chore(findings): blackduck/seeker/seeker-server
Summary
blackduck/seeker/seeker-server has 548 new findings discovered during continuous monitoring.
Layer: redhat/ubi/ubi9:9.5 is EOL, please update if possible
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=blackduck/seeker/seeker-server&tag=2025.1.0&branch=master
EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.
KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.
id | source | severity | package | impact | workaround | epss_score | kev |
---|---|---|---|---|---|---|---|
CVE-2025-24813 | Anchore CVE | Critical | tomcat-jdbc-10.1.26 | 0.94157 | true | ||
CVE-2025-24813 | Anchore CVE | Critical | tomcat-juli-10.1.26 | 0.94157 | true | ||
CVE-2019-9193 | Anchore CVE | High | postgresql-10.19 | 0.93587 | false | ||
CVE-2024-50379 | Anchore CVE | Critical | tomcat-jdbc-10.1.26 | 0.87518 | false | ||
CVE-2024-50379 | Anchore CVE | Critical | tomcat-juli-10.1.26 | 0.87518 | false | ||
CVE-2025-1094 | Anchore CVE | High | postgresql-10.19 | 0.77815 | false | ||
CVE-2025-1094 | Anchore CVE | High | postgresql-14.15 | 0.77815 | false | ||
CVE-2016-1000027 | Twistlock CVE | Critical | spring-web-5.3.20 | 0.59211 | false | ||
CVE-2023-20860 | Twistlock CVE | High | spring-web-5.3.20 | 0.57834 | false | ||
CVE-2023-20860 | Twistlock CVE | High | spring-core-5.3.20 | 0.57834 | false | ||
CVE-2023-20860 | Anchore CVE | High | spring-core-5.3.20 | 0.57834 | false | ||
CVE-2024-22243 | Twistlock CVE | High | spring-web-5.3.20 | 0.48232 | false | ||
CVE-2023-34034 | Twistlock CVE | Critical | spring-security-core-5.6.9 | 0.44571 | false | ||
CVE-2023-34034 | Twistlock CVE | Critical | spring-security-config-5.6.9 | 0.44571 | false | ||
CVE-2023-34034 | Anchore CVE | Critical | spring-security-core-5.6.9 | 0.44571 | false | ||
CVE-2024-22259 | Twistlock CVE | Low | spring-web-5.3.20 | 0.30512 | false | ||
CVE-2024-22259 | Twistlock CVE | Low | spring-core-5.3.20 | 0.30512 | false | ||
CVE-2024-22259 | Anchore CVE | High | spring-core-5.3.20 | 0.30512 | false | ||
CVE-2024-56337 | Anchore CVE | Critical | tomcat-juli-10.1.26 | 0.18794 | false | ||
CVE-2024-56337 | Anchore CVE | Critical | tomcat-jdbc-10.1.26 | 0.18794 | false | ||
CVE-2024-38821 | Twistlock CVE | Critical | spring-security-web-5.6.9 | 0.18565 | false | ||
CVE-2022-34169 | Twistlock CVE | High | org.apache.xalan_xalan-2.7.2 | 0.08073 | false | ||
CVE-2024-7264 | Twistlock CVE | Low | curl-7.76.1-31.el9_6.1 | 0.07100 | false | ||
CVE-2024-7264 | Anchore CVE | Low | curl-minimal-7.76.1-31.el9_6.1 | 0.07100 | false | ||
CVE-2024-7264 | Anchore CVE | Low | libcurl-minimal-7.76.1-31.el9_6.1 | 0.07100 | false | ||
CVE-2024-54677 | Anchore CVE | Medium | tomcat-jdbc-10.1.26 | 0.06971 | false | ||
CVE-2024-54677 | Anchore CVE | Medium | tomcat-juli-10.1.26 | 0.06971 | false | ||
CVE-2024-1931 | Twistlock CVE | Medium | unbound-1.16.2-19.el9_6.1 | 0.06753 | false | ||
CVE-2024-1931 | Anchore CVE | Medium | unbound-libs-1.16.2-19.el9_6.1 | 0.06753 | false | ||
CVE-2024-22262 | Twistlock CVE | High | spring-web-5.3.20 | 0.06592 | false | ||
CVE-2024-10979 | Anchore CVE | High | postgresql-10.19 | 0.05251 | false | ||
CVE-2024-33655 | Twistlock CVE | Low | unbound-1.16.2-19.el9_6.1 | 0.04101 | false | ||
CVE-2024-33655 | Anchore CVE | Low | unbound-libs-1.16.2-19.el9_6.1 | 0.04101 | false | ||
CVE-2022-1552 | Twistlock CVE | High | postgres-10.19 | 0.02844 | false | ||
CVE-2022-1552 | Anchore CVE | High | postgresql-10.19 | 0.02844 | false | ||
CVE-2024-56433 | Anchore CVE | Low | shadow-utils-2:4.9-12.el9 | 0.02806 | false | ||
CVE-2025-31650 | Anchore CVE | High | tomcat-juli-10.1.26 | 0.01761 | false | ||
CVE-2025-31650 | Anchore CVE | High | tomcat-jdbc-10.1.26 | 0.01761 | false | ||
CVE-2022-25647 | Twistlock CVE | High | com.google.code.gson_gson-2.8.6 | 0.01666 | false | ||
CVE-2015-0250 | Anchore CVE | Medium | svg-1.6.0 | 0.01042 | false | ||
CVE-2015-0250 | Anchore CVE | Medium | util-1.6.0 | 0.01042 | false | ||
CVE-2015-0250 | Anchore CVE | Medium | gui-1.6.0 | 0.01042 | false | ||
CVE-2015-0250 | Anchore CVE | Medium | pdf-1.6.0 | 0.01042 | false | ||
CVE-2015-0250 | Anchore CVE | Medium | svggen-1.6.0 | 0.01042 | false | ||
CVE-2015-0250 | Anchore CVE | Medium | dom-1.6.0 | 0.01042 | false | ||
CVE-2015-0250 | Anchore CVE | Medium | xml-1.6.0 | 0.01042 | false | ||
CVE-2015-0250 | Anchore CVE | Medium | bridge-1.6.0 | 0.01042 | false | ||
CVE-2015-0250 | Anchore CVE | Medium | transcoder-1.6.0 | 0.01042 | false | ||
CVE-2015-0250 | Anchore CVE | Medium | parser-1.6.0 | 0.01042 | false | ||
CVE-2015-0250 | Anchore CVE | Medium | css-1.6.0 | 0.01042 | false | ||
CVE-2015-0250 | Anchore CVE | Medium | awt-1.6.0 | 0.01042 | false | ||
CVE-2024-52316 | Anchore CVE | Critical | tomcat-jdbc-10.1.26 | 0.00992 | false | ||
CVE-2024-52316 | Anchore CVE | Critical | tomcat-juli-10.1.26 | 0.00992 | false | ||
CVE-2018-8013 | Anchore CVE | Critical | parser-1.6.0 | 0.00980 | false | ||
CVE-2018-8013 | Anchore CVE | Critical | util-1.6.0 | 0.00980 | false | ||
CVE-2018-8013 | Anchore CVE | Critical | awt-1.6.0 | 0.00980 | false | ||
CVE-2018-8013 | Anchore CVE | Critical | bridge-1.6.0 | 0.00980 | false | ||
CVE-2018-8013 | Anchore CVE | Critical | transcoder-1.6.0 | 0.00980 | false | ||
CVE-2018-8013 | Anchore CVE | Critical | css-1.6.0 | 0.00980 | false | ||
CVE-2018-8013 | Anchore CVE | Critical | gui-1.6.0 | 0.00980 | false | ||
CVE-2018-8013 | Anchore CVE | Critical | svggen-1.6.0 | 0.00980 | false | ||
CVE-2018-8013 | Anchore CVE | Critical | xml-1.6.0 | 0.00980 | false | ||
CVE-2018-8013 | Anchore CVE | Critical | pdf-1.6.0 | 0.00980 | false | ||
CVE-2018-8013 | Anchore CVE | Critical | dom-1.6.0 | 0.00980 | false | ||
CVE-2018-8013 | Anchore CVE | Critical | svg-1.6.0 | 0.00980 | false | ||
CVE-2022-2625 | Twistlock CVE | High | postgres-10.19 | 0.00905 | false | ||
