chore(findings): microfocus/idol/mmap_app
Summary
microfocus/idol/mmap_app has 1146 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
3b7b8743c4f96481b1557aef43c7f499 | Anchore Compliance | Critical | |
addbb93c22e9b0988b8b40392a4538cb | Anchore Compliance | Low | |
GHSA-qmqc-x3r4-6v39 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-m6x4-97wx-4q27 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-758m-v56v-grj4 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-qjwc-v72v-fq6r | Anchore CVE | Medium | undertow-core-2.0.13.Final |
GHSA-f9xh-2qgp-cq57 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-f3j5-rmmp-3fc5 | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-4gq5-ch57-c2mg | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-89qr-369f-5m5x | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-8674-26jc-wh98 | Anchore CVE | Medium | infinispan-core-9.3.1.Final |
GHSA-6wqp-v4v6-c87c | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-5499-qjvh-6j7w | Anchore CVE | Medium | wildfly-elytron-1.6.0.Final |
GHSA-h4x4-5qp2-wp46 | Anchore CVE | Medium | jackson-datatype-jsr310-2.9.5 |
CVE-2021-30468 | Anchore CVE | High | cxf-core-3.2.5-jbossorg-1 |
GHSA-63cq-ppq8-cw6g | Anchore CVE | High | resteasy-client-3.6.1.Final |
GHSA-gwrp-pvrq-jmwv | Anchore CVE | Medium | commons-io-2.5 |
GHSA-8w26-6f25-cm9x | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-27xj-rqx5-2255 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-rf6r-2c4q-2vwg | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-cjjf-94ff-43w7 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-x2w5-5m2g-7h5m | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-4jrv-ppp4-jm57 | Anchore CVE | High | gson-2.8.2 |
GHSA-c2q3-4qrh-fm48 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-8vh8-vc28-m2hf | Anchore CVE | Critical | undertow-core-2.0.13.Final |
GHSA-hr32-mgpm-qf2f | Anchore CVE | Medium | resteasy-client-3.6.1.Final |
GHSA-h47x-2j37-fw5m | Anchore CVE | High | infinispan-core-9.3.1.Final |
GHSA-hr32-mgpm-qf2f | Anchore CVE | Medium | resteasy-client-microprofile-3.6.1.Final |
GHSA-6fpp-rgj9-8rwc | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-58pp-9c76-5625 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-25.0-jre |
GHSA-hr32-mgpm-qf2f | Anchore CVE | Medium | resteasy-client-microprofile-3.6.1.Final |
GHSA-rf6q-vx79-mjxr | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-8c4j-34r4-xr8g | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-339q-62wm-c39w | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-fj7c-vg2v-ccrm | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-4jrv-ppp4-jm57 | Anchore CVE | High | gson-2.8.2 |
GHSA-gww7-p5w4-wrfv | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-63cq-ppq8-cw6g | Anchore CVE | High | resteasy-client-3.6.1.Final |
GHSA-v7wg-cpwc-24m4 | Anchore CVE | High | postgresql-42.2.5 |
GHSA-5p34-5m6p-p58g | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-mx9v-gmh4-mgqw | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-h822-r4r5-v8jg | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-7r82-7xv7-xcpj | Anchore CVE | Medium | httpclient-4.5.2 |
GHSA-c738-77x8-wmq5 | Anchore CVE | Medium | xnio-nio-3.6.5.Final |
GHSA-mfhv-gwf8-4m88 | Anchore CVE | Medium | undertow-core-2.0.13.Final |
GHSA-f9hv-mg5h-xcw9 | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-57j2-w4cx-62h2 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-r695-7vr9-jgc2 | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2021-30468 | Anchore CVE | High | cxf-core-3.2.5-jbossorg-1 |
GHSA-mx7p-6679-8g3q | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-m8p2-495h-ccmh | Anchore CVE | Medium | hibernate-validator-6.0.13.Final |
GHSA-q93h-jc49-78gg | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-v3xw-c963-f5hc | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-6x3v-rw2q-9gx7 | Anchore CVE | Critical | infinispan-core-9.3.1.Final |
GHSA-p43x-xfjf-5jhr | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-cvm9-fjm9-3572 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-x64g-4xx9-fh6x | Anchore CVE | High | cryptacular-1.2.0 |
GHSA-vf6r-mmhc-3xcm | Anchore CVE | Medium | undertow-core-2.0.13.Final |
GHSA-c265-37vj-cwcc | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-hr32-mgpm-qf2f | Anchore CVE | Medium | resteasy-client-3.6.1.Final |
GHSA-8674-26jc-wh98 | Anchore CVE | Medium | infinispan-core-9.3.1.Final |
GHSA-j823-4qch-3rgm | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-qgrq-cx4c-2rmm | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
GHSA-95rf-557x-44g5 | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-5949-rw7g-wx7w | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-9mxf-g3x6-wv74 | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-6hgm-866r-3cjv | Anchore CVE | High | commons-collections4-4.0 |
