | 0.00388 | false | ||
| CVE-2025-1153 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00375 | false | ||
| CVE-2025-1153 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00375 | false | ||
| CVE-2024-3651 | Twistlock CVE | Medium | python-idna-2.10-7.el9_4.1 | 0.00338 | false | ||
| CVE-2024-11053 | Anchore CVE | Low | libcurl-minimal-7.76.1-31.el9_6.1 | 0.00337 | false | ||
| CVE-2024-11053 | Anchore CVE | Low | curl-minimal-7.76.1-31.el9_6.1 | 0.00337 | false | ||
| CVE-2024-11053 | Twistlock CVE | Low | curl-7.76.1-31.el9_6.1 | 0.00337 | false | ||
| CVE-2025-24970 | Twistlock CVE | High | io.netty_netty-handler-4.1.112.Final | 0.00318 | false | ||
| CVE-2023-33201 | Twistlock CVE | Medium | org.bouncycastle_bcprov-ext-jdk15on-1.69.00.0 | 0.00296 | false | ||
| CVE-2024-38808 | Twistlock CVE | Medium | spring-expression-5.3.27 | 0.00272 | false | ||
| CVE-2024-38808 | Twistlock CVE | Medium | spring-expression-5.3.34 | 0.00272 | false | ||
| CVE-2024-38808 | Twistlock CVE | Low | spring-core-5.3.34 | 0.00272 | false | ||
| CVE-2024-38808 | Twistlock CVE | Low | spring-core-5.3.27 | 0.00272 | false | ||
| CVE-2024-38808 | Anchore CVE | Medium | spring-core-5.3.27 | 0.00272 | false | ||
| CVE-2024-38808 | Anchore CVE | Medium | spring-core-5.3.34 | 0.00272 | false | ||
| CVE-2024-38808 | Anchore CVE | Medium | spring-core-5.3.34 | 0.00272 | false | ||
| CVE-2025-50106 | Anchore CVE | High | zulu-17.0.13+11-LTS | 0.00267 | false | ||
| CVE-2025-30749 | Anchore CVE | High | zulu-17.0.13+11-LTS | 0.00267 | false | ||
| CVE-2025-1795 | Anchore CVE | Low | python3-3.9.21-2.el9_6.2 | 0.00236 | false | ||
| CVE-2025-1795 | Anchore CVE | Low | python3-libs-3.9.21-2.el9_6.2 | 0.00236 | false | ||
| CVE-2025-1795 | Twistlock CVE | Low | python3.9-3.9.21-2.el9_6.2 | 0.00236 | false | ||
| CVE-2025-31672 | Twistlock CVE | Low | The Apache Software Foundation_poi-ooxml-5.2.3 | 0.00234 | false | ||
| CVE-2024-34447 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk18on-1.76.0.0 | 0.00227 | false | ||
| CVE-2025-52520 | Anchore CVE | High | tomcat-juli-10.1.26 | 0.00226 | false | ||
| CVE-2025-52520 | Anchore CVE | High | tomcat-jdbc-10.1.26 | 0.00226 | false | ||
| CVE-2024-12798 | Twistlock CVE | Medium | ch.qos.logback_logback-core-1.2.12 | 0.00218 | false | ||
| CVE-2024-12798 | Twistlock CVE | Medium | ch.qos.logback_logback-core-1.2.13 | 0.00218 | false | ||
| CVE-2024-12798 | Twistlock CVE | Medium | ch.qos.logback_logback-core-1.3.14 | 0.00218 | false | ||
| CVE-2024-47554 | Twistlock CVE | Low | commons-io_commons-io-2.8.0 | 0.00213 | false | ||
| CVE-2024-47554 | Twistlock CVE | Low | commons-io_commons-io-2.11.0 | 0.00213 | false | ||
| CVE-2025-48989 | Anchore CVE | High | tomcat-juli-10.1.26 | 0.00207 | false | ||
| CVE-2025-48989 | Anchore CVE | High | tomcat-jdbc-10.1.26 | 0.00207 | false | ||
| CVE-2024-29857 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk18on-1.76.0.0 | 0.00203 | false | ||
| CVE-2024-28863 | Twistlock CVE | Medium | libcomps-0.1.18-1.el9 | 0.00198 | false | ||
| CVE-2024-28863 | Twistlock CVE | Medium | python-six-1.15.0-9.el9 | 0.00198 | false | ||
| CVE-2024-28863 | Twistlock CVE | Medium | python-requests-2.25.1-10.el9_6 | 0.00198 | false | ||
| CVE-2024-28863 | Twistlock CVE | Medium | python-urllib3-1.26.5-6.el9 | 0.00198 | false | ||
| CVE-2024-28863 | Twistlock CVE | Medium | python-chardet-4.0.0-5.el9 | 0.00198 | false | ||
| CVE-2023-6481 | Twistlock CVE | High | ch.qos.logback_logback-core-1.2.12 | 0.00190 | false | ||
| CVE-2024-6763 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-http-10.0.23 | 0.00186 | false | ||
| CVE-2023-2727 | Twistlock CVE | Medium | python-decorator-4.4.2-6.el9 | 0.00174 | false | ||
| CVE-2025-53506 | Anchore CVE | High | tomcat-juli-10.1.26 | 0.00170 | false | ||
| CVE-2025-53506 | Anchore CVE | High | tomcat-jdbc-10.1.26 | 0.00170 | false | ||
| CVE-2023-32636 | Twistlock CVE | Low | glib2-2.68.4-16.el9_6.3 | 0.00165 | false | ||
| CVE-2023-32636 | Anchore CVE | Low | glib2-2.68.4-16.el9_6.3 | 0.00165 | false | ||
| CVE-2023-22899 | Twistlock CVE | Medium | net.lingala.zip4j_zip4j-2.11.1 | 0.00160 | false | ||
| CVE-2025-1632 | Anchore CVE | Low | libarchive-3.5.3-6.el9_6 | 0.00156 | false | ||
| CVE-2025-1632 | Twistlock CVE | Low | libarchive-3.5.3-6.el9_6 | 0.00156 | false | ||
| CVE-2024-37891 | Twistlock CVE | Medium | python-urllib3-1.26.5-6.el9 | 0.00142 | false | ||
| CVE-2024-37891 | Twistlock CVE | Medium | python-pip-21.3.1-1.el9 | 0.00142 | false | ||