CVE-2022-2625 | Anchore CVE | High | postgresql-10.19 | 0.00905 | false | ||
CVE-2019-17566 | Anchore CVE | High | awt-1.6.0 | 0.00815 | false | ||
CVE-2019-17566 | Anchore CVE | High | pdf-1.6.0 | 0.00815 | false | ||
CVE-2019-17566 | Anchore CVE | High | bridge-1.6.0 | 0.00815 | false | ||
CVE-2019-17566 | Anchore CVE | High | dom-1.6.0 | 0.00815 | false | ||
CVE-2019-17566 | Anchore CVE | High | transcoder-1.6.0 | 0.00815 | false | ||
CVE-2019-17566 | Anchore CVE | High | svggen-1.6.0 | 0.00815 | false | ||
CVE-2019-17566 | Anchore CVE | High | util-1.6.0 | 0.00815 | false | ||
CVE-2019-17566 | Anchore CVE | High | svg-1.6.0 | 0.00815 | false | ||
CVE-2019-17566 | Anchore CVE | High | xml-1.6.0 | 0.00815 | false | ||
CVE-2019-17566 | Anchore CVE | High | parser-1.6.0 | 0.00815 | false | ||
CVE-2019-17566 | Anchore CVE | High | gui-1.6.0 | 0.00815 | false | ||
CVE-2019-17566 | Anchore CVE | High | css-1.6.0 | 0.00815 | false | ||
CVE-2021-3538 | Anchore CVE | Critical | github.com/satori/go.uuid-v1.2.0 | 0.00809 | false | ||
CVE-2021-3538 | Anchore CVE | Critical | github.com/satori/go.uuid-v1.2.0 | 0.00809 | false | ||
CVE-2021-3538 | Anchore CVE | Critical | github.com/satori/go.uuid-v1.2.0 | 0.00809 | false | ||
CVE-2021-3538 | Anchore CVE | Critical | github.com/satori/go.uuid-v1.2.0 | 0.00809 | false | ||
CVE-2023-20863 | Twistlock CVE | High | spring-expression-5.3.20 | 0.00756 | false | ||
CVE-2023-20863 | Twistlock CVE | Medium | spring-web-5.3.20 | 0.00756 | false | ||
CVE-2023-20863 | Twistlock CVE | Medium | spring-core-5.3.20 | 0.00756 | false | ||
CVE-2023-20863 | Anchore CVE | Medium | spring-core-5.3.20 | 0.00756 | false | ||
CVE-2012-5783 | Anchore CVE | Medium | commons-httpclient-3.1 | 0.00649 | false | ||
CVE-2020-11987 | Anchore CVE | High | gui-1.6.0 | 0.00579 | false | ||
CVE-2020-11987 | Anchore CVE | High | dom-1.6.0 | 0.00579 | false | ||
CVE-2020-11987 | Anchore CVE | High | parser-1.6.0 | 0.00579 | false | ||
CVE-2020-11987 | Anchore CVE | High | xml-1.6.0 | 0.00579 | false | ||
CVE-2020-11987 | Anchore CVE | High | util-1.6.0 | 0.00579 | false | ||
CVE-2020-11987 | Anchore CVE | High | transcoder-1.6.0 | 0.00579 | false | ||
CVE-2020-11987 | Anchore CVE | High | awt-1.6.0 | 0.00579 | false | ||
CVE-2020-11987 | Anchore CVE | High | svggen-1.6.0 | 0.00579 | false | ||
CVE-2020-11987 | Anchore CVE | High | pdf-1.6.0 | 0.00579 | false | ||
CVE-2020-11987 | Anchore CVE | High | css-1.6.0 | 0.00579 | false | ||
CVE-2020-11987 | Anchore CVE | High | svg-1.6.0 | 0.00579 | false | ||
CVE-2020-11987 | Anchore CVE | High | bridge-1.6.0 | 0.00579 | false | ||
CVE-2024-9681 | Twistlock CVE | Low | curl-7.76.1-31.el9_6.1 | 0.00571 | false | ||
CVE-2024-9681 | Anchore CVE | Low | curl-minimal-7.76.1-31.el9_6.1 | 0.00571 | false | ||
CVE-2024-9681 | Anchore CVE | Low | libcurl-minimal-7.76.1-31.el9_6.1 | 0.00571 | false | ||
CVE-2020-13956 | Anchore CVE | Medium | commons-httpclient-3.1 | 0.00505 | false | ||
CVE-2023-20861 | Twistlock CVE | Medium | spring-core-5.3.20 | 0.00373 | false | ||
CVE-2023-20861 | Twistlock CVE | Medium | spring-expression-5.3.20 | 0.00373 | false | ||
CVE-2023-20861 | Twistlock CVE | Medium | spring-web-5.3.20 | 0.00373 | false | ||
CVE-2023-20861 | Anchore CVE | Medium | spring-core-5.3.20 | 0.00373 | false | ||
CVE-2024-11053 | Twistlock CVE | Low | curl-7.76.1-31.el9_6.1 | 0.00361 | false | ||
CVE-2024-11053 | Anchore CVE | Low | libcurl-minimal-7.76.1-31.el9_6.1 | 0.00361 | false | ||
CVE-2024-11053 | Anchore CVE | Low | curl-minimal-7.76.1-31.el9_6.1 | 0.00361 | false | ||
CVE-2024-7348 | Anchore CVE | High | postgresql-10.19 | 0.00318 | false | ||
CVE-2024-38808 | Twistlock CVE | Medium | spring-expression-5.3.20 | 0.00310 | false | ||
CVE-2024-38808 | Twistlock CVE | Low | spring-core-5.3.20 | 0.00310 | false | ||
CVE-2024-38808 | Twistlock CVE | Low | spring-web-5.3.20 | 0.00310 | false | ||
CVE-2024-38808 | Anchore CVE | Medium | spring-core-5.3.20 | 0.00310 | false | ||
CVE-2023-33201 | Twistlock CVE | Medium | org.bouncycastle_bcprov-ext-jdk15on-1.69.00.0 | 0.00289 | false | ||
CVE-2024-22257 | Twistlock CVE | High | spring-security-core-5.6.9 | 0.00264 | false | ||
CVE-2025-48924 | Twistlock CVE | Medium | org.apache.commons_commons-lang3-3.16.0 | 0.00258 | false | ||
CVE-2025-48924 | Twistlock CVE | Medium | commons-lang_commons-lang-2.6 | 0.00258 | false | ||
CVE-2025-48924 | Twistlock CVE | Medium | org.apache.commons_commons-lang3-3.9 | 0.00258 | false | ||
CVE-2024-8184 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-10.0.23 | 0.00250 | false | ||
CVE-2024-8184 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-10.0.23 | 0.00250 | false | ||
CVE-2024-8184 | Anchore CVE | Medium | jetty-http-10.0.23 | 0.00250 | false | ||
CVE-2024-8184 | Anchore CVE | Medium | jetty-jndi-10.0.23 | 0.00250 | false | ||
CVE-2024-8184 | Anchore CVE | Medium | jetty-servlet-10.0.23 | 0.00250 | false | ||
CVE-2024-8184 | Anchore CVE | Medium | jetty-servlets-10.0.23 | 0.00250 | false | ||
CVE-2024-8184 | Anchore CVE | Medium | jetty-xml-10.0.23 | 0.00250 | false | ||
CVE-2024-8184 | Anchore CVE | Medium | jetty-client-10.0.23 | 0.00250 | false | ||
CVE-2024-8184 | Anchore CVE | Medium | jetty-webapp-10.0.23 | 0.00250 | false | ||
CVE-2024-8184 | Anchore CVE | Medium | jetty-plus-10.0.23 | 0.00250 | false | ||
CVE-2024-8184 | Anchore CVE | Medium | jetty-annotations-10.0.23 | 0.00250 | false | ||
CVE-2024-8184 | Anchore CVE | Medium | jetty-alpn-client-10.0.23 | 0.00250 | false | ||
CVE-2024-8184 | Anchore CVE | Medium | jetty-io-10.0.23 | 0.00250 | false | ||
CVE-2024-38809 | Twistlock CVE | Medium | spring-web-5.3.20 | 0.00244 | false | ||
CVE-2022-42890 | Anchore CVE | High | svggen-1.6.0 | 0.00225 | false | ||
CVE-2022-42890 | Anchore CVE | High | parser-1.6.0 | 0.00225 | false | ||