GHSA-m72m-mhq2-9p6c | Anchore CVE | High | jsoup-1.8.3 |
GHSA-gjmw-vf9h-g25v | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-758m-v56v-grj4 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-rhcw-wjcm-9h6g | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-fmmc-742q-jg75 | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-h3cw-g4mq-c5x2 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-j8wc-gxx9-82hx | Anchore CVE | High | xmlsec-2.1.2 |
GHSA-j8wc-gxx9-82hx | Anchore CVE | High | xmlsec-2.1.2 |
GHSA-gv2w-88hx-8m9r | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-jwgx-9mmh-684w | Anchore CVE | Critical | undertow-core-2.0.13.Final |
GHSA-27xj-rqx5-2255 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-qmqc-x3r4-6v39 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-rf6r-2c4q-2vwg | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-6phf-73q6-gh87 | Anchore CVE | High | commons-beanutils-1.9.3 |
GHSA-cccf-7xw3-p2vr | Anchore CVE | Medium | undertow-core-2.0.13.Final |
GHSA-wh8g-3j2c-rqj5 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-5ww9-j83m-q7qx | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-5499-qjvh-6j7w | Anchore CVE | Medium | wildfly-elytron-1.6.0.Final |
GHSA-h65f-jvqw-m9fj | Anchore CVE | Medium | xercesImpl-2.12.0.SP02 |
GHSA-4gq5-ch57-c2mg | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-6hgm-866r-3cjv | Anchore CVE | High | commons-collections4-4.0 |
GHSA-rvwf-54qp-4r6v | Anchore CVE | High | snakeyaml-1.18 |
GHSA-mc6h-4qgp-37qh | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-20.0 |
GHSA-v585-23hc-c647 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-4w82-r329-3q67 | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-qjw2-hr98-qgfh | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-6fpp-rgj9-8rwc | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-339q-62wm-c39w | Anchore CVE | High | undertow-core-2.0.13.Final |
CVE-2021-22696 | Anchore CVE | High | cxf-core-3.2.5-jbossorg-1 |
GHSA-8c4j-34r4-xr8g | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2019-0210 | Anchore CVE | High | libthrift-0.11.0 |
GHSA-6phf-73q6-gh87 | Anchore CVE | High | commons-beanutils-1.9.3 |
GHSA-p9w3-gwc2-cr49 | Anchore CVE | Medium | undertow-core-2.0.13.Final |
GHSA-x2w5-5m2g-7h5m | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-cjjf-94ff-43w7 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-gww7-p5w4-wrfv | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-mvr2-9pj6-7w5j | Anchore CVE | Medium | guava-20.0 |
GHSA-qjwc-v72v-fq6r | Anchore CVE | Medium | undertow-core-2.0.13.Final |
CVE-2020-13954 | Anchore CVE | Medium | cxf-core-3.2.5-jbossorg-1 |
GHSA-88cc-g835-76rp | Anchore CVE | High | postgresql-42.2.5 |
GHSA-g4cp-h53p-v3v8 | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-rpr3-cw39-3pxh | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-2259-h742-5vr4 | Anchore CVE | Medium | jboss-ejb-client-4.0.11.Final |
GHSA-p6j8-hgv5-m35g | Anchore CVE | High | jboss-remoting-5.0.8.Final |
GHSA-r3gr-cxrf-hg25 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-gwp4-hfv6-p7hw | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-xvch-r4wf-h8w9 | Anchore CVE | High | proton-j-0.16.0 |
CVE-2021-22696 | Anchore CVE | High | cxf-core-3.2.5-jbossorg-1 |
GHSA-7r82-7xv7-xcpj | Anchore CVE | Medium | httpclient-4.5.2 |
GHSA-vfqx-33qm-g869 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-h822-r4r5-v8jg | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-p43x-xfjf-5jhr | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-8vh8-vc28-m2hf | Anchore CVE | Critical | undertow-core-2.0.13.Final |
GHSA-9m6f-7xcq-8vf8 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-rmrm-75hp-phr2 | Anchore CVE | Medium | hibernate-validator-6.0.13.Final |
CVE-2019-17573 | Anchore CVE | Medium | cxf-core-3.2.5-jbossorg-1 |
GHSA-x64g-4xx9-fh6x | Anchore CVE | High | cryptacular-1.2.0 |
GHSA-mx7p-6679-8g3q | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-j823-4qch-3rgm | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-fqwf-pjwf-7vqv | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2019-12423 | Anchore CVE | High | cxf-core-3.2.5-jbossorg-1 |
GHSA-6hgm-866r-3cjv | Anchore CVE | High | commons-collections4-4.0 |
GHSA-gjmw-vf9h-g25v | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-9gph-22xh-8x98 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-p6j8-hgv5-m35g | Anchore CVE | High | jboss-remoting-5.0.8.Final |
CVE-2020-1954 | Anchore CVE | Medium | cxf-core-3.2.5-jbossorg-1 |
GHSA-rvwf-54qp-4r6v | Anchore CVE | High | snakeyaml-1.18 |
GHSA-h4rc-386g-6m85 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-mfhv-gwf8-4m88 | Anchore CVE | Medium | undertow-core-2.0.13.Final |
CVE-2020-1954 | Anchore CVE | Medium | cxf-core-3.2.5-jbossorg-1 |