| CVE-2024-37891 | Anchore CVE | Medium | python3-pip-wheel-21.3.1-1.el9 | 0.00142 | false | ||
| CVE-2024-30172 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk18on-1.76.0.0 | 0.00140 | false | ||
| CVE-2025-25193 | Twistlock CVE | Medium | io.netty_netty-common-4.1.112.Final | 0.00124 | false | ||
| CVE-2020-12413 | Anchore CVE | Low | nss-softokn-freebl-3.112.0-4.el9_4 | 0.00120 | false | ||
| CVE-2020-12413 | Anchore CVE | Low | nss-softokn-3.112.0-4.el9_4 | 0.00120 | false | ||
| CVE-2020-12413 | Anchore CVE | Low | nss-3.112.0-4.el9_4 | 0.00120 | false | ||
| CVE-2020-12413 | Anchore CVE | Low | nspr-4.36.0-4.el9_4 | 0.00120 | false | ||
| CVE-2020-12413 | Anchore CVE | Low | nss-util-3.112.0-4.el9_4 | 0.00120 | false | ||
| CVE-2020-12413 | Anchore CVE | Low | nss-sysinit-3.112.0-4.el9_4 | 0.00120 | false | ||
| CVE-2020-12413 | Twistlock CVE | Low | nss-3.112.0-4.el9_4 | 0.00120 | false | ||
| CVE-2024-13176 | Twistlock CVE | Low | openssl-1:3.2.2-6.el9_5.1 | 0.00118 | false | ||
| CVE-2023-51074 | Twistlock CVE | Medium | json-path-2.7.0 | 0.00117 | false | ||
| CVE-2025-6069 | Anchore CVE | Medium | python3-3.9.21-2.el9_6.2 | 0.00116 | false | ||
| CVE-2025-6069 | Anchore CVE | Medium | python3-libs-3.9.21-2.el9_6.2 | 0.00116 | false | ||
| CVE-2025-6069 | Twistlock CVE | Medium | python3.9-3.9.21-2.el9_6.2 | 0.00116 | false | ||
| CVE-2025-1152 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00113 | false | ||
| CVE-2025-1152 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00113 | false | ||
| CVE-2025-1150 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00113 | false | ||
| CVE-2025-1150 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00113 | false | ||
| CVE-2025-1151 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00104 | false | ||
| CVE-2025-1151 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00104 | false | ||
| CVE-2025-22235 | Twistlock CVE | High | spring-boot-2.7.12 | 0.00092 | false | ||
| CVE-2025-22235 | Twistlock CVE | High | spring-boot-2.7.11 | 0.00092 | false | ||
| CVE-2025-7039 | Twistlock CVE | Low | glib2-2.68.4-16.el9_6.3 | 0.00089 | false | ||
| CVE-2025-30754 | Anchore CVE | Medium | zulu-17.0.13+11-LTS | 0.00088 | false | ||
| CVE-2025-48988 | Anchore CVE | High | tomcat-jdbc-10.1.26 | 0.00082 | false | ||
| CVE-2025-48988 | Anchore CVE | High | tomcat-juli-10.1.26 | 0.00082 | false | ||
| CVE-2025-55163 | Twistlock CVE | High | io.netty_netty-codec-http2-4.1.112.Final | 0.00081 | false | ||
| CVE-2025-9086 | Anchore CVE | Medium | libcurl-minimal-7.76.1-31.el9_6.1 | 0.00077 | false | ||
| CVE-2025-9086 | Anchore CVE | Medium | curl-minimal-7.76.1-31.el9_6.1 | 0.00077 | false | ||
| CVE-2025-9086 | Twistlock CVE | Medium | curl-7.76.1-31.el9_6.1 | 0.00077 | false | ||
| CVE-2021-47621 | Twistlock CVE | Medium | io.github.classgraph_classgraph-4.8.78 | 0.00077 | false | ||
| CVE-2023-45322 | Anchore CVE | Low | libxml2-2.9.13-12.el9_6 | 0.00076 | false | ||
| CVE-2025-59375 | Anchore CVE | High | expat-2.5.0-5.el9_6 | 0.00075 | false | ||
| CVE-2025-59375 | Twistlock CVE | High | expat-2.5.0-5.el9_6 | 0.00075 | false | ||
| CVE-2024-7254 | Twistlock CVE | High | com.google.protobuf_protobuf-java-3.20.3 | 0.00075 | false | ||
| CVE-2025-49125 | Anchore CVE | High | tomcat-juli-10.1.26 | 0.00074 | false | ||
| CVE-2025-49125 | Anchore CVE | High | tomcat-jdbc-10.1.26 | 0.00074 | false | ||
| CVE-2025-1377 | Anchore CVE | Low | elfutils-libelf-0.192-6.el9_6 | 0.00074 | false | ||
| CVE-2025-1377 | Anchore CVE | Low | elfutils-default-yama-scope-0.192-6.el9_6 | 0.00074 | false | ||
| CVE-2025-1377 | Anchore CVE | Low | elfutils-libs-0.192-6.el9_6 | 0.00074 | false | ||
| CVE-2025-1377 | Twistlock CVE | Low | elfutils-0.192-6.el9_6 | 0.00074 | false | ||
| CVE-2025-8291 | Twistlock CVE | Medium | python3.9-3.9.21-2.el9_6.2 | 0.00073 | false | ||
| CVE-2025-8291 | Anchore CVE | Medium | python3-libs-3.9.21-2.el9_6.2 | 0.00073 | false | ||
| CVE-2025-8291 | Anchore CVE | Medium | python3-3.9.21-2.el9_6.2 | 0.00073 | false | ||
| CVE-2024-38820 | Twistlock CVE | Medium | spring-core-5.3.34 | 0.00070 | false | ||
| CVE-2024-38820 | Twistlock CVE | Medium | spring-context-5.3.34 | 0.00070 | false | ||
| CVE-2024-38820 | Twistlock CVE | Medium | spring-context-5.3.27 | 0.00070 | false | ||
| CVE-2024-38820 | Twistlock CVE | Medium | spring-core-5.3.27 | 0.00070 | false | ||
| CVE-2024-38820 | Anchore CVE | Medium | spring-core-5.3.27 | 0.00070 | false | ||