CVE-2022-42890 | Anchore CVE | High | util-1.6.0 | 0.00225 | false | ||
CVE-2022-42890 | Anchore CVE | High | xml-1.6.0 | 0.00225 | false | ||
CVE-2022-42890 | Anchore CVE | High | awt-1.6.0 | 0.00225 | false | ||
CVE-2022-42890 | Anchore CVE | High | css-1.6.0 | 0.00225 | false | ||
CVE-2022-42890 | Anchore CVE | High | svg-1.6.0 | 0.00225 | false | ||
CVE-2022-42890 | Anchore CVE | High | gui-1.6.0 | 0.00225 | false | ||
CVE-2022-42890 | Anchore CVE | High | bridge-1.6.0 | 0.00225 | false | ||
CVE-2022-42890 | Anchore CVE | High | pdf-1.6.0 | 0.00225 | false | ||
CVE-2022-42890 | Anchore CVE | High | dom-1.6.0 | 0.00225 | false | ||
CVE-2022-42890 | Anchore CVE | High | transcoder-1.6.0 | 0.00225 | false | ||
CVE-2022-41704 | Anchore CVE | High | parser-1.6.0 | 0.00225 | false | ||
CVE-2022-41704 | Anchore CVE | High | svg-1.6.0 | 0.00225 | false | ||
CVE-2022-41704 | Anchore CVE | High | gui-1.6.0 | 0.00225 | false | ||
CVE-2022-41704 | Anchore CVE | High | pdf-1.6.0 | 0.00225 | false | ||
CVE-2022-41704 | Anchore CVE | High | transcoder-1.6.0 | 0.00225 | false | ||
CVE-2022-41704 | Anchore CVE | High | svggen-1.6.0 | 0.00225 | false | ||
CVE-2022-41704 | Anchore CVE | High | dom-1.6.0 | 0.00225 | false | ||
CVE-2022-41704 | Anchore CVE | High | awt-1.6.0 | 0.00225 | false | ||
CVE-2022-41704 | Anchore CVE | High | util-1.6.0 | 0.00225 | false | ||
CVE-2022-41704 | Anchore CVE | High | css-1.6.0 | 0.00225 | false | ||
CVE-2022-41704 | Anchore CVE | High | bridge-1.6.0 | 0.00225 | false | ||
CVE-2022-41704 | Anchore CVE | High | xml-1.6.0 | 0.00225 | false | ||
CVE-2025-52520 | Anchore CVE | High | tomcat-jdbc-10.1.26 | 0.00217 | false | ||
CVE-2025-52520 | Anchore CVE | High | tomcat-juli-10.1.26 | 0.00217 | false | ||
CVE-2025-24970 | Twistlock CVE | High | io.netty_netty-handler-4.1.112.Final | 0.00216 | false | ||
CVE-2024-47554 | Twistlock CVE | Low | commons-io_commons-io-2.11.0 | 0.00213 | false | ||
CVE-2024-47554 | Twistlock CVE | Low | commons-io_commons-io-2.8.0 | 0.00213 | false | ||
CVE-2025-1153 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00212 | false | ||
CVE-2025-1153 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00212 | false | ||
CVE-2024-45338 | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | 0.00189 | false | ||
CVE-2024-45338 | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | 0.00189 | false | ||
CVE-2024-45338 | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | 0.00189 | false | ||
CVE-2024-45338 | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | 0.00189 | false | ||
CVE-2024-45338 | Anchore CVE | Medium | golang.org/x/net-v0.30.0 | 0.00189 | false | ||
CVE-2024-45338 | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | 0.00189 | false | ||
CVE-2024-45338 | Anchore CVE | Medium | golang.org/x/net-v0.30.0 | 0.00189 | false | ||
CVE-2024-45338 | Anchore CVE | Medium | golang.org/x/net-v0.30.0 | 0.00189 | false | ||
CVE-2024-45338 | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | 0.00189 | false | ||
CVE-2024-45338 | Anchore CVE | Medium | golang.org/x/net-v0.30.0 | 0.00189 | false | ||
CVE-2024-12798 | Twistlock CVE | Medium | ch.qos.logback_logback-core-1.3.14 | 0.00186 | false | ||
CVE-2025-1795 | Twistlock CVE | Low | python3.9-3.9.21-2.el9_6.2 | 0.00184 | false | ||
CVE-2025-1795 | Anchore CVE | Low | python3-3.9.21-2.el9_6.2 | 0.00184 | false | ||
CVE-2025-1795 | Anchore CVE | Low | python3-libs-3.9.21-2.el9_6.2 | 0.00184 | false | ||
CVE-2020-27225 | Anchore CVE | High | org.eclipse.equinox.app-1.3.100.v20130327-1442 | 0.00184 | false | ||
CVE-2020-27225 | Anchore CVE | High | org.eclipse.osgi-3.10.2.v20150203-1939 | 0.00184 | false | ||
CVE-2020-27225 | Anchore CVE | High | org.eclipse.equinox.registry-3.5.400.v20140428-1507 | 0.00184 | false | ||
CVE-2020-27225 | Anchore CVE | High | org.eclipse.equinox.preferences-3.5.100.v20130422-1538 | 0.00184 | false | ||
CVE-2020-27225 | Anchore CVE | High | org.eclipse.core.expressions-3.4.500.v20130515-1343 | 0.00184 | false | ||
CVE-2020-27225 | Anchore CVE | High | org.eclipse.core.filesystem-1.4.0.v20130514-1240 | 0.00184 | false | ||
CVE-2020-27225 | Anchore CVE | High | org.eclipse.update.configurator-3.3.200.v20130326-1319 | 0.00184 | false | ||
CVE-2020-27225 | Anchore CVE | High | org.eclipse.core.runtime-3.9.0.v20130326-1255 | 0.00184 | false | ||
CVE-2020-27225 | Anchore CVE | High | org.eclipse.core.contenttype-3.4.200.v20130326-1255 | 0.00184 | false | ||
CVE-2020-27225 | Anchore CVE | High | org.eclipse.core.resources-3.9.1.v20140825-1431 | 0.00184 | false | ||
CVE-2020-27225 | Anchore CVE | High | org.eclipse.osgi.services-3.3.100.v20130513-1956 | 0.00184 | false | ||
CVE-2020-27225 | Anchore CVE | High | org.eclipse.equinox.common-3.6.200.v20130402-1505 | 0.00184 | false | ||
CVE-2020-27225 | Anchore CVE | High | org.eclipse.core.jobs-3.6.1.v20141014-1248 | 0.00184 | false | ||
CVE-2023-32636 | Twistlock CVE | Low | glib2-2.68.4-16.el9_6.2 | 0.00179 | false | ||
CVE-2023-32636 | Anchore CVE | Low | glib2-2.68.4-16.el9_6.2 | 0.00179 | false | ||
CVE-2017-5662 | Anchore CVE | High | css-1.6.0 | 0.00179 | false | ||
CVE-2017-5662 | Anchore CVE | High | util-1.6.0 | 0.00179 | false | ||
CVE-2017-5662 | Anchore CVE | High | xml-1.6.0 | 0.00179 | false | ||
CVE-2017-5662 | Anchore CVE | High | dom-1.6.0 | 0.00179 | false | ||
CVE-2017-5662 | Anchore CVE | High | awt-1.6.0 | 0.00179 | false | ||
CVE-2017-5662 | Anchore CVE | High | svggen-1.6.0 | 0.00179 | false | ||
CVE-2017-5662 | Anchore CVE | High | parser-1.6.0 | 0.00179 | false | ||
CVE-2017-5662 | Anchore CVE | High | svg-1.6.0 | 0.00179 | false | ||
CVE-2017-5662 | Anchore CVE | High | pdf-1.6.0 | 0.00179 | false | ||
CVE-2017-5662 | Anchore CVE | High | gui-1.6.0 | 0.00179 | false | ||
CVE-2017-5662 | Anchore CVE | High | bridge-1.6.0 | 0.00179 | false | ||