GHSA-5949-rw7g-wx7w | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-288c-cq4h-88gq | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-9mxf-g3x6-wv74 | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-mph4-vhrx-mv67 | Anchore CVE | Medium | jackson-databind-2.9.5 |
GHSA-h4x4-5qp2-wp46 | Anchore CVE | Medium | jackson-datatype-jsr310-2.9.5 |
GHSA-c738-77x8-wmq5 | Anchore CVE | Medium | xnio-nio-3.6.5.Final |
GHSA-wh8g-3j2c-rqj5 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-5ww9-j83m-q7qx | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-645p-88qh-w398 | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-h65f-jvqw-m9fj | Anchore CVE | Medium | xercesImpl-2.12.0.SP02 |
GHSA-6wqp-v4v6-c87c | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2019-12423 | Anchore CVE | High | cxf-core-3.2.5-jbossorg-1 |
GHSA-c265-37vj-cwcc | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2019-12406 | Anchore CVE | Medium | cxf-core-3.2.5-jbossorg-1 |
GHSA-w77p-8cfg-2x43 | Anchore CVE | Critical | slf4j-ext-1.7.22.jbossorg-1 |
GHSA-9vvp-fxw6-jcxr | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-2w73-fqqj-c92p | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-95cm-88f5-f2c7 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-6hgm-866r-3cjv | Anchore CVE | High | commons-collections4-4.0 |
GHSA-h3cw-g4mq-c5x2 | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2019-12406 | Anchore CVE | Medium | cxf-core-3.2.5-jbossorg-1 |
GHSA-m6x4-97wx-4q27 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-25.0-jre |
GHSA-c8hm-7hpq-7jhg | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-p979-4mfw-53vg | Anchore CVE | High | netty-all-4.1.25.Final |
GHSA-cf6r-3wgc-h863 | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2019-17573 | Anchore CVE | Medium | cxf-core-3.2.5-jbossorg-1 |
CVE-2018-20200 | Anchore CVE | Medium | okhttp-3.9.0 |
GHSA-7fhr-2694-rg79 | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
GHSA-w77p-8cfg-2x43 | Anchore CVE | Critical | slf4j-ext-1.7.22.jbossorg-1 |
GHSA-gwrp-pvrq-jmwv | Anchore CVE | Medium | commons-io-2.5 |
GHSA-2259-h742-5vr4 | Anchore CVE | Medium | jboss-ejb-client-4.0.11.Final |
GHSA-89qr-369f-5m5x | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-rf6q-vx79-mjxr | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-mc6h-4qgp-37qh | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-cmfg-87vq-g5g4 | Anchore CVE | Medium | jackson-databind-2.9.5 |
GHSA-8w26-6f25-cm9x | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-rhcw-wjcm-9h6g | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-fmmc-742q-jg75 | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-qr7j-h6gg-jmgc | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-f9xh-2qgp-cq57 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-4w82-r329-3q67 | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-f3j5-rmmp-3fc5 | Anchore CVE | Critical | jackson-databind-2.9.5 |
CVE-2019-0210 | Anchore CVE | High | libthrift-0.11.0 |
GHSA-r3gr-cxrf-hg25 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-qr7j-h6gg-jmgc | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-673j-qm5f-xpv8 | Anchore CVE | Medium | postgresql-42.2.5 |
GHSA-jwgx-9mmh-684w | Anchore CVE | Critical | undertow-core-2.0.13.Final |
GHSA-p9w3-gwc2-cr49 | Anchore CVE | Medium | undertow-core-2.0.13.Final |
GHSA-c2q3-4qrh-fm48 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-cccf-7xw3-p2vr | Anchore CVE | Medium | undertow-core-2.0.13.Final |
GHSA-f9hv-mg5h-xcw9 | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-57j2-w4cx-62h2 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-rmrm-75hp-phr2 | Anchore CVE | Medium | hibernate-validator-6.0.13.Final |
GHSA-fj7c-vg2v-ccrm | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-qjw2-hr98-qgfh | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-rpr3-cw39-3pxh | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-h47x-2j37-fw5m | Anchore CVE | High | infinispan-core-9.3.1.Final |
GHSA-vf6r-mmhc-3xcm | Anchore CVE | Medium | undertow-core-2.0.13.Final |
GHSA-9m6f-7xcq-8vf8 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-4q98-wr72-h35w | Anchore CVE | Medium | xmlsec-2.1.2 |
GHSA-mx9v-gmh4-mgqw | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-4q98-wr72-h35w | Anchore CVE | Medium | xmlsec-2.1.2 |
GHSA-7fhr-2694-rg79 | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
CVE-2017-3156 | Anchore CVE | High | cxf-xjc-runtime-3.1.0 |
GHSA-r38f-c4h4-hqq2 | Anchore CVE | High | postgresql-42.2.5 |
GHSA-gwrp-pvrq-jmwv | Anchore CVE | Medium | commons-io-2.5 |
GHSA-fqwf-pjwf-7vqv | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-qgrq-cx4c-2rmm | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
GHSA-gwp4-hfv6-p7hw | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-85cw-hj65-qqv9 | Anchore CVE | Critical | jackson-databind-2.9.5 |
CVE-2017-3156 | Anchore CVE | High | cxf-xjc-runtime-3.1.0 |