| CVE-2024-38820 | Anchore CVE | Medium | spring-core-5.3.34 | 0.00070 | false | ||
| CVE-2024-38820 | Anchore CVE | Medium | spring-core-5.3.34 | 0.00070 | false | ||
| CVE-2025-50059 | Anchore CVE | High | zulu-17.0.13+11-LTS | 0.00067 | false | ||
| CVE-2025-30698 | Anchore CVE | Medium | zulu-17.0.13+11-LTS | 0.00067 | false | ||
| CVE-2023-39804 | Twistlock CVE | Low | tar-2:1.34-7.el9 | 0.00067 | false | ||
| CVE-2025-48924 | Twistlock CVE | Medium | org.apache.commons_commons-lang3-3.12.0 | 0.00066 | false | ||
| CVE-2025-48924 | Twistlock CVE | Medium | org.apache.commons_commons-lang3-3.16.0 | 0.00066 | false | ||
| CVE-2025-48924 | Twistlock CVE | Medium | org.apache.commons_commons-lang3-3.9 | 0.00066 | false | ||
| CVE-2025-48924 | Twistlock CVE | Medium | commons-lang_commons-lang-2.6 | 0.00066 | false | ||
| CVE-2025-48734 | Twistlock CVE | Low | commons-beanutils_commons-beanutils-1.9.4 | 0.00064 | false | ||
| CVE-2025-8916 | Twistlock CVE | Medium | org.bouncycastle_bcpkix-jdk18on-1.76.0.0 | 0.00063 | false | ||
| CVE-2025-8885 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk18on-1.76.0.0 | 0.00063 | false | ||
| CVE-2025-3360 | Twistlock CVE | Low | glib2-2.68.4-16.el9_6.3 | 0.00061 | false | ||
| CVE-2025-3360 | Anchore CVE | Low | glib2-2.68.4-16.el9_6.3 | 0.00061 | false | ||
| CVE-2024-30171 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk18on-1.76.0.0 | 0.00061 | false | ||
| CVE-2025-27113 | Anchore CVE | Low | libxml2-2.9.13-12.el9_6 | 0.00059 | false | ||
| CVE-2025-27113 | Twistlock CVE | Low | libxml2-2.9.13-12.el9_6 | 0.00059 | false | ||
| CVE-2024-43168 | Anchore CVE | Low | unbound-libs-1.16.2-19.el9_6.1 | 0.00057 | false | ||
| CVE-2024-43168 | Twistlock CVE | Low | unbound-1.16.2-19.el9_6.1 | 0.00057 | false | ||
| CVE-2025-41249 | Twistlock CVE | High | spring-core-5.3.27 | 0.00056 | false | ||
| CVE-2025-41249 | Twistlock CVE | High | spring-core-5.3.34 | 0.00056 | false | ||
| CVE-2025-54988 | Twistlock CVE | Critical | org.apache.tika_tika-parser-pdf-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Twistlock CVE | Low | org.apache.tika_tika-core-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-core-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-font-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-audiovideo-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-font-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-code-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-xmp-commons-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-apple-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-cad-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-pkg-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-ocr-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-microsoft-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-zip-commons-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-miscoffice-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-cad-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-mail-commons-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-webarchive-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-html-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-digest-commons-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-image-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-mail-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parsers-standard-package-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-html-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-mail-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-text-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-pkg-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-text-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-image-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-ocr-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-webarchive-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-xml-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-zip-commons-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-mail-commons-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-audiovideo-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-news-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-xmp-commons-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-microsoft-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-apple-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-news-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-crypto-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-miscoffice-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-code-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-digest-commons-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-crypto-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-core-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parser-xml-module-2.9.0 | 0.00055 | false | ||