CVE-2017-5662 | Anchore CVE | High | transcoder-1.6.0 | 0.00179 | false | ||
CVE-2025-48989 | Anchore CVE | High | tomcat-juli-10.1.26 | 0.00177 | false | ||
CVE-2025-48989 | Anchore CVE | High | tomcat-jdbc-10.1.26 | 0.00177 | false | ||
CVE-2025-50106 | Anchore CVE | High | zulu-17.0.13+11-LTS | 0.00174 | false | ||
CVE-2025-30749 | Anchore CVE | High | zulu-17.0.13+11-LTS | 0.00174 | false | ||
CVE-2025-53506 | Anchore CVE | High | tomcat-juli-10.1.26 | 0.00163 | false | ||
CVE-2025-53506 | Anchore CVE | High | tomcat-jdbc-10.1.26 | 0.00163 | false | ||
CVE-2024-34459 | Twistlock CVE | Low | libxml2-2.9.13-12.el9_6 | 0.00153 | false | ||
CVE-2024-34459 | Anchore CVE | Low | libxml2-2.9.13-12.el9_6 | 0.00153 | false | ||
CVE-2024-6763 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-http-10.0.23 | 0.00140 | false | ||
CVE-2025-1632 | Twistlock CVE | Low | libarchive-3.5.3-6.el9_6 | 0.00136 | false | ||
CVE-2025-1632 | Anchore CVE | Low | libarchive-3.5.3-6.el9_6 | 0.00136 | false | ||
CVE-2024-10978 | Anchore CVE | Medium | postgresql-10.19 | 0.00133 | false | ||
CVE-2023-44483 | Twistlock CVE | Medium | org.apache.santuario_xmlsec-2.1.7 | 0.00126 | false | ||
CVE-2025-25193 | Twistlock CVE | Medium | io.netty_netty-common-4.1.112.Final | 0.00121 | false | ||
CVE-2022-0839 | Twistlock CVE | Critical | liquibase-core-4.4.2 | 0.00121 | false | ||
CVE-2020-12413 | Twistlock CVE | Low | nss-3.112.0-4.el9_4 | 0.00120 | false | ||
CVE-2020-12413 | Anchore CVE | Low | nss-3.112.0-4.el9_4 | 0.00120 | false | ||
CVE-2020-12413 | Anchore CVE | Low | nss-sysinit-3.112.0-4.el9_4 | 0.00120 | false | ||
CVE-2020-12413 | Anchore CVE | Low | nss-util-3.112.0-4.el9_4 | 0.00120 | false | ||
CVE-2020-12413 | Anchore CVE | Low | nss-softokn-freebl-3.112.0-4.el9_4 | 0.00120 | false | ||
CVE-2020-12413 | Anchore CVE | Low | nss-softokn-3.112.0-4.el9_4 | 0.00120 | false | ||
CVE-2020-12413 | Anchore CVE | Low | nspr-4.36.0-4.el9_4 | 0.00120 | false | ||
CVE-2025-4207 | Anchore CVE | Medium | postgresql-10.19 | 0.00117 | false | ||
CVE-2025-4207 | Anchore CVE | Medium | postgresql-14.15 | 0.00117 | false | ||
CVE-2021-45941 | Anchore CVE | Medium | libbpf-2:1.5.0-1.el9 | 0.00117 | false | ||
CVE-2021-45941 | Twistlock CVE | Medium | libbpf-1.5.0-1.el9 | 0.00117 | false | ||
CVE-2021-45940 | Anchore CVE | Low | libbpf-2:1.5.0-1.el9 | 0.00117 | false | ||
CVE-2021-45940 | Twistlock CVE | Medium | libbpf-1.5.0-1.el9 | 0.00117 | false | ||
CVE-2024-10976 | Anchore CVE | Medium | postgresql-10.19 | 0.00113 | false | ||
CVE-2024-7531 | Twistlock CVE | Low | nss-3.112.0-4.el9_4 | 0.00112 | false | ||
CVE-2024-7531 | Anchore CVE | Low | nss-softokn-freebl-3.112.0-4.el9_4 | 0.00112 | false | ||
CVE-2024-7531 | Anchore CVE | Low | nss-util-3.112.0-4.el9_4 | 0.00112 | false | ||
CVE-2024-7531 | Anchore CVE | Low | nss-softokn-3.112.0-4.el9_4 | 0.00112 | false | ||
CVE-2024-7531 | Anchore CVE | Low | nss-3.112.0-4.el9_4 | 0.00112 | false | ||
CVE-2024-7531 | Anchore CVE | Low | nss-sysinit-3.112.0-4.el9_4 | 0.00112 | false | ||
CVE-2024-7531 | Anchore CVE | Low | nspr-4.36.0-4.el9_4 | 0.00112 | false | ||
CVE-2024-38827 | Twistlock CVE | Medium | spring-security-core-5.6.9 | 0.00111 | false | ||
CVE-2025-1152 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00093 | false | ||
CVE-2025-1152 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00093 | false | ||
CVE-2025-1150 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00093 | false | ||
CVE-2025-1150 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00093 | false | ||
CVE-2021-3393 | Twistlock CVE | Medium | postgres-10.19 | 0.00091 | false | ||
CVE-2021-3393 | Anchore CVE | Medium | postgresql-10.19 | 0.00091 | false | ||
CVE-2025-6069 | Twistlock CVE | Medium | python3.9-3.9.21-2.el9_6.2 | 0.00090 | false | ||
CVE-2025-6069 | Anchore CVE | Medium | python3-3.9.21-2.el9_6.2 | 0.00090 | false | ||
CVE-2025-6069 | Anchore CVE | Medium | python3-libs-3.9.21-2.el9_6.2 | 0.00090 | false | ||
CVE-2024-10977 | Anchore CVE | Low | postgresql-10.19 | 0.00087 | false | ||
CVE-2025-1151 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00086 | false | ||
CVE-2025-1151 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00086 | false | ||
CVE-2025-21587 | Anchore CVE | High | zulu-17.0.13+11-LTS | 0.00085 | false | ||
CVE-2025-30698 | Anchore CVE | Medium | zulu-17.0.13+11-LTS | 0.00082 | false | ||
CVE-2021-47621 | Twistlock CVE | Medium | io.github.classgraph_classgraph-4.8.78 | 0.00077 | false | ||
CVE-2023-45322 | Anchore CVE | Low | libxml2-2.9.13-12.el9_6 | 0.00076 | false | ||
CVE-2025-32990 | Twistlock CVE | Medium | gnutls-3.8.3-6.el9 | 0.00072 | false | ||
CVE-2025-32990 | Anchore CVE | Medium | gnutls-3.8.3-6.el9 | 0.00072 | false | ||
CVE-2025-32990 | Anchore CVE | Medium | gnutls-dane-3.8.3-6.el9 | 0.00072 | false | ||
CVE-2025-32990 | Anchore CVE | Medium | gnutls-utils-3.8.3-6.el9 | 0.00072 | false | ||
CVE-2025-49125 | Anchore CVE | High | tomcat-juli-10.1.26 | 0.00070 | false | ||
CVE-2025-49125 | Anchore CVE | High | tomcat-jdbc-10.1.26 | 0.00070 | false | ||
CVE-2024-38820 | Twistlock CVE | Medium | spring-core-5.3.20 | 0.00070 | false | ||
CVE-2024-38820 | Twistlock CVE | Medium | spring-web-5.3.20 | 0.00070 | false | ||
CVE-2024-38820 | Twistlock CVE | Medium | spring-context-5.3.20 | 0.00070 | false | ||
CVE-2024-38820 | Anchore CVE | Medium | spring-core-5.3.20 | 0.00070 | false | ||
CVE-2025-31651 | Anchore CVE | Critical | tomcat-juli-10.1.26 | 0.00069 | false | ||
CVE-2025-31651 | Anchore CVE | Critical | tomcat-jdbc-10.1.26 | 0.00069 | false | ||
CVE-2025-1377 | Anchore CVE | Low | elfutils-libelf-0.192-6.el9_6 | 0.00065 | false | ||
CVE-2025-1377 | Anchore CVE | Low | elfutils-default-yama-scope-0.192-6.el9_6 | 0.00065 | false | ||