GHSA-58pp-9c76-5625 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-r695-7vr9-jgc2 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-vfqx-33qm-g869 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-mvr2-9pj6-7w5j | Anchore CVE | Medium | guava-20.0 |
GHSA-95rf-557x-44g5 | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-85cw-hj65-qqv9 | Anchore CVE | Critical | jackson-databind-2.9.5 |
CVE-2019-12419 | Anchore CVE | Critical | cxf-core-3.2.5-jbossorg-1 |
GHSA-9gph-22xh-8x98 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-m72m-mhq2-9p6c | Anchore CVE | High | jsoup-1.8.3 |
GHSA-g4cp-h53p-v3v8 | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-cvm9-fjm9-3572 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-5p34-5m6p-p58g | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-h4rc-386g-6m85 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-288c-cq4h-88gq | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2020-13954 | Anchore CVE | Medium | cxf-core-3.2.5-jbossorg-1 |
GHSA-mph4-vhrx-mv67 | Anchore CVE | Medium | jackson-databind-2.9.5 |
GHSA-w4jq-qh47-hvjq | Anchore CVE | Medium | xercesImpl-2.12.0.SP02 |
GHSA-6hgm-866r-3cjv | Anchore CVE | High | commons-collections4-4.0 |
GHSA-645p-88qh-w398 | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-6x3v-rw2q-9gx7 | Anchore CVE | Critical | infinispan-core-9.3.1.Final |
GHSA-q93h-jc49-78gg | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-v3xw-c963-f5hc | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-95cm-88f5-f2c7 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-gwrp-pvrq-jmwv | Anchore CVE | Medium | commons-io-2.5 |
GHSA-6hgm-866r-3cjv | Anchore CVE | High | commons-collections4-4.0 |
GHSA-w4jq-qh47-hvjq | Anchore CVE | Medium | xercesImpl-2.12.0.SP02 |
GHSA-c8hm-7hpq-7jhg | Anchore CVE | Critical | jackson-databind-2.9.5 |
CVE-2019-12419 | Anchore CVE | Critical | cxf-core-3.2.5-jbossorg-1 |
GHSA-p979-4mfw-53vg | Anchore CVE | High | netty-all-4.1.25.Final |
CVE-2018-20200 | Anchore CVE | Medium | okhttp-3.9.0 |
GHSA-cf6r-3wgc-h863 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-m8p2-495h-ccmh | Anchore CVE | Medium | hibernate-validator-6.0.13.Final |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-20.0 |
GHSA-gv2w-88hx-8m9r | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-v585-23hc-c647 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-9vvp-fxw6-jcxr | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-2w73-fqqj-c92p | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-xvch-r4wf-h8w9 | Anchore CVE | High | proton-j-0.16.0 |
GHSA-gwrp-pvrq-jmwv | Anchore CVE | Medium | commons-io-2.5 |
GHSA-cmfg-87vq-g5g4 | Anchore CVE | Medium | jackson-databind-2.9.5 |
GHSA-cv6r-h2fm-pvrp | Anchore CVE | Medium | artemis-server-2.6.3.jbossorg-001 |
GHSA-cv6r-h2fm-pvrp | Anchore CVE | Medium | artemis-server-2.6.3.jbossorg-001 |
GHSA-gp7f-rwcx-9369 | Anchore CVE | Medium | jsoup-1.8.3 |
GHSA-gp7f-rwcx-9369 | Anchore CVE | Medium | jsoup-1.8.3 |
GHSA-gf8c-j759-86mg | Anchore CVE | Medium | artemis-core-client-2.6.3.jbossorg-001 |
GHSA-gf8c-j759-86mg | Anchore CVE | Medium | artemis-core-client-2.6.3.jbossorg-001 |
GHSA-w88m-2936-rmxr | Anchore CVE | Low | wildfly-server-6.0.2.Final |
GHSA-w88m-2936-rmxr | Anchore CVE | Low | wildfly-server-6.0.2.Final |
GHSA-727h-hrw8-jg8q | Anchore CVE | Low | postgresql-42.2.5 |
GHSA-3mc7-4q67-w48m | Anchore CVE | High | snakeyaml-1.18 |
GHSA-3mc7-4q67-w48m | Anchore CVE | High | snakeyaml-1.18 |
GHSA-9w3m-gqgf-c4p9 | Anchore CVE | Medium | snakeyaml-1.18 |
GHSA-9w3m-gqgf-c4p9 | Anchore CVE | Medium | snakeyaml-1.18 |
GHSA-c4r9-r8fh-9vj2 | Anchore CVE | Medium | snakeyaml-1.18 |
GHSA-c4r9-r8fh-9vj2 | Anchore CVE | Medium | snakeyaml-1.18 |
GHSA-98wm-3w3q-mw94 | Anchore CVE | Medium | snakeyaml-1.18 |
GHSA-98wm-3w3q-mw94 | Anchore CVE | Medium | snakeyaml-1.18 |
GHSA-hhhw-99gj-p3c3 | Anchore CVE | Medium | snakeyaml-1.18 |
GHSA-hhhw-99gj-p3c3 | Anchore CVE | Medium | snakeyaml-1.18 |
GHSA-56h3-78gp-v83r | Anchore CVE | Medium | jettison-1.3.8 |
GHSA-56h3-78gp-v83r | Anchore CVE | Medium | jettison-1.3.8 |
GHSA-jjjh-jjxp-wpff | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-jjjh-jjxp-wpff | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-rgv9-q543-rqg4 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-rgv9-q543-rqg4 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-x27m-9w8j-5vcw | Anchore CVE | High | jettison-1.3.8 |
GHSA-x27m-9w8j-5vcw | Anchore CVE | High | jettison-1.3.8 |
GHSA-599f-7c49-w659 | Anchore CVE | Critical | commons-text-1.8 |
GHSA-599f-7c49-w659 | Anchore CVE | Critical | commons-text-1.8 |
GHSA-599f-7c49-w659 | Anchore CVE | Critical | commons-text-1.8 |
GHSA-3f7h-mf4q-vrm4 | Anchore CVE | Medium | woodstox-core-5.0.3 |
GHSA-3f7h-mf4q-vrm4 | Anchore CVE | Medium | woodstox-core-5.0.3 |
GHSA-2c9q-qwrc-f486 | Anchore CVE | High | picketlink-common-2.5.5.SP12 |