| CVE-2025-54988 | Anchore CVE | High | tika-parsers-standard-package-2.9.0 | 0.00055 | false | ||
| CVE-2025-21502 | Anchore CVE | Medium | zulu-17.0.13+11-LTS | 0.00055 | false | ||
| CVE-2025-21502 | Twistlock CVE | Low | java-17.0.13 | 0.00055 | false | ||
| CVE-2025-1376 | Anchore CVE | Low | elfutils-libelf-0.192-6.el9_6 | 0.00055 | false | ||
| CVE-2025-1376 | Anchore CVE | Low | elfutils-libs-0.192-6.el9_6 | 0.00055 | false | ||
| CVE-2025-1376 | Anchore CVE | Low | elfutils-default-yama-scope-0.192-6.el9_6 | 0.00055 | false | ||
| CVE-2025-1376 | Twistlock CVE | Low | elfutils-0.192-6.el9_6 | 0.00055 | false | ||
| CVE-2023-45803 | Twistlock CVE | Medium | python-pip-21.3.1-1.el9 | 0.00055 | false | ||
| CVE-2023-45803 | Anchore CVE | Medium | python3-pip-wheel-21.3.1-1.el9 | 0.00055 | false | ||
| CVE-2025-21587 | Anchore CVE | High | zulu-17.0.13+11-LTS | 0.00054 | false | ||
| CVE-2025-4598 | Twistlock CVE | Medium | systemd-252-51.el9_6.3 | 0.00053 | false | ||
| CVE-2025-4598 | Anchore CVE | Medium | systemd-252-51.el9_6.3 | 0.00053 | false | ||
| CVE-2025-4598 | Anchore CVE | Medium | systemd-pam-252-51.el9_6.3 | 0.00053 | false | ||
| CVE-2025-4598 | Anchore CVE | Medium | systemd-rpm-macros-252-51.el9_6.3 | 0.00053 | false | ||
| CVE-2025-4598 | Anchore CVE | Medium | systemd-libs-252-51.el9_6.3 | 0.00053 | false | ||
| CVE-2023-33202 | Twistlock CVE | Medium | org.bouncycastle_bcprov-ext-jdk15on-1.69.00.0 | 0.00053 | false | ||
| CVE-2024-12801 | Twistlock CVE | Low | ch.qos.logback_logback-core-1.2.12 | 0.00052 | false | ||
| CVE-2024-12801 | Twistlock CVE | Low | ch.qos.logback_logback-core-1.3.14 | 0.00052 | false | ||
| CVE-2024-12801 | Twistlock CVE | Low | ch.qos.logback_logback-core-1.2.13 | 0.00052 | false | ||
| CVE-2024-7531 | Anchore CVE | Low | nss-sysinit-3.112.0-4.el9_4 | 0.00050 | false | ||
| CVE-2024-7531 | Anchore CVE | Low | nss-softokn-freebl-3.112.0-4.el9_4 | 0.00050 | false | ||
| CVE-2024-7531 | Anchore CVE | Low | nss-softokn-3.112.0-4.el9_4 | 0.00050 | false | ||
| CVE-2024-7531 | Anchore CVE | Low | nspr-4.36.0-4.el9_4 | 0.00050 | false | ||
| CVE-2024-7531 | Anchore CVE | Low | nss-util-3.112.0-4.el9_4 | 0.00050 | false | ||
| CVE-2024-7531 | Anchore CVE | Low | nss-3.112.0-4.el9_4 | 0.00050 | false | ||
| CVE-2024-7531 | Twistlock CVE | Low | nss-3.112.0-4.el9_4 | 0.00050 | false | ||
| CVE-2023-50495 | Anchore CVE | Low | ncurses-libs-6.2-10.20210508.el9_6.2 | 0.00050 | false | ||
| CVE-2023-50495 | Anchore CVE | Low | ncurses-base-6.2-10.20210508.el9_6.2 | 0.00050 | false | ||
| CVE-2023-50495 | Twistlock CVE | Low | ncurses-6.2-10.20210508.el9_6.2 | 0.00050 | false | ||
| CVE-2025-45582 | Twistlock CVE | Medium | tar-2:1.34-7.el9 | 0.00049 | false | ||
| CVE-2024-35195 | Twistlock CVE | Medium | python-requests-2.25.1-10.el9_6 | 0.00044 | false | ||
| CVE-2023-5752 | Twistlock CVE | Low | python-pip-21.3.1-1.el9 | 0.00044 | false | ||
| CVE-2023-5752 | Anchore CVE | Low | python3-pip-wheel-21.3.1-1.el9 | 0.00044 | false | ||
| CVE-2023-2976 | Twistlock CVE | High | guava-31.1.0.jre | 0.00043 | false | ||
| CVE-2023-2976 | Twistlock CVE | High | com.google.guava_guava-31.1-jre | 0.00043 | false | ||
| CVE-2022-0839 | Twistlock CVE | Critical | liquibase-core-4.4.2 | 0.00043 | false | ||
| CVE-2025-31651 | Anchore CVE | Critical | tomcat-juli-10.1.26 | 0.00040 | false | ||
| CVE-2025-31651 | Anchore CVE | Critical | tomcat-jdbc-10.1.26 | 0.00040 | false | ||
| CVE-2025-11226 | Twistlock CVE | Medium | ch.qos.logback_logback-core-1.3.14 | 0.00037 | false | ||
| CVE-2025-11226 | Twistlock CVE | Medium | ch.qos.logback_logback-core-1.2.12 | 0.00037 | false | ||
| CVE-2025-11226 | Twistlock CVE | Medium | ch.qos.logback_logback-core-1.2.13 | 0.00037 | false | ||
| CVE-2013-0340 | Anchore CVE | Medium | expat-2.5.0-5.el9_6 | 0.00037 | false | ||
| CVE-2025-22233 | Twistlock CVE | Low | spring-context-5.3.34 | 0.00036 | false | ||
| CVE-2025-22233 | Twistlock CVE | Low | spring-context-5.3.27 | 0.00036 | false | ||
| CVE-2025-5915 | Anchore CVE | Low | libarchive-3.5.3-6.el9_6 | 0.00035 | false | ||