CVE-2025-1377 | Anchore CVE | Low | elfutils-libs-0.192-6.el9_6 | 0.00065 | false | ||
CVE-2025-1377 | Twistlock CVE | Low | elfutils-0.192-6.el9_6 | 0.00065 | false | ||
CVE-2025-8714 | Anchore CVE | High | postgresql-10.19 | 0.00063 | false | ||
CVE-2025-8714 | Anchore CVE | High | postgresql-14.15 | 0.00063 | false | ||
CVE-2025-22233 | Twistlock CVE | Low | spring-context-5.3.20 | 0.00063 | false | ||
CVE-2025-47907 | Anchore CVE | High | stdlib-go1.23.3 | 0.00059 | false | ||
CVE-2025-47907 | Anchore CVE | High | stdlib-go1.23.4 | 0.00059 | false | ||
CVE-2025-47907 | Anchore CVE | High | stdlib-go1.23.3 | 0.00059 | false | ||
CVE-2025-47907 | Anchore CVE | High | stdlib-go1.23.3 | 0.00059 | false | ||
CVE-2025-47907 | Anchore CVE | High | stdlib-go1.23.3 | 0.00059 | false | ||
CVE-2025-47907 | Anchore CVE | High | stdlib-go1.23.4 | 0.00059 | false | ||
CVE-2025-47907 | Anchore CVE | High | stdlib-go1.23.3 | 0.00059 | false | ||
CVE-2025-47907 | Anchore CVE | High | stdlib-go1.23.4 | 0.00059 | false | ||
CVE-2025-47907 | Anchore CVE | High | stdlib-go1.23.4 | 0.00059 | false | ||
CVE-2025-47907 | Anchore CVE | High | stdlib-go1.23.3 | 0.00059 | false | ||
CVE-2023-33202 | Twistlock CVE | Medium | org.bouncycastle_bcprov-ext-jdk15on-1.69.00.0 | 0.00059 | false | ||
CVE-2025-6395 | Twistlock CVE | Medium | gnutls-3.8.3-6.el9 | 0.00057 | false | ||
CVE-2025-6395 | Anchore CVE | Medium | gnutls-3.8.3-6.el9 | 0.00057 | false | ||
CVE-2025-6395 | Anchore CVE | Medium | gnutls-dane-3.8.3-6.el9 | 0.00057 | false | ||
CVE-2025-6395 | Anchore CVE | Medium | gnutls-utils-3.8.3-6.el9 | 0.00057 | false | ||
CVE-2025-22228 | Twistlock CVE | High | spring-security-crypto-5.6.9 | 0.00057 | false | ||
CVE-2025-48734 | Twistlock CVE | Low | commons-beanutils_commons-beanutils-1.9.4 | 0.00056 | false | ||
CVE-2025-32988 | Twistlock CVE | Medium | gnutls-3.8.3-6.el9 | 0.00056 | false | ||
CVE-2025-32988 | Anchore CVE | Medium | gnutls-utils-3.8.3-6.el9 | 0.00056 | false | ||
CVE-2025-32988 | Anchore CVE | Medium | gnutls-dane-3.8.3-6.el9 | 0.00056 | false | ||
CVE-2025-32988 | Anchore CVE | Medium | gnutls-3.8.3-6.el9 | 0.00056 | false | ||
CVE-2025-8916 | Twistlock CVE | Medium | org.bouncycastle_bcpkix-jdk15on-1.64.00.0 | 0.00055 | false | ||
CVE-2025-55163 | Twistlock CVE | High | io.netty_netty-codec-http2-4.1.112.Final | 0.00055 | false | ||
CVE-2025-27113 | Twistlock CVE | Low | libxml2-2.9.13-12.el9_6 | 0.00055 | false | ||
CVE-2025-27113 | Anchore CVE | Low | libxml2-2.9.13-12.el9_6 | 0.00055 | false | ||
CVE-2025-50059 | Anchore CVE | High | zulu-17.0.13+11-LTS | 0.00054 | false | ||
CVE-2025-48988 | Anchore CVE | High | tomcat-jdbc-10.1.26 | 0.00053 | false | ||
CVE-2025-48988 | Anchore CVE | High | tomcat-juli-10.1.26 | 0.00053 | false | ||
CVE-2025-3360 | Twistlock CVE | Low | glib2-2.68.4-16.el9_6.2 | 0.00052 | false | ||
CVE-2025-3360 | Anchore CVE | Low | glib2-2.68.4-16.el9_6.2 | 0.00052 | false | ||
CVE-2025-58058 | Twistlock CVE | Medium | github.com/ulikunitz/xz-v0.5.12 | 0.00051 | false | ||
CVE-2025-7039 | Twistlock CVE | Low | glib2-2.68.4-16.el9_6.2 | 0.00050 | false | ||
CVE-2025-58056 | Twistlock CVE | Low | io.netty_netty-codec-http-4.1.112.Final | 0.00050 | false | ||
CVE-2023-50495 | Twistlock CVE | Low | ncurses-6.2-10.20210508.el9_6.2 | 0.00050 | false | ||
CVE-2023-50495 | Anchore CVE | Low | ncurses-libs-6.2-10.20210508.el9_6.2 | 0.00050 | false | ||
CVE-2023-50495 | Anchore CVE | Low | ncurses-base-6.2-10.20210508.el9_6.2 | 0.00050 | false | ||
CVE-2025-8715 | Anchore CVE | High | postgresql-14.15 | 0.00049 | false | ||
CVE-2025-1376 | Anchore CVE | Low | elfutils-libs-0.192-6.el9_6 | 0.00048 | false | ||
CVE-2025-1376 | Anchore CVE | Low | elfutils-default-yama-scope-0.192-6.el9_6 | 0.00048 | false | ||
CVE-2025-1376 | Anchore CVE | Low | elfutils-libelf-0.192-6.el9_6 | 0.00048 | false | ||
CVE-2025-1376 | Twistlock CVE | Low | elfutils-0.192-6.el9_6 | 0.00048 | false | ||
CVE-2024-12801 | Twistlock CVE | Low | ch.qos.logback_logback-core-1.3.14 | 0.00048 | false | ||
CVE-2025-8713 | Anchore CVE | Low | postgresql-14.15 | 0.00042 | false | ||
CVE-2025-8713 | Anchore CVE | Low | postgresql-10.19 | 0.00042 | false | ||
CVE-2025-58057 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.112.Final | 0.00042 | false | ||
CVE-2024-45336 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00041 | false | ||
CVE-2024-45336 | Anchore CVE | Medium | stdlib-go1.23.4 | 0.00041 | false | ||
CVE-2024-45336 | Anchore CVE | Medium | stdlib-go1.23.4 | 0.00041 | false | ||
CVE-2024-45336 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00041 | false | ||
CVE-2024-45336 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00041 | false | ||
CVE-2024-45336 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00041 | false | ||
CVE-2024-45336 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00041 | false | ||
CVE-2024-45336 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00041 | false | ||
CVE-2024-45336 | Anchore CVE | Medium | stdlib-go1.23.4 | 0.00041 | false | ||
CVE-2024-45336 | Anchore CVE | Medium | stdlib-go1.23.4 | 0.00041 | false | ||
CVE-2024-45336 | Twistlock CVE | Low | net/http-1.23.3 | 0.00041 | false | ||
CVE-2024-45336 | Twistlock CVE | Low | net/http-1.23.4 | 0.00041 | false | ||
CVE-2025-4598 | Anchore CVE | Medium | systemd-pam-252-51.el9_6.1 | 0.00037 | false | ||
CVE-2025-4598 | Anchore CVE | Medium | systemd-rpm-macros-252-51.el9_6.1 | 0.00037 | false | ||
CVE-2025-4598 | Anchore CVE | Medium | systemd-252-51.el9_6.1 | 0.00037 | false | ||
CVE-2025-4598 | Anchore CVE | Medium | systemd-libs-252-51.el9_6.1 | 0.00037 | false | ||
CVE-2025-4598 | Twistlock CVE | Medium | systemd-252-51.el9_6.1 | 0.00037 | false | ||
CVE-2025-30754 | Anchore CVE | Medium | zulu-17.0.13+11-LTS | 0.00036 | false | ||
CVE-2024-45341 | Twistlock CVE | Low | crypto/x509-1.23.4 | 0.00032 | false | ||