GHSA-5h6x-m52p-23ph | Anchore CVE | High | proton-j-0.16.0 |
GHSA-5h6x-m52p-23ph | Anchore CVE | High | proton-j-0.16.0 |
GHSA-2c9q-qwrc-f486 | Anchore CVE | High | picketlink-common-2.5.5.SP12 |
GHSA-fjq5-5j5f-mvxh | Anchore CVE | Critical | commons-collections4-4.0 |
GHSA-fjq5-5j5f-mvxh | Anchore CVE | Critical | commons-collections4-4.0 |
GHSA-fjq5-5j5f-mvxh | Anchore CVE | Critical | commons-collections4-4.0 |
GHSA-fjq5-5j5f-mvxh | Anchore CVE | Critical | commons-collections4-4.0 |
GHSA-fjq5-5j5f-mvxh | Anchore CVE | Critical | commons-collections4-4.0 |
GHSA-fjq5-5j5f-mvxh | Anchore CVE | Critical | commons-collections4-4.0 |
GHSA-w37g-rhq8-7m4j | Anchore CVE | Medium | snakeyaml-1.18 |
GHSA-w37g-rhq8-7m4j | Anchore CVE | Medium | snakeyaml-1.18 |
GHSA-vjxc-frw4-jmh5 | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-562r-vg33-8x8h | Anchore CVE | Medium | postgresql-42.2.5 |
GHSA-vjxc-frw4-jmh5 | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-mjmj-j48q-9wg2 | Anchore CVE | High | snakeyaml-1.18 |
GHSA-mjmj-j48q-9wg2 | Anchore CVE | High | snakeyaml-1.18 |
GHSA-3w37-5p3p-jv92 | Anchore CVE | High | cxf-core-3.2.5-jbossorg-1 |
GHSA-3w37-5p3p-jv92 | Anchore CVE | High | cxf-core-3.2.5-jbossorg-1 |
GHSA-x3x3-qwjq-8gj4 | Anchore CVE | Critical | cxf-core-3.2.5-jbossorg-1 |
GHSA-x3x3-qwjq-8gj4 | Anchore CVE | Critical | cxf-core-3.2.5-jbossorg-1 |
GHSA-7rf3-mqpx-h7xg | Anchore CVE | High | jettison-1.3.8 |
GHSA-grr4-wv38-f68w | Anchore CVE | High | jettison-1.3.8 |
GHSA-7rf3-mqpx-h7xg | Anchore CVE | High | jettison-1.3.8 |
GHSA-grr4-wv38-f68w | Anchore CVE | High | jettison-1.3.8 |
GHSA-jmj6-p2j9-68cp | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
GHSA-jmj6-p2j9-68cp | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
GHSA-pfcc-3g6r-8rg8 | Anchore CVE | Critical | undertow-core-2.0.13.Final |
GHSA-pfcc-3g6r-8rg8 | Anchore CVE | Critical | undertow-core-2.0.13.Final |
CVE-2022-40705 | Anchore CVE | High | cxf-rt-bindings-soap-3.2.5-jbossorg-1 |
CVE-2022-40705 | Anchore CVE | High | cxf-rt-bindings-soap-3.2.5-jbossorg-1 |
GHSA-q6g2-g7f3-rr83 | Anchore CVE | High | jettison-1.3.8 |
GHSA-q6g2-g7f3-rr83 | Anchore CVE | High | jettison-1.3.8 |
GHSA-3vqj-43w4-2q58 | Anchore CVE | High | json-20140107 |
GHSA-3vqj-43w4-2q58 | Anchore CVE | High | json-20140107 |
GHSA-3vqj-43w4-2q58 | Anchore CVE | High | json-20140107 |
GHSA-3vqj-43w4-2q58 | Anchore CVE | High | json-20140107 |
GHSA-3vqj-43w4-2q58 | Anchore CVE | High | json-20140107 |
GHSA-3vqj-43w4-2q58 | Anchore CVE | High | json-20140107 |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-25.0-jre |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-20.0 |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-20.0 |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-25.0-jre |
GHSA-6mjq-h674-j845 | Anchore CVE | Medium | netty-handler-4.1.68.Final |
GHSA-6mjq-h674-j845 | Anchore CVE | Medium | netty-handler-4.1.68.Final |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.9.5 |
CCE-85987-6 | OSCAP Compliance | Medium | |
CVE-2022-42889 | Twistlock CVE | Critical | org.apache.commons_commons-text-1.8 |
CVE-2022-31197 | Twistlock CVE | High | org.postgresql_postgresql-42.2.5 |
CVE-2022-25647 | Twistlock CVE | High | com.google.code.gson_gson-2.8.2 |
CVE-2022-21724 | Twistlock CVE | High | org.postgresql_postgresql-42.2.5 |
CVE-2020-13692 | Twistlock CVE | High | org.postgresql_postgresql-42.2.5 |
CVE-2019-0223 | Twistlock CVE | High | org.apache.qpid_proton-j-0.16.0 |
CVE-2018-17187 | Twistlock CVE | High | org.apache.qpid_proton-j-0.16.0 |
CVE-2015-6420 | Twistlock CVE | High | org.apache.commons_commons-collections4-4.0 |
GHSA-673j-qm5f-xpv8 | Twistlock CVE | Medium | org.postgresql_postgresql-42.2.5 |
CVE-2022-40149 | Twistlock CVE | Medium | org.codehaus.jettison_jettison-1.3.8 |
CVE-2018-1000873 | Twistlock CVE | Medium | com.fasterxml.jackson.datatype_jackson-datatype-jsr310-2.9.5 |
CVE-2022-40152 | Twistlock CVE | Medium | com.fasterxml.woodstox_woodstox-core-5.0.3 |
CVE-2022-40150 | Twistlock CVE | High | org.codehaus.jettison_jettison-1.3.8 |
CVE-2015-7501 | Twistlock CVE | Critical | org.apache.commons_commons-collections4-4.0 |
CVE-2022-41946 | Twistlock CVE | Medium | org.postgresql_postgresql-42.2.5 |
CVE-2022-45693 | Twistlock CVE | High | org.codehaus.jettison_jettison-1.3.8 |
CVE-2022-45685 | Twistlock CVE | High | org.codehaus.jettison_jettison-1.3.8 |
CVE-2022-3857 | Twistlock CVE | Low | libpng-1.6.34-5.el8 |
CVE-2019-7317 | Twistlock CVE | Low | libpng-1.6.34-5.el8 |
CVE-2023-1436 | Twistlock CVE | High | org.codehaus.jettison_jettison-1.3.8 |
CVE-2022-23221 | Twistlock CVE | Critical | h2-1.4.193 |
CVE-2021-42392 | Twistlock CVE | Critical | h2-1.4.193 |
CVE-2021-33813 | Twistlock CVE | High | org.jdom_jdom-1.1.3 |
CVE-2020-15522 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.60 |
CVE-2018-11798 | Twistlock CVE | Medium | libthrift-0.11.0 |