| CVE-2025-5915 | Twistlock CVE | Low | libarchive-3.5.3-6.el9_6 | 0.00035 | false | ||
| CVE-2024-43167 | Anchore CVE | Low | unbound-libs-1.16.2-19.el9_6.1 | 0.00034 | false | ||
| CVE-2024-43167 | Twistlock CVE | Low | unbound-1.16.2-19.el9_6.1 | 0.00034 | false | ||
| CVE-2023-24621 | Twistlock CVE | High | com.esotericsoftware.yamlbeans_yamlbeans-1.11 | 0.00034 | false | ||
| CVE-2025-58057 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.112.Final | 0.00033 | false | ||
| CVE-2025-49124 | Anchore CVE | High | tomcat-jdbc-10.1.26 | 0.00033 | false | ||
| CVE-2025-49124 | Anchore CVE | High | tomcat-juli-10.1.26 | 0.00033 | false | ||
| CVE-2025-1371 | Anchore CVE | Low | elfutils-default-yama-scope-0.192-6.el9_6 | 0.00033 | false | ||
| CVE-2025-1371 | Anchore CVE | Low | elfutils-libelf-0.192-6.el9_6 | 0.00033 | false | ||
| CVE-2025-1371 | Anchore CVE | Low | elfutils-libs-0.192-6.el9_6 | 0.00033 | false | ||
| CVE-2025-1371 | Twistlock CVE | Low | elfutils-0.192-6.el9_6 | 0.00033 | false | ||
| CVE-2025-5916 | Anchore CVE | Low | libarchive-3.5.3-6.el9_6 | 0.00031 | false | ||
| CVE-2025-5916 | Twistlock CVE | Low | libarchive-3.5.3-6.el9_6 | 0.00031 | false | ||
| CVE-2025-6170 | Anchore CVE | Low | libxml2-2.9.13-12.el9_6 | 0.00029 | false | ||
| CVE-2025-6170 | Twistlock CVE | Low | libxml2-2.9.13-12.el9_6 | 0.00029 | false | ||
| CVE-2025-9230 | Anchore CVE | Medium | openssl-libs-1:3.2.2-6.el9_5.1 | 0.00026 | false | ||
| CVE-2025-9230 | Anchore CVE | Medium | openssl-1:3.2.2-6.el9_5.1 | 0.00026 | false | ||
| CVE-2025-9230 | Twistlock CVE | Medium | openssl-1:3.2.2-6.el9_5.1 | 0.00026 | false | ||
| CVE-2025-5917 | Anchore CVE | Low | libarchive-3.5.3-6.el9_6 | 0.00026 | false | ||
| CVE-2025-5917 | Twistlock CVE | Low | libarchive-3.5.3-6.el9_6 | 0.00026 | false | ||
| CVE-2025-58056 | Twistlock CVE | Low | io.netty_netty-codec-http-4.1.112.Final | 0.00026 | false | ||
| CVE-2025-5245 | Anchore CVE | Medium | gdb-gdbserver-14.2-4.1.el9_6 | 0.00026 | false | ||
| CVE-2025-5245 | Twistlock CVE | Medium | gdb-14.2-4.1.el9_6 | 0.00026 | false | ||
| CVE-2024-57360 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00026 | false | ||
| CVE-2024-57360 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00026 | false | ||
| CVE-2025-9714 | Anchore CVE | Medium | libxml2-2.9.13-12.el9_6 | 0.00025 | false | ||
| CVE-2025-9714 | Twistlock CVE | Medium | libxml2-2.9.13-12.el9_6 | 0.00025 | false | ||
| CVE-2025-5918 | Anchore CVE | Low | libarchive-3.5.3-6.el9_6 | 0.00025 | false | ||
| CVE-2025-5918 | Twistlock CVE | Low | libarchive-3.5.3-6.el9_6 | 0.00025 | false | ||
| CVE-2025-5278 | Anchore CVE | Medium | coreutils-single-8.32-39.el9 | 0.00025 | false | ||
| CVE-2025-5278 | Twistlock CVE | Medium | coreutils-8.32-39.el9 | 0.00025 | false | ||
| CVE-2024-47535 | Twistlock CVE | Medium | io.netty_netty-common-4.1.112.Final | 0.00024 | false | ||
| CVE-2025-9232 | Anchore CVE | Low | openssl-1:3.2.2-6.el9_5.1 | 0.00023 | false | ||
| CVE-2025-9232 | Anchore CVE | Low | openssl-libs-1:3.2.2-6.el9_5.1 | 0.00023 | false | ||
| CVE-2025-9232 | Twistlock CVE | Low | openssl-1:3.2.2-6.el9_5.1 | 0.00023 | false | ||
| CVE-2025-52999 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-core-2.13.5 | 0.00023 | false | ||
| CVE-2024-7143 | Twistlock CVE | Medium | python-urllib3-1.26.5-6.el9 | 0.00023 | false | ||
| CVE-2023-24620 | Twistlock CVE | Medium | com.esotericsoftware.yamlbeans_yamlbeans-1.11 | 0.00021 | false | ||
| CVE-2025-11495 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00020 | false | ||
| CVE-2025-11495 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00020 | false | ||
| CVE-2025-11494 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00020 | false | ||
| CVE-2025-11494 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00020 | false | ||
| CVE-2025-11414 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00020 | false | ||
| CVE-2025-11414 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00020 | false | ||
| CVE-2025-11413 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00020 | false | ||
| CVE-2025-11413 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00020 | false | ||
| CVE-2025-11412 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00020 | false | ||
| CVE-2025-11412 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00020 | false | ||
| CVE-2025-11083 | Anchore CVE | Medium | gdb-gdbserver-14.2-4.1.el9_6 | 0.00020 | false | ||