CVE-2024-45341 | Twistlock CVE | Low | crypto/x509-1.23.3 | 0.00032 | false | ||
CVE-2024-45341 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00032 | false | ||
CVE-2024-45341 | Anchore CVE | Medium | stdlib-go1.23.4 | 0.00032 | false | ||
CVE-2024-45341 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00032 | false | ||
CVE-2024-45341 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00032 | false | ||
CVE-2024-45341 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00032 | false | ||
CVE-2024-45341 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00032 | false | ||
CVE-2024-45341 | Anchore CVE | Medium | stdlib-go1.23.4 | 0.00032 | false | ||
CVE-2024-45341 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00032 | false | ||
CVE-2024-45341 | Anchore CVE | Medium | stdlib-go1.23.4 | 0.00032 | false | ||
CVE-2024-45341 | Anchore CVE | Medium | stdlib-go1.23.4 | 0.00032 | false | ||
CVE-2024-43167 | Twistlock CVE | Low | unbound-1.16.2-19.el9_6.1 | 0.00032 | false | ||
CVE-2024-43167 | Anchore CVE | Low | unbound-libs-1.16.2-19.el9_6.1 | 0.00032 | false | ||
CVE-2024-43168 | Twistlock CVE | Low | unbound-1.16.2-19.el9_6.1 | 0.00031 | false | ||
CVE-2024-43168 | Anchore CVE | Low | unbound-libs-1.16.2-19.el9_6.1 | 0.00031 | false | ||
CVE-2025-46701 | Anchore CVE | High | tomcat-juli-10.1.26 | 0.00030 | false | ||
CVE-2025-46701 | Anchore CVE | High | tomcat-jdbc-10.1.26 | 0.00030 | false | ||
CVE-2025-1371 | Anchore CVE | Low | elfutils-libs-0.192-6.el9_6 | 0.00029 | false | ||
CVE-2025-1371 | Anchore CVE | Low | elfutils-libelf-0.192-6.el9_6 | 0.00029 | false | ||
CVE-2025-1371 | Anchore CVE | Low | elfutils-default-yama-scope-0.192-6.el9_6 | 0.00029 | false | ||
CVE-2025-1371 | Twistlock CVE | Low | elfutils-0.192-6.el9_6 | 0.00029 | false | ||
CVE-2025-49124 | Anchore CVE | High | tomcat-jdbc-10.1.26 | 0.00026 | false | ||
CVE-2025-49124 | Anchore CVE | High | tomcat-juli-10.1.26 | 0.00026 | false | ||
CVE-2025-32989 | Twistlock CVE | Medium | gnutls-3.8.3-6.el9 | 0.00026 | false | ||
CVE-2025-32989 | Anchore CVE | Medium | gnutls-dane-3.8.3-6.el9 | 0.00026 | false | ||
CVE-2025-32989 | Anchore CVE | Medium | gnutls-3.8.3-6.el9 | 0.00026 | false | ||
CVE-2025-32989 | Anchore CVE | Medium | gnutls-utils-3.8.3-6.el9 | 0.00026 | false | ||
CVE-2023-4218 | Twistlock CVE | Medium | org.eclipse.core.runtime-3.9.0.v20130326-1255 | 0.00026 | false | ||
CVE-2025-21502 | Anchore CVE | Medium | zulu-17.0.13+11-LTS | 0.00024 | false | ||
CVE-2025-21502 | Twistlock CVE | Low | java-17.0.13 | 0.00024 | false | ||
CVE-2024-57360 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00024 | false | ||
CVE-2024-57360 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00024 | false | ||
CVE-2024-47535 | Twistlock CVE | Medium | io.netty_netty-common-4.1.112.Final | 0.00024 | false | ||
CVE-2025-5245 | Anchore CVE | Medium | gdb-gdbserver-14.2-4.1.el9_6 | 0.00022 | false | ||
CVE-2025-5245 | Twistlock CVE | Medium | gdb-14.2-4.1.el9_6 | 0.00022 | false | ||
CVE-2025-6170 | Twistlock CVE | Low | libxml2-2.9.13-12.el9_6 | 0.00021 | false | ||
CVE-2025-6170 | Anchore CVE | Low | libxml2-2.9.13-12.el9_6 | 0.00021 | false | ||
CVE-2025-4516 | Twistlock CVE | Medium | python3.9-3.9.21-2.el9_6.2 | 0.00021 | false | ||
CVE-2025-4516 | Anchore CVE | Medium | python3-3.9.21-2.el9_6.2 | 0.00021 | false | ||
CVE-2025-4516 | Anchore CVE | Medium | python3-libs-3.9.21-2.el9_6.2 | 0.00021 | false | ||
CVE-2025-4673 | Twistlock CVE | Low | net/http-1.23.4 | 0.00019 | false | ||
CVE-2025-4673 | Twistlock CVE | Low | net/http-1.23.3 | 0.00019 | false | ||
CVE-2025-4673 | Anchore CVE | Medium | stdlib-go1.23.4 | 0.00019 | false | ||
CVE-2025-4673 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00019 | false | ||
CVE-2025-4673 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00019 | false | ||
CVE-2025-4673 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00019 | false | ||
CVE-2025-4673 | Anchore CVE | Medium | stdlib-go1.23.4 | 0.00019 | false | ||
CVE-2025-4673 | Anchore CVE | Medium | stdlib-go1.23.4 | 0.00019 | false | ||
CVE-2025-4673 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00019 | false | ||
CVE-2025-4673 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00019 | false | ||
CVE-2025-4673 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00019 | false | ||
CVE-2025-4673 | Anchore CVE | Medium | stdlib-go1.23.4 | 0.00019 | false | ||
CVE-2025-5918 | Twistlock CVE | Low | libarchive-3.5.3-6.el9_6 | 0.00018 | false | ||
CVE-2025-5918 | Anchore CVE | Low | libarchive-3.5.3-6.el9_6 | 0.00018 | false | ||
CVE-2025-5278 | Anchore CVE | Medium | coreutils-single-8.32-39.el9 | 0.00018 | false | ||
CVE-2025-5278 | Twistlock CVE | Medium | coreutils-8.32-39.el9 | 0.00018 | false | ||
CVE-2024-0232 | Twistlock CVE | Low | sqlite-3.34.1-8.el9_6 | 0.00018 | false | ||
CVE-2024-0232 | Anchore CVE | Low | sqlite-libs-3.34.1-8.el9_6 | 0.00018 | false | ||
CVE-2025-5916 | Twistlock CVE | Low | libarchive-3.5.3-6.el9_6 | 0.00017 | false | ||
CVE-2025-5916 | Anchore CVE | Low | libarchive-3.5.3-6.el9_6 | 0.00017 | false | ||
CVE-2025-5917 | Twistlock CVE | Low | libarchive-3.5.3-6.el9_6 | 0.00015 | false | ||
CVE-2025-5917 | Anchore CVE | Low | libarchive-3.5.3-6.el9_6 | 0.00015 | false | ||
CVE-2025-22870 | Twistlock CVE | Medium | golang.org/x/net/proxy-v0.19.0 | 0.00015 | false | ||
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.15.4 | 0.00015 | false | ||
CVE-2025-5915 | Twistlock CVE | Low | libarchive-3.5.3-6.el9_6 | 0.00014 | false | ||
CVE-2025-5915 | Anchore CVE | Low | libarchive-3.5.3-6.el9_6 | 0.00014 | false | ||
CVE-2024-25260 | Anchore CVE | Low | elfutils-libs-0.192-6.el9_6 | 0.00014 | false | ||
CVE-2024-25260 | Anchore CVE | Low | elfutils-libelf-0.192-6.el9_6 | 0.00014 | false | ||