CVE-2021-31879 | Twistlock CVE | Medium | wget-1.19.5-11.el8 |
CVE-2020-21674 | Twistlock CVE | Low | libarchive-3.3.3-5.el8 |
CVE-2021-20193 | Twistlock CVE | Low | tar-1.30-9.el8 |
CVE-2019-9923 | Twistlock CVE | Low | tar-1.30-9.el8 |
CVE-2018-1000880 | Twistlock CVE | Low | libarchive-3.3.3-5.el8 |
CVE-2018-1000879 | Twistlock CVE | Low | libarchive-3.3.3-5.el8 |
CVE-2023-2953 | Twistlock CVE | Low | openldap-2.4.46-18.el8 |
CVE-2023-32665 | Twistlock CVE | Low | glib2-2.56.4-161.el8 |
CVE-2023-32611 | Twistlock CVE | Low | glib2-2.56.4-161.el8 |
CVE-2023-29499 | Twistlock CVE | Low | glib2-2.56.4-161.el8 |
CVE-2023-32636 | Twistlock CVE | Low | glib2-2.56.4-161.el8 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.9.5 |
GHSA-w33c-445m-f8w7 | Anchore CVE | Medium | okio-1.13.0 |
GHSA-w33c-445m-f8w7 | Anchore CVE | Medium | okio-1.13.0 |
CVE-2023-37895 | Anchore CVE | Critical | jackrabbit-jcr-commons-2.18.0 |
CVE-2023-37895 | Anchore CVE | Critical | jackrabbit-data-2.20.4 |
CVE-2023-37895 | Anchore CVE | Critical | jackrabbit-webdav-2.17.6 |
GHSA-qcch-9268-59jw | Anchore CVE | Medium | jboss-ejb-client-4.0.11.Final |
GHSA-qcch-9268-59jw | Anchore CVE | Medium | jboss-ejb-client-4.0.11.Final |
GHSA-m4mm-pg93-fv78 | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-m4mm-pg93-fv78 | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-3p86-9955-h393 | Anchore CVE | High | org.eclipse.jgit-5.0.2.201807311906-r |
GHSA-3p86-9955-h393 | Anchore CVE | High | org.eclipse.jgit-5.0.2.201807311906-r |
CVE-2021-31879 | Anchore CVE | Medium | wget-1.19.5-11.el8 |
GHSA-pr38-qpxm-g88x | Anchore CVE | High | artemis-core-client-2.6.3.jbossorg-001 |
GHSA-w69w-jvc7-wjgv | Anchore CVE | High | undertow-servlet-2.0.13.Final |
GHSA-pr38-qpxm-g88x | Anchore CVE | High | artemis-core-client-2.6.3.jbossorg-001 |
GHSA-w69w-jvc7-wjgv | Anchore CVE | High | undertow-servlet-2.0.13.Final |
GHSA-ffm7-7r8g-77xm | Anchore CVE | Medium | cxf-rt-management-3.2.5-jbossorg-1 |
GHSA-ffm7-7r8g-77xm | Anchore CVE | Medium | cxf-rt-management-3.2.5-jbossorg-1 |
GHSA-82v2-f875-73g9 | Anchore CVE | Medium | wildfly-host-controller-6.0.2.Final |
GHSA-82v2-f875-73g9 | Anchore CVE | Medium | wildfly-host-controller-6.0.2.Final |
GHSA-rhrv-645h-fjfh | Anchore CVE | High | avro-1.7.6 |
GHSA-rhrv-645h-fjfh | Anchore CVE | High | avro-1.7.6 |
CVE-2023-0833 | Anchore CVE | Medium | okhttp-3.9.0 |
CVE-2023-0833 | Anchore CVE | Medium | okhttp-3.9.0 |
GHSA-xfrj-6vvc-3xm2 | Anchore CVE | Medium | xmlsec-2.1.2 |
GHSA-xfrj-6vvc-3xm2 | Anchore CVE | Medium | xmlsec-2.1.2 |
GHSA-26qx-4m49-6cfr | Anchore CVE | Medium | wildfly-controller-6.0.2.Final |
GHSA-26qx-4m49-6cfr | Anchore CVE | Medium | wildfly-controller-6.0.2.Final |
CVE-2023-37920 | Anchore CVE | Low | ca-certificates-2023.2.60_v7.0.306-80.0.el8_8 |
CVE-2022-47010 | Anchore CVE | Low | gdb-gdbserver-8.2-20.el8 |
GHSA-4jq9-2xhw-jpx7 | Anchore CVE | High | json-20140107 |
GHSA-4jq9-2xhw-jpx7 | Anchore CVE | High | json-20140107 |
GHSA-4jq9-2xhw-jpx7 | Anchore CVE | High | json-20140107 |
GHSA-4jq9-2xhw-jpx7 | Anchore CVE | High | json-20140107 |
GHSA-4jq9-2xhw-jpx7 | Anchore CVE | High | json-20140107 |
CVE-2022-47007 | Anchore CVE | Low | gdb-gdbserver-8.2-20.el8 |
GHSA-4jq9-2xhw-jpx7 | Anchore CVE | High | json-20140107 |
CVE-2022-47011 | Anchore CVE | Low | gdb-gdbserver-8.2-20.el8 |
CVE-2023-2222 | Anchore CVE | Low | gdb-gdbserver-8.2-20.el8 |
GHSA-5r5r-6hpj-8gg9 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-5r5r-6hpj-8gg9 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-hwj3-m3p6-hj38 | Anchore CVE | Critical | dom4j-1.6.1 |
GHSA-vx85-mj8c-4qm6 | Anchore CVE | Medium | libthrift-0.11.0 |
GHSA-6pcc-3rfx-4gpm | Anchore CVE | High | dom4j-1.6.1 |
GHSA-vx85-mj8c-4qm6 | Anchore CVE | Medium | libthrift-0.11.0 |
GHSA-g2fg-mr77-6vrm | Anchore CVE | High | libthrift-0.11.0 |
GHSA-g2fg-mr77-6vrm | Anchore CVE | High | libthrift-0.11.0 |
GHSA-hwj3-m3p6-hj38 | Anchore CVE | Critical | dom4j-1.6.1 |
GHSA-6pcc-3rfx-4gpm | Anchore CVE | High | dom4j-1.6.1 |
GHSA-wjxj-f8rg-99wx | Anchore CVE | High | libthrift-0.11.0 |
GHSA-rj7p-rfgp-852x | Anchore CVE | High | libthrift-0.11.0 |
GHSA-wjxj-f8rg-99wx | Anchore CVE | High | libthrift-0.11.0 |
GHSA-rj7p-rfgp-852x | Anchore CVE | High | libthrift-0.11.0 |
CVE-2023-7008 | Anchore CVE | Medium | systemd-pam-239-78.el8 |
CVE-2023-7008 | Anchore CVE | Medium | systemd-libs-239-78.el8 |
CVE-2023-7008 | Anchore CVE | Medium | systemd-239-78.el8 |
CVE-2023-5455 | Anchore CVE | Medium | krb5-libs-1.18.2-26.el8_9 |
CVE-2024-22365 | Anchore CVE | Medium | pam-1.3.1-27.el8 |
CVE-2023-32611 | Anchore CVE | Low | glib2-2.56.4-161.el8 |
CVE-2023-29499 | Anchore CVE | Low | glib2-2.56.4-161.el8 |
CVE-2023-32665 | Anchore CVE | Low | glib2-2.56.4-161.el8 |
CVE-2021-43618 | Anchore CVE | Medium | gmp-1:6.1.2-10.el8 |