| CVE-2025-11083 | Twistlock CVE | Medium | gdb-14.2-4.1.el9_6 | 0.00020 | false | ||
| CVE-2025-11081 | Anchore CVE | Medium | gdb-gdbserver-14.2-4.1.el9_6 | 0.00020 | false | ||
| CVE-2025-11081 | Twistlock CVE | Medium | gdb-14.2-4.1.el9_6 | 0.00020 | false | ||
| CVE-2025-46701 | Anchore CVE | High | tomcat-jdbc-10.1.26 | 0.00019 | false | ||
| CVE-2025-46701 | Anchore CVE | High | tomcat-juli-10.1.26 | 0.00019 | false | ||
| CVE-2025-11082 | Anchore CVE | Medium | gdb-gdbserver-14.2-4.1.el9_6 | 0.00018 | false | ||
| CVE-2025-11082 | Twistlock CVE | Medium | gdb-14.2-4.1.el9_6 | 0.00018 | false | ||
| CVE-2024-0232 | Anchore CVE | Low | sqlite-libs-3.34.1-8.el9_6 | 0.00018 | false | ||
| CVE-2024-0232 | Twistlock CVE | Low | sqlite-3.34.1-8.el9_6 | 0.00018 | false | ||
| CVE-2025-3198 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00016 | false | ||
| CVE-2025-3198 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00016 | false | ||
| CVE-2025-55668 | Anchore CVE | Medium | tomcat-juli-10.1.26 | 0.00015 | false | ||
| CVE-2025-55668 | Anchore CVE | Medium | tomcat-jdbc-10.1.26 | 0.00015 | false | ||
| CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.13.5 | 0.00015 | false | ||
| CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.13.5 | 0.00015 | false | ||
| CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.13.5 | 0.00015 | false | ||
| CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.15.4 | 0.00015 | false | ||
| CVE-2024-25260 | Anchore CVE | Low | elfutils-libelf-0.192-6.el9_6 | 0.00014 | false | ||
| CVE-2024-25260 | Anchore CVE | Low | elfutils-default-yama-scope-0.192-6.el9_6 | 0.00014 | false | ||
| CVE-2024-25260 | Anchore CVE | Low | elfutils-libs-0.192-6.el9_6 | 0.00014 | false | ||
| CVE-2024-25260 | Twistlock CVE | Low | elfutils-0.192-6.el9_6 | 0.00014 | false | ||
| CVE-2025-4516 | Anchore CVE | Medium | python3-libs-3.9.21-2.el9_6.2 | 0.00013 | false | ||
| CVE-2025-4516 | Anchore CVE | Medium | python3-3.9.21-2.el9_6.2 | 0.00013 | false | ||
| CVE-2025-4516 | Twistlock CVE | Medium | python3.9-3.9.21-2.el9_6.2 | 0.00013 | false | ||
| CVE-2025-11840 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00013 | false | ||
| CVE-2025-11840 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00013 | false | ||
| CVE-2025-11839 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00013 | false | ||
| CVE-2025-11839 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00013 | false | ||
| CVE-2023-30571 | Anchore CVE | Medium | libarchive-3.5.3-6.el9_6 | 0.00013 | false | ||
| CVE-2023-30571 | Twistlock CVE | Medium | libarchive-3.5.3-6.el9_6 | 0.00013 | false | ||
| CVE-2024-25710 | Twistlock CVE | Medium | org.apache.commons_commons-compress-1.21 | 0.00012 | false | ||
| CVE-2020-8908 | Twistlock CVE | Low | guava-31.1.0.jre | 0.00011 | false | ||
| CVE-2020-8908 | Twistlock CVE | Low | com.google.guava_guava-31.1-jre | 0.00011 | false | ||
| CVE-2022-47011 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00009 | false | ||
| CVE-2022-47011 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00009 | false | ||
| CVE-2022-47010 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00009 | false | ||
| CVE-2022-47010 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00009 | false | ||
| CVE-2022-47007 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00009 | false | ||
| CVE-2022-47007 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00009 | false | ||
| CVE-2025-62813 | Anchore CVE | Medium | lz4-libs-1.9.3-5.el9 | N/A | false | ||
| CVE-2025-61795 | Anchore CVE | Medium | tomcat-jdbc-10.1.26 | N/A | false | ||
| CVE-2025-61795 | Anchore CVE | Medium | tomcat-juli-10.1.26 | N/A | false | ||
| CVE-2025-60753 | Anchore CVE | Medium | libarchive-3.5.3-6.el9_6 | N/A | false | ||
| CVE-2025-60753 | Twistlock CVE | Medium | libarchive-3.5.3-6.el9_6 | N/A | false | ||
| CVE-2025-6075 | Anchore CVE | Low | python3-libs-3.9.21-2.el9_6.2 | N/A | false | ||
| CVE-2025-6075 | Anchore CVE | Low | python3-3.9.21-2.el9_6.2 | N/A | false | ||
| CVE-2025-6075 | Twistlock CVE | Low | python3.9-3.9.21-2.el9_6.2 | N/A | false | ||
| CVE-2025-55752 | Anchore CVE | High | tomcat-jdbc-10.1.26 | N/A | false | ||
| CVE-2025-55752 | Anchore CVE | High | tomcat-juli-10.1.26 | N/A | false | ||
| CVE-2025-53066 | Anchore CVE | High | zulu-17.0.13+11-LTS | N/A | false | ||
| CVE-2025-53057 | Anchore CVE | Medium | zulu-17.0.13+11-LTS | N/A | false | ||
| CVE-2025-52099 | Twistlock CVE | Medium | sqlite-3.34.1-8.el9_6 | N/A | false | ||