CVE-2024-25260 | Anchore CVE | Low | elfutils-default-yama-scope-0.192-6.el9_6 | 0.00014 | false | ||
CVE-2024-25260 | Twistlock CVE | Low | elfutils-0.192-6.el9_6 | 0.00014 | false | ||
CVE-2022-47011 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00014 | false | ||
CVE-2022-47011 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00014 | false | ||
CVE-2022-47010 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00014 | false | ||
CVE-2022-47010 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00014 | false | ||
CVE-2022-47007 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00014 | false | ||
CVE-2022-47007 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00014 | false | ||
CVE-2025-22871 | Twistlock CVE | Low | net/http/internal-1.23.3 | 0.00013 | false | ||
CVE-2025-22871 | Twistlock CVE | Low | net/http/internal-1.23.4 | 0.00013 | false | ||
CVE-2025-22871 | Anchore CVE | Critical | stdlib-go1.23.4 | 0.00013 | false | ||
CVE-2025-22871 | Anchore CVE | Critical | stdlib-go1.23.4 | 0.00013 | false | ||
CVE-2025-22871 | Anchore CVE | Critical | stdlib-go1.23.4 | 0.00013 | false | ||
CVE-2025-22871 | Anchore CVE | Critical | stdlib-go1.23.3 | 0.00013 | false | ||
CVE-2025-22871 | Anchore CVE | Critical | stdlib-go1.23.4 | 0.00013 | false | ||
CVE-2025-22871 | Anchore CVE | Critical | stdlib-go1.23.3 | 0.00013 | false | ||
CVE-2025-22871 | Anchore CVE | Critical | stdlib-go1.23.3 | 0.00013 | false | ||
CVE-2025-22871 | Anchore CVE | Critical | stdlib-go1.23.3 | 0.00013 | false | ||
CVE-2025-22871 | Anchore CVE | Critical | stdlib-go1.23.3 | 0.00013 | false | ||
CVE-2025-22871 | Anchore CVE | Critical | stdlib-go1.23.3 | 0.00013 | false | ||
CVE-2023-30571 | Twistlock CVE | Medium | libarchive-3.5.3-6.el9_6 | 0.00013 | false | ||
CVE-2023-30571 | Anchore CVE | Medium | libarchive-3.5.3-6.el9_6 | 0.00013 | false | ||
CVE-2025-55668 | Anchore CVE | Medium | tomcat-jdbc-10.1.26 | 0.00012 | false | ||
CVE-2025-55668 | Anchore CVE | Medium | tomcat-juli-10.1.26 | 0.00012 | false | ||
CVE-2025-22866 | Twistlock CVE | Low | crypto/internal/nistec-1.23.3 | 0.00012 | false | ||
CVE-2025-22866 | Twistlock CVE | Low | crypto/internal/nistec-1.23.4 | 0.00012 | false | ||
CVE-2025-22866 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00012 | false | ||
CVE-2025-22866 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00012 | false | ||
CVE-2025-22866 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00012 | false | ||
CVE-2025-22866 | Anchore CVE | Medium | stdlib-go1.23.4 | 0.00012 | false | ||
CVE-2025-22866 | Anchore CVE | Medium | stdlib-go1.23.4 | 0.00012 | false | ||
CVE-2025-22866 | Anchore CVE | Medium | stdlib-go1.23.4 | 0.00012 | false | ||
CVE-2025-22866 | Anchore CVE | Medium | stdlib-go1.23.4 | 0.00012 | false | ||
CVE-2025-22866 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00012 | false | ||
CVE-2025-22866 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00012 | false | ||
CVE-2025-22866 | Anchore CVE | Medium | stdlib-go1.23.3 | 0.00012 | false | ||
CVE-2025-3198 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | 0.00011 | false | ||
CVE-2025-3198 | Twistlock CVE | Low | gdb-14.2-4.1.el9_6 | 0.00011 | false | ||
CVE-2022-3606 | Anchore CVE | Low | libbpf-2:1.5.0-1.el9 | 0.00010 | false | ||
CVE-2022-3606 | Twistlock CVE | Low | libbpf-1.5.0-1.el9 | 0.00010 | false | ||
CVE-2025-4674 | Anchore CVE | High | stdlib-go1.23.3 | 0.00006 | false | ||
CVE-2025-4674 | Anchore CVE | High | stdlib-go1.23.4 | 0.00006 | false | ||
CVE-2025-4674 | Anchore CVE | High | stdlib-go1.23.4 | 0.00006 | false | ||
CVE-2025-4674 | Anchore CVE | High | stdlib-go1.23.4 | 0.00006 | false | ||
CVE-2025-4674 | Anchore CVE | High | stdlib-go1.23.3 | 0.00006 | false | ||
CVE-2025-4674 | Anchore CVE | High | stdlib-go1.23.3 | 0.00006 | false | ||
CVE-2025-4674 | Anchore CVE | High | stdlib-go1.23.3 | 0.00006 | false | ||
CVE-2025-4674 | Anchore CVE | High | stdlib-go1.23.4 | 0.00006 | false | ||
CVE-2025-4674 | Anchore CVE | High | stdlib-go1.23.3 | 0.00006 | false | ||
CVE-2025-4674 | Anchore CVE | High | stdlib-go1.23.3 | 0.00006 | false | ||
CVE-2025-9714 | Twistlock CVE | Medium | libxml2-2.9.13-12.el9_6 | N/A | false | ||
CVE-2025-9714 | Anchore CVE | Medium | libxml2-2.9.13-12.el9_6 | N/A | false | ||
CVE-2023-2222 | Anchore CVE | Low | gdb-gdbserver-14.2-4.1.el9_6 | N/A | false | ||
CVE-2023-2004 | Anchore CVE | Low | freetype-2.10.4-10.el9_5 | N/A | false | ||
CVE-2022-3857 | Anchore CVE | Low | libpng-2:1.6.37-12.el9 | N/A | false | ||
e07d84b039b0e6fcea42fbda1d378647 | Anchore Compliance | Critical | N/A | N/A | |||
b18c88ddeab24abfb92ae2ccddb0b022 | Anchore Compliance | Low | N/A | N/A | |||
addbb93c22e9b0988b8b40392a4538cb | Anchore Compliance | Low | N/A | N/A | |||
PRISMA-2021-0055 | Twistlock CVE | Low | commons-codec_commons-codec-1.11 | N/A | N/A | ||
GHSA-xq3w-v528-46rv | Anchore CVE | Medium | netty-common-4.1.112.Final | N/A | N/A | ||
GHSA-xfrj-6vvc-3xm2 | Anchore CVE | Medium | xmlsec-2.1.7 | N/A | N/A | ||
GHSA-wxr5-93ph-8wr9 | Anchore CVE | High | commons-beanutils-1.9.4 | N/A | N/A | ||
GHSA-wxqc-pxw9-g2p8 | Anchore CVE | High | spring-expression-5.3.20 | N/A | N/A | ||
GHSA-wjxj-5m7g-mg7q | Anchore CVE | Medium | bcprov-ext-jdk15on-1.69 | N/A | N/A | ||
GHSA-vvgc-356p-c3xw | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | N/A | N/A | ||
GHSA-vvgc-356p-c3xw | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | N/A | N/A | ||
GHSA-vvgc-356p-c3xw | Anchore CVE | Medium | golang.org/x/net-v0.30.0 | N/A | N/A | ||
GHSA-vvgc-356p-c3xw | Anchore CVE | Medium | golang.org/x/net-v0.30.0 | N/A | N/A | ||
GHSA-vvgc-356p-c3xw | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | N/A | N/A | ||
GHSA-vvgc-356p-c3xw | Anchore CVE | Medium | golang.org/x/net-v0.30.0 | N/A | N/A | ||