CVE-2023-6004 | Anchore CVE | Low | libssh-0.9.6-13.el8_9 |
CVE-2023-6918 | Anchore CVE | Low | libssh-config-0.9.6-13.el8_9 |
CVE-2023-6918 | Anchore CVE | Low | libssh-0.9.6-13.el8_9 |
CVE-2023-6004 | Anchore CVE | Low | libssh-config-0.9.6-13.el8_9 |
CVE-2024-25062 | Anchore CVE | Medium | python3-libxml2-2.9.7-18.el8_9 |
CVE-2024-25062 | Anchore CVE | Medium | libxml2-2.9.7-18.el8_9 |
GHSA-24rp-q3w6-vc56 | Anchore CVE | Critical | postgresql-42.2.5 |
GHSA-qmgx-j96g-4428 | Anchore CVE | Medium | cxf-core-3.2.5-jbossorg-1 |
GHSA-qmgx-j96g-4428 | Anchore CVE | Medium | cxf-core-3.2.5-jbossorg-1 |
CVE-2024-2236 | Anchore CVE | Medium | libgcrypt-1.8.5-7.el8_6 |
GHSA-7f88-5hhx-67m2 | Anchore CVE | High | xnio-api-3.6.5.Final |
GHSA-7f88-5hhx-67m2 | Anchore CVE | High | xnio-api-3.6.5.Final |
CVE-2024-26458 | Anchore CVE | Low | krb5-libs-1.18.2-26.el8_9 |
CVE-2024-2398 | Anchore CVE | Medium | curl-7.61.1-33.el8_9.5 |
CVE-2024-2398 | Anchore CVE | Medium | libcurl-7.61.1-33.el8_9.5 |
CVE-2024-27316 | Anchore CVE | Medium | libnghttp2-1.33.0-5.el8_9 |
CVE-2024-28182 | Anchore CVE | Medium | libnghttp2-1.33.0-5.el8_9 |
CVE-2024-3205 | Anchore CVE | Medium | libyaml-0.1.7-5.el8 |
CVE-2024-2511 | Anchore CVE | Low | openssl-1:1.1.1k-12.el8_9 |
CCE-86931-3 | OSCAP Compliance | Medium | |
CCE-86916-4 | OSCAP Compliance | Medium | |
CCE-85902-5 | OSCAP Compliance | High | |
CCE-85897-7 | OSCAP Compliance | Medium | |
CCE-85870-4 | OSCAP Compliance | Medium | |
CCE-85899-3 | OSCAP Compliance | Medium | |
CCE-86261-5 | OSCAP Compliance | Medium | |
CCE-80675-2 | OSCAP Compliance | Medium | |
CCE-85964-5 | OSCAP Compliance | Medium | |
CCE-82891-3 | OSCAP Compliance | Medium | |
CCE-84220-3 | OSCAP Compliance | Low | |
CCE-83733-6 | OSCAP Compliance | Low | |
CCE-80763-6 | OSCAP Compliance | Medium | |
CCE-83918-3 | OSCAP Compliance | Medium | |
CCE-82988-7 | OSCAP Compliance | Low | |
CCE-82840-0 | OSCAP Compliance | Low | |
CCE-84300-3 | OSCAP Compliance | Medium | |
CCE-86266-4 | OSCAP Compliance | Medium | |
CCE-80785-9 | OSCAP Compliance | High | |
CCE-82155-3 | OSCAP Compliance | High | |
CCE-80942-6 | OSCAP Compliance | High | |
CCE-80789-1 | OSCAP Compliance | High | |
CCE-86478-5 | OSCAP Compliance | Medium | |
CCE-82028-2 | OSCAP Compliance | Medium | |
CCE-80832-9 | OSCAP Compliance | Medium | |
CCE-82059-7 | OSCAP Compliance | Medium | |
CCE-81031-7 | OSCAP Compliance | Low | |
CCE-82005-0 | OSCAP Compliance | Low | |
CCE-80834-5 | OSCAP Compliance | Medium | |
CCE-82297-3 | OSCAP Compliance | Low | |
CCE-80835-2 | OSCAP Compliance | Medium | |
CCE-86960-2 | OSCAP Compliance | Medium | |
CCE-90784-0 | OSCAP Compliance | Medium | |
CCE-80837-8 | OSCAP Compliance | Medium | |
CCE-80838-6 | OSCAP Compliance | Medium | |
CCE-80839-4 | OSCAP Compliance | Medium | |
CCE-80844-4 | OSCAP Compliance | Medium | |
CCE-81043-2 | OSCAP Compliance | Medium | |
CCE-82191-8 | OSCAP Compliance | Medium | |
CCE-82998-6 | OSCAP Compliance | Medium | |
CCE-87036-0 | OSCAP Compliance | Medium | |
CCE-86260-7 | OSCAP Compliance | Medium | |
CCE-80846-9 | OSCAP Compliance | Medium | |
CCE-83303-8 | OSCAP Compliance | Medium | |
CCE-82976-2 | OSCAP Compliance | Low | |
CCE-85983-5 | OSCAP Compliance | Medium | |
CCE-82859-0 | OSCAP Compliance | Medium | |
CCE-80847-7 | OSCAP Compliance | Medium | |
CCE-80644-8 | OSCAP Compliance | Medium | |
CCE-82959-8 | OSCAP Compliance | Medium | |
CCE-81044-0 | OSCAP Compliance | Low | |
CCE-80851-9 | OSCAP Compliance | Low | |
CCE-80852-7 | OSCAP Compliance | Low | |
CCE-80853-5 | OSCAP Compliance | Low | |
CCE-80854-3 | OSCAP Compliance | Low | |
CCE-82730-3 | OSCAP Compliance | Medium | |
CCE-80859-2 | OSCAP Compliance | Medium | |
CCE-86339-9 | OSCAP Compliance | Medium | |
CCE-86098-1 | OSCAP Compliance | Medium | |
CCE-85992-6 | OSCAP Compliance | Medium | |
CCE-83426-7 | OSCAP Compliance | Medium | |
CCE-80863-4 | OSCAP Compliance | Medium | |
CCE-80868-3 | OSCAP Compliance | Medium | |
CCE-80869-1 | OSCAP Compliance | High | |
CCE-86353-0 | OSCAP Compliance | Medium | |
CCE-82249-4 | OSCAP Compliance | Medium | |
CCE-80886-5 | OSCAP Compliance | Medium | |
CCE-82426-8 | OSCAP Compliance | Medium | |
CCE-82853-3 | OSCAP Compliance | Medium | |
CCE-90781-6 | OSCAP Compliance | Medium | |
CCE-82462-3 | OSCAP Compliance | Low | |
CCE-84027-2 | OSCAP Compliance | High | |
CCE-81027-5 | OSCAP Compliance | Medium | |
CCE-81030-9 | OSCAP Compliance | Medium | |
CCE-82215-5 | OSCAP Compliance | Medium | |
CCE-80913-7 | OSCAP Compliance | Low | |
CCE-80952-5 | OSCAP Compliance | Medium | |
CCE-80915-2 | OSCAP Compliance | Medium | |
CCE-81054-9 | OSCAP Compliance | Low | |
CCE-80916-0 | OSCAP Compliance | Medium | |
CCE-82974-7 | OSCAP Compliance | Medium | |
CCE-80953-3 | OSCAP Compliance | Medium | |
CCE-82934-1 | OSCAP Compliance | Medium | |
CCE-80917-8 | OSCAP Compliance | Medium | |
CCE-81011-9 | OSCAP Compliance | Medium | |