| CVE-2025-52099 | Anchore CVE | Medium | sqlite-libs-3.34.1-8.el9_6 | N/A | false | ||
| CVE-2025-12863 | Twistlock CVE | High | libxml2-2.9.13-12.el9_6 | N/A | false | ||
| CVE-2025-12863 | Anchore CVE | High | libxml2-2.9.13-12.el9_6 | N/A | false | ||
| CVE-2025-11411 | Twistlock CVE | Medium | unbound-1.16.2-19.el9_6.1 | N/A | false | ||
| CVE-2025-11411 | Anchore CVE | Medium | unbound-libs-1.16.2-19.el9_6.1 | N/A | false | ||
| CVE-2025-10966 | Twistlock CVE | Medium | curl-7.76.1-31.el9_6.1 | N/A | false | ||
| CVE-2025-10966 | Anchore CVE | Medium | libcurl-minimal-7.76.1-31.el9_6.1 | N/A | false | ||
| CVE-2025-10966 | Anchore CVE | Medium | curl-minimal-7.76.1-31.el9_6.1 | N/A | false | ||
| CVE-2023-2222 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | N/A | false | ||
| e07d84b039b0e6fcea42fbda1d378647 | Anchore Compliance | Critical | N/A | N/A | |||
| b18c88ddeab24abfb92ae2ccddb0b022 | Anchore Compliance | Low | N/A | N/A | |||
| addbb93c22e9b0988b8b40392a4538cb | Anchore Compliance | Low | N/A | N/A | |||
| PRISMA-2023-0067 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-core-2.13.5 | N/A | N/A | ||
| PRISMA-2021-0055 | Twistlock CVE | Low | commons-codec_commons-codec-1.11 | N/A | N/A | ||
| GHSA-xq3w-v528-46rv | Anchore CVE | Medium | netty-common-4.1.112.Final | N/A | N/A | ||
| GHSA-wxr5-93ph-8wr9 | Anchore CVE | High | commons-beanutils-1.9.4 | N/A | N/A | ||
| GHSA-wxr5-93ph-8wr9 | Anchore CVE | High | commons-beanutils-1.9.4 | N/A | N/A | ||
| GHSA-wxr5-93ph-8wr9 | Anchore CVE | High | commons-beanutils-1.9.4 | N/A | N/A | ||
| GHSA-wxr5-93ph-8wr9 | Anchore CVE | High | commons-beanutils-1.9.4 | N/A | N/A | ||
| GHSA-wjxj-5m7g-mg7q | Anchore CVE | Medium | bcprov-ext-jdk15on-1.69 | N/A | N/A | ||
| GHSA-vmq6-5m68-f53m | Anchore CVE | High | logback-classic-1.2.11 | N/A | N/A | ||
| GHSA-vmq6-5m68-f53m | Anchore CVE | High | logback-core-1.2.12 | N/A | N/A | ||
| GHSA-vj49-j7rc-h54f | Anchore CVE | Medium | yamlbeans-1.11 | N/A | N/A | ||
| GHSA-v435-xc8x-wvr9 | Anchore CVE | Medium | bcprov-jdk18on-1.76 | N/A | N/A | ||
| GHSA-v435-xc8x-wvr9 | Anchore CVE | Medium | bcprov-jdk18on-1.76 | N/A | N/A | ||
| GHSA-v2xm-76pq-phcf | Anchore CVE | Medium | classgraph-4.8.78 | N/A | N/A | ||
| GHSA-rc42-6c7j-7h5r | Anchore CVE | High | spring-boot-2.7.12 | N/A | N/A | ||
| GHSA-rc42-6c7j-7h5r | Anchore CVE | High | spring-boot-2.7.11 | N/A | N/A | ||
| GHSA-rc42-6c7j-7h5r | Anchore CVE | High | spring-boot-2.7.12 | N/A | N/A | ||
| GHSA-qh8g-58pp-2wxh | Anchore CVE | Medium | jetty-http-10.0.23 | N/A | N/A | ||
| GHSA-prj3-ccx8-p6x4 | Anchore CVE | High | netty-codec-http2-4.1.112.Final | N/A | N/A | ||
| GHSA-pr98-23f8-jwxv | Anchore CVE | Medium | logback-core-1.2.13 | N/A | N/A | ||
| GHSA-pr98-23f8-jwxv | Anchore CVE | Medium | logback-core-1.2.12 | N/A | N/A | ||
| GHSA-pr98-23f8-jwxv | Anchore CVE | Medium | logback-core-1.3.14 | N/A | N/A | ||
| GHSA-pr98-23f8-jwxv | Anchore CVE | Medium | logback-core-1.2.13 | N/A | N/A | ||
| GHSA-p72g-pv48-7w9x | Anchore CVE | Critical | tika-parser-pdf-module-2.9.0 | N/A | N/A | ||
| GHSA-p72g-pv48-7w9x | Anchore CVE | Critical | tika-parser-pdf-module-2.9.0 | N/A | N/A | ||
| GHSA-m44j-cfrm-g8qc | Anchore CVE | Medium | bcprov-jdk18on-1.76 | N/A | N/A | ||
| GHSA-m44j-cfrm-g8qc | Anchore CVE | Medium | bcprov-jdk18on-1.76 | N/A | N/A | ||
| GHSA-jw7r-rxff-gv24 | Anchore CVE | Medium | apache-mime4j-core-0.8.9 | N/A | N/A | ||
| GHSA-jw7r-rxff-gv24 | Anchore CVE | Medium | apache-mime4j-core-0.8.9 | N/A | N/A | ||
| GHSA-jmp9-x22r-554x | Anchore CVE | High | spring-core-5.3.27 | N/A | N/A | ||
| GHSA-jmp9-x22r-554x | Anchore CVE | High | spring-core-5.3.34 | N/A | N/A | ||
| GHSA-jmp9-x22r-554x | Anchore CVE | High | spring-core-5.3.34 | N/A | N/A | ||
| GHSA-jm7r-4pg6-gf26 | Anchore CVE | High | yamlbeans-1.11 | N/A | N/A | ||
| GHSA-j288-q9x7-2f5v | Anchore CVE | Medium | commons-lang3-3.12.0 | N/A | N/A | ||
| GHSA-j288-q9x7-2f5v | Anchore CVE | Medium | commons-lang3-3.16.0 | N/A | N/A | ||
| GHSA-j288-q9x7-2f5v | Anchore CVE | Medium | commons-lang3-3.9 | N/A | N/A | ||
| GHSA-j288-q9x7-2f5v | Anchore CVE | Medium | commons-lang3-3.12.0 | N/A | N/A | ||
| GHSA-j288-q9x7-2f5v | Anchore CVE | Medium | commons-lang3-3.12.0 | N/A | N/A | ||
| GHSA-j288-q9x7-2f5v | Anchore CVE | Medium | commons-lang-2.6 | N/A | N/A | ||
| GHSA-j288-q9x7-2f5v | Anchore CVE | Medium | commons-lang-2.6 | N/A | N/A | ||
| GHSA-hr8g-6v94-x4m9 | Anchore CVE | Medium | bcprov-ext-jdk15on-1.69 | N/A | N/A | ||