GHSA-vvgc-356p-c3xw | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | N/A | N/A | ||
GHSA-vvgc-356p-c3xw | Anchore CVE | Medium | golang.org/x/net-v0.30.0 | N/A | N/A | ||
GHSA-vvgc-356p-c3xw | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | N/A | N/A | ||
GHSA-vvgc-356p-c3xw | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | N/A | N/A | ||
GHSA-v2xm-76pq-phcf | Anchore CVE | Medium | classgraph-4.8.78 | N/A | N/A | ||
GHSA-r68h-jhhj-9jvm | Twistlock CVE | Medium | org.owasp.esapi_esapi-2.3.0.0 | N/A | N/A | ||
GHSA-r68h-jhhj-9jvm | Anchore CVE | Medium | esapi-2.3.0.0 | N/A | N/A | ||
GHSA-qxp5-gwg8-xv66 | Anchore CVE | Medium | golang.org/x/net-v0.30.0 | N/A | N/A | ||
GHSA-qxp5-gwg8-xv66 | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | N/A | N/A | ||
GHSA-qxp5-gwg8-xv66 | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | N/A | N/A | ||
GHSA-qxp5-gwg8-xv66 | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | N/A | N/A | ||
GHSA-qxp5-gwg8-xv66 | Anchore CVE | Medium | golang.org/x/net-v0.30.0 | N/A | N/A | ||
GHSA-qxp5-gwg8-xv66 | Anchore CVE | Medium | golang.org/x/net-v0.30.0 | N/A | N/A | ||
GHSA-qxp5-gwg8-xv66 | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | N/A | N/A | ||
GHSA-qxp5-gwg8-xv66 | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | N/A | N/A | ||
GHSA-qxp5-gwg8-xv66 | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | N/A | N/A | ||
GHSA-qxp5-gwg8-xv66 | Anchore CVE | Medium | golang.org/x/net-v0.30.0 | N/A | N/A | ||
GHSA-qh8g-58pp-2wxh | Anchore CVE | Medium | jetty-http-10.0.23 | N/A | N/A | ||
GHSA-q3v6-hm2v-pw99 | Anchore CVE | Medium | spring-security-core-5.6.9 | N/A | N/A | ||
GHSA-prj3-ccx8-p6x4 | Anchore CVE | High | netty-codec-http2-4.1.112.Final | N/A | N/A | ||
GHSA-pr98-23f8-jwxv | Anchore CVE | Medium | logback-core-1.3.14 | N/A | N/A | ||
GHSA-mg83-c7gq-rv5c | Anchore CVE | High | spring-security-crypto-5.6.9 | N/A | N/A | ||
GHSA-jc7w-c686-c4v9 | Anchore CVE | Medium | github.com/ulikunitz/xz-v0.5.12 | N/A | N/A | ||
GHSA-jc7w-c686-c4v9 | Anchore CVE | Medium | github.com/ulikunitz/xz-v0.5.12 | N/A | N/A | ||
GHSA-jc7w-c686-c4v9 | Anchore CVE | Medium | github.com/ulikunitz/xz-v0.5.12 | N/A | N/A | ||
GHSA-jc7w-c686-c4v9 | Anchore CVE | Medium | github.com/ulikunitz/xz-v0.5.12 | N/A | N/A | ||
GHSA-j288-q9x7-2f5v | Anchore CVE | Medium | commons-lang-2.6 | N/A | N/A | ||
GHSA-j288-q9x7-2f5v | Anchore CVE | Medium | commons-lang3-3.16.0 | N/A | N/A | ||
GHSA-j288-q9x7-2f5v | Anchore CVE | Medium | commons-lang3-3.9 | N/A | N/A | ||
GHSA-j24h-xcpc-9jw8 | Anchore CVE | Medium | org.eclipse.core.runtime-3.9.0.v20130326-1255 | N/A | N/A | ||
GHSA-hr8g-6v94-x4m9 | Anchore CVE | Medium | bcprov-ext-jdk15on-1.69 | N/A | N/A | ||
GHSA-hgjh-9rj2-g67j | Anchore CVE | High | spring-web-5.3.20 | N/A | N/A | ||
GHSA-g8m5-722r-8whq | Anchore CVE | Medium | jetty-server-10.0.23 | N/A | N/A | ||
GHSA-fghv-69vj-qj49 | Anchore CVE | Low | netty-codec-http-4.1.112.Final | N/A | N/A | ||
GHSA-f3jh-qvm4-mg39 | Anchore CVE | High | spring-security-core-5.6.9 | N/A | N/A | ||
GHSA-cmxj-wx9v-52qr | Anchore CVE | Medium | not-yet-commons-ssl-0.3.9 | N/A | N/A | ||
GHSA-ccgv-vj62-xf9h | Anchore CVE | High | spring-web-5.3.20 | N/A | N/A | ||
GHSA-c4q5-6c82-3qpw | Anchore CVE | Critical | spring-security-web-5.6.9 | N/A | N/A | ||
GHSA-9cmq-m9j5-mvww | Anchore CVE | Medium | spring-expression-5.3.20 | N/A | N/A | ||
GHSA-9339-86wc-4qgf | Anchore CVE | High | xalan-2.7.2 | N/A | N/A | ||
GHSA-7c2q-5qmr-v76q | Twistlock CVE | High | org.owasp.esapi_esapi-2.3.0.0 | N/A | N/A | ||
GHSA-7c2q-5qmr-v76q | Anchore CVE | High | esapi-2.3.0.0 | N/A | N/A | ||
GHSA-78wr-2p64-hpwj | Anchore CVE | High | commons-io-2.8.0 | N/A | N/A | ||
GHSA-78wr-2p64-hpwj | Anchore CVE | High | commons-io-2.11.0 | N/A | N/A | ||
GHSA-6v67-2wr5-gvf4 | Anchore CVE | Low | logback-core-1.3.14 | N/A | N/A | ||
GHSA-59j4-wjwp-mw9m | Anchore CVE | High | velocity-1.7 | N/A | N/A | ||
GHSA-564r-hj7v-mcr5 | Anchore CVE | Medium | spring-expression-5.3.20 | N/A | N/A | ||
GHSA-4wp7-92pw-q264 | Anchore CVE | Low | spring-context-5.3.20 | N/A | N/A | ||
GHSA-4v7x-pqxf-cx7m | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | N/A | N/A | ||
GHSA-4v7x-pqxf-cx7m | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | N/A | N/A | ||
GHSA-4v7x-pqxf-cx7m | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | N/A | N/A | ||
GHSA-4v7x-pqxf-cx7m | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | N/A | N/A | ||
GHSA-4v7x-pqxf-cx7m | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | N/A | N/A | ||
GHSA-4v7x-pqxf-cx7m | Anchore CVE | Medium | golang.org/x/net-v0.19.0 | N/A | N/A | ||
GHSA-4jrv-ppp4-jm57 | Anchore CVE | High | gson-2.8.8 | N/A | N/A | ||
GHSA-4jrv-ppp4-jm57 | Anchore CVE | High | gson-2.8.8 | N/A | N/A | ||
GHSA-4jrv-ppp4-jm57 | Anchore CVE | High | gson-2.8.6 | N/A | N/A | ||
GHSA-4gc7-5j7h-4qph | Anchore CVE | Medium | spring-context-5.3.20 | N/A | N/A | ||
GHSA-4gc7-5j7h-4qph | Anchore CVE | Medium | spring-web-5.3.20 | N/A | N/A | ||
GHSA-4g8c-wm8x-jfhw | Anchore CVE | High | netty-handler-4.1.112.Final | N/A | N/A | ||
GHSA-4cx2-fc23-5wg6 | Anchore CVE | Medium | bcpkix-jdk15on-1.64 | N/A | N/A | ||
GHSA-3p8m-j85q-pgmj | Anchore CVE | Medium | netty-codec-4.1.112.Final | N/A | N/A | ||
GHSA-3h6f-g5f3-gc4w | Anchore CVE | Critical | spring-security-config-5.6.9 | N/A | N/A | ||
GHSA-389x-839f-4rhx | Anchore CVE | Medium | netty-common-4.1.112.Final | N/A | N/A | ||
GHSA-2wrp-6fg6-hmc5 | Anchore CVE | High | spring-web-5.3.20 | N/A | N/A | ||
GHSA-2rmj-mq67-h97g | Anchore CVE | Medium | spring-web-5.3.20 | N/A | N/A | ||
CCE-83450-7 | OSCAP Compliance | High | N/A | N/A |
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=blackduck/seeker/seeker-server&tag=2025.1.0&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.