| GHSA-h46c-h94j-95f3 | Anchore CVE | High | jackson-core-2.13.5 | N/A | N/A | ||
| GHSA-h46c-h94j-95f3 | Anchore CVE | High | jackson-core-2.13.5 | N/A | N/A | ||
| GHSA-gmg8-593g-7mv3 | Anchore CVE | Medium | poi-ooxml-5.2.3 | N/A | N/A | ||
| GHSA-gmg8-593g-7mv3 | Anchore CVE | Medium | poi-ooxml-5.2.3 | N/A | N/A | ||
| GHSA-gm62-rw4g-vrc4 | Anchore CVE | High | logback-core-1.2.12 | N/A | N/A | ||
| GHSA-g8m5-722r-8whq | Anchore CVE | Medium | jetty-server-10.0.23 | N/A | N/A | ||
| GHSA-fghv-69vj-qj49 | Anchore CVE | Low | netty-codec-http-4.1.112.Final | N/A | N/A | ||
| GHSA-9cmq-m9j5-mvww | Anchore CVE | Medium | spring-expression-5.3.34 | N/A | N/A | ||
| GHSA-9cmq-m9j5-mvww | Anchore CVE | Medium | spring-expression-5.3.34 | N/A | N/A | ||
| GHSA-9cmq-m9j5-mvww | Anchore CVE | Medium | spring-expression-5.3.27 | N/A | N/A | ||
| GHSA-8xfc-gm6g-vgpv | Anchore CVE | Medium | bcprov-jdk18on-1.76 | N/A | N/A | ||
| GHSA-8xfc-gm6g-vgpv | Anchore CVE | Medium | bcprov-jdk18on-1.76 | N/A | N/A | ||
| GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-31.1-jre | N/A | N/A | ||
| GHSA-78wr-2p64-hpwj | Anchore CVE | High | commons-io-2.8.0 | N/A | N/A | ||
| GHSA-78wr-2p64-hpwj | Anchore CVE | High | commons-io-2.11.0 | N/A | N/A | ||
| GHSA-735f-pc8j-v9w8 | Anchore CVE | High | protobuf-java-3.20.3 | N/A | N/A | ||
| GHSA-735f-pc8j-v9w8 | Anchore CVE | High | protobuf-java-3.20.3 | N/A | N/A | ||
| GHSA-6v67-2wr5-gvf4 | Anchore CVE | Low | logback-core-1.2.12 | N/A | N/A | ||
| GHSA-6v67-2wr5-gvf4 | Anchore CVE | Low | logback-core-1.2.13 | N/A | N/A | ||
| GHSA-6v67-2wr5-gvf4 | Anchore CVE | Low | logback-core-1.2.13 | N/A | N/A | ||
| GHSA-6v67-2wr5-gvf4 | Anchore CVE | Low | logback-core-1.3.14 | N/A | N/A | ||
| GHSA-67mf-3cr5-8w23 | Anchore CVE | Medium | bcprov-jdk18on-1.76 | N/A | N/A | ||
| GHSA-67mf-3cr5-8w23 | Anchore CVE | Medium | bcprov-jdk18on-1.76 | N/A | N/A | ||
| GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-31.1-jre | N/A | N/A | ||
| GHSA-4wp7-92pw-q264 | Anchore CVE | Low | spring-context-5.3.34 | N/A | N/A | ||
| GHSA-4wp7-92pw-q264 | Anchore CVE | Low | spring-context-5.3.34 | N/A | N/A | ||
| GHSA-4wp7-92pw-q264 | Anchore CVE | Low | spring-context-5.3.27 | N/A | N/A | ||
| GHSA-4jrv-ppp4-jm57 | Anchore CVE | High | gson-2.8.6 | N/A | N/A | ||
| GHSA-4h8f-2wvx-gg5w | Anchore CVE | Medium | bcprov-jdk18on-1.76 | N/A | N/A | ||
| GHSA-4h8f-2wvx-gg5w | Anchore CVE | Medium | bcprov-jdk18on-1.76 | N/A | N/A | ||
| GHSA-4gc7-5j7h-4qph | Anchore CVE | Medium | spring-context-5.3.34 | N/A | N/A | ||
| GHSA-4gc7-5j7h-4qph | Anchore CVE | Medium | spring-context-5.3.27 | N/A | N/A | ||
| GHSA-4gc7-5j7h-4qph | Anchore CVE | Medium | spring-context-5.3.34 | N/A | N/A | ||
| GHSA-4g9r-vxhx-9pgx | Anchore CVE | Medium | commons-compress-1.21 | N/A | N/A | ||
| GHSA-4g8c-wm8x-jfhw | Anchore CVE | High | netty-handler-4.1.112.Final | N/A | N/A | ||
| GHSA-4cx2-fc23-5wg6 | Anchore CVE | Medium | bcpkix-jdk18on-1.76 | N/A | N/A | ||
| GHSA-4cx2-fc23-5wg6 | Anchore CVE | Medium | bcpkix-jdk18on-1.76 | N/A | N/A | ||
| GHSA-4265-ccf5-phj5 | Anchore CVE | Medium | commons-compress-1.21 | N/A | N/A | ||
| GHSA-3p8m-j85q-pgmj | Anchore CVE | Medium | netty-codec-4.1.112.Final | N/A | N/A | ||
| GHSA-389x-839f-4rhx | Anchore CVE | Medium | netty-common-4.1.112.Final | N/A | N/A | ||
| GHSA-2pj2-gchf-wmw7 | Anchore CVE | Medium | zip4j-2.11.1 | N/A | N/A | ||
| GHSA-25qh-j22f-pwp8 | Anchore CVE | Medium | logback-core-1.2.13 | N/A | N/A | ||
| GHSA-25qh-j22f-pwp8 | Anchore CVE | Medium | logback-core-1.2.12 | N/A | N/A | ||
| GHSA-25qh-j22f-pwp8 | Anchore CVE | Medium | logback-core-1.3.14 | N/A | N/A | ||
| GHSA-25qh-j22f-pwp8 | Anchore CVE | Medium | logback-core-1.2.13 | N/A | N/A | ||
| CCE-86570-9 | OSCAP Compliance | Medium | N/A | N/A | |||
| CCE-83450-7 | OSCAP Compliance | High | N/A | N/A |
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=blackduck/seeker/seeker-sensor&tag=2025.1.0&branch=master
Tasks
Contributor:
-
Apply the StatusReview label to this issue for a merge request reviewand wait for feedback
OR
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue for a VAT justifications reviewand wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
RevieworVerificationlabel will be removed and the issue will be sent back toTo-Do. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theRevieworVerificationlabel.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.