CCE-86220-1 | OSCAP Compliance | Medium | |
CCE-81021-8 | OSCAP Compliance | Medium | |
CCE-80918-6 | OSCAP Compliance | Medium | |
CCE-80919-4 | OSCAP Compliance | Medium | |
CCE-80920-2 | OSCAP Compliance | Medium | |
CCE-80921-0 | OSCAP Compliance | Medium | |
CCE-80922-8 | OSCAP Compliance | Medium | |
CCE-81006-9 | OSCAP Compliance | Medium | |
CCE-81009-3 | OSCAP Compliance | Medium | |
CCE-81013-5 | OSCAP Compliance | Medium | |
CCE-82863-2 | OSCAP Compliance | Medium | |
CCE-81007-7 | OSCAP Compliance | Medium | |
CCE-81010-1 | OSCAP Compliance | Medium | |
CCE-81015-0 | OSCAP Compliance | Medium | |
CCE-82211-4 | OSCAP Compliance | Medium | |
CCE-83774-0 | OSCAP Compliance | Medium | |
CVE-2019-10202 | Twistlock CVE | Critical | jackson-mapper-asl-1.9.13 |
CVE-2023-3635 | Twistlock CVE | Medium | com.squareup.okio_okio-1.13.0 |
CVE-2023-4156 | Twistlock CVE | Low | gawk-4.2.1-4.el8 |
CVE-2023-33201 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.60 |
CVE-2023-39410 | Twistlock CVE | High | org.apache.avro_avro-1.7.6 |
CVE-2023-37920 | Twistlock CVE | Low | ca-certificates-2023.2.60_v7.0.306-80.0.el8_8 |
CVE-2023-4504 | Twistlock CVE | Medium | cups-libs-2.2.6-54.el8_9 |
CVE-2018-20839 | Twistlock CVE | Medium | systemd-pam-239-78.el8 |
CVE-2018-20839 | Twistlock CVE | Medium | systemd-libs-239-78.el8 |
CVE-2018-20839 | Twistlock CVE | Medium | systemd-239-78.el8 |
CVE-2022-0235 | Twistlock CVE | Medium | python3-cloud-what-1.28.40-1.el8_9 |
CVE-2022-0235 | Twistlock CVE | Medium | python3-syspurpose-1.28.40-1.el8_9 |
CVE-2022-0235 | Twistlock CVE | Medium | subscription-manager-rhsm-certificates-20220623-1.el8 |
CVE-2022-0235 | Twistlock CVE | Medium | python3-subscription-manager-rhsm-1.28.40-1.el8_9 |
CVE-2022-0235 | Twistlock CVE | Medium | subscription-manager-1.28.40-1.el8_9 |
CVE-2022-0235 | Twistlock CVE | Medium | dnf-plugin-subscription-manager-1.28.40-1.el8_9 |
CVE-2020-35512 | Twistlock CVE | Low | dbus-libs-1.12.8-26.el8 |
CVE-2020-35512 | Twistlock CVE | Low | dbus-common-1.12.8-26.el8 |
CVE-2020-35512 | Twistlock CVE | Low | dbus-daemon-1.12.8-26.el8 |
CVE-2020-35512 | Twistlock CVE | Low | dbus-1.12.8-26.el8 |
CVE-2020-35512 | Twistlock CVE | Low | dbus-tools-1.12.8-26.el8 |
CVE-2020-19190 | Twistlock CVE | Low | ncurses-base-6.1-10.20180224.el8 |
CVE-2020-19190 | Twistlock CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
CVE-2020-19189 | Twistlock CVE | Low | ncurses-base-6.1-10.20180224.el8 |
CVE-2020-19189 | Twistlock CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
CVE-2020-19188 | Twistlock CVE | Low | ncurses-base-6.1-10.20180224.el8 |
CVE-2020-19188 | Twistlock CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
CVE-2020-19187 | Twistlock CVE | Low | ncurses-base-6.1-10.20180224.el8 |
CVE-2020-19187 | Twistlock CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
CVE-2020-19186 | Twistlock CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
CVE-2020-19186 | Twistlock CVE | Low | ncurses-base-6.1-10.20180224.el8 |
CVE-2020-19185 | Twistlock CVE | Low | ncurses-base-6.1-10.20180224.el8 |
CVE-2020-19185 | Twistlock CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
CVE-2022-47011 | Twistlock CVE | Low | gdb-gdbserver-8.2-20.el8 |
CVE-2022-47010 | Twistlock CVE | Low | gdb-gdbserver-8.2-20.el8 |
CVE-2022-47007 | Twistlock CVE | Low | gdb-gdbserver-8.2-20.el8 |
CVE-2022-27943 | Twistlock CVE | Low | libstdc++-8.5.0-20.el8 |
CVE-2022-27943 | Twistlock CVE | Low | libgcc-8.5.0-20.el8 |
CVE-2021-3997 | Twistlock CVE | Low | systemd-239-78.el8 |
CVE-2021-3997 | Twistlock CVE | Low | systemd-libs-239-78.el8 |
CVE-2021-3997 | Twistlock CVE | Low | systemd-pam-239-78.el8 |
CVE-2021-39537 | Twistlock CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
CVE-2021-39537 | Twistlock CVE | Low | ncurses-base-6.1-10.20180224.el8 |
CVE-2018-19211 | Twistlock CVE | Low | ncurses-base-6.1-10.20180224.el8 |
CVE-2018-19211 | Twistlock CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
CVE-2019-8906 | Twistlock CVE | Low | file-libs-5.33-25.el8 |
CVE-2019-8905 | Twistlock CVE | Low | file-libs-5.33-25.el8 |
CVE-2021-33294 | Twistlock CVE | Low | elfutils-libelf-0.189-3.el8 |
CVE-2021-33294 | Twistlock CVE | Low | elfutils-default-yama-scope-0.189-3.el8 |
CVE-2021-33294 | Twistlock CVE | Low | elfutils-libs-0.189-3.el8 |
CVE-2019-14250 | Twistlock CVE | Low | libstdc++-8.5.0-20.el8 |
CVE-2019-14250 | Twistlock CVE | Low | libgcc-8.5.0-20.el8 |
CVE-2018-20657 | Twistlock CVE | Low | libstdc++-8.5.0-20.el8 |
CVE-2018-20657 | Twistlock CVE | Low | libgcc-8.5.0-20.el8 |
CVE-2021-25317 | Twistlock CVE | Low | cups-libs-2.2.6-54.el8_9 |
CVE-2023-39804 | Twistlock CVE | Low | tar-1.30-9.el8 |
CVE-2023-50495 | Twistlock CVE | Low | ncurses-base-6.1-10.20180224.el8 |
CVE-2023-50495 | Twistlock CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
CVE-2017-6519 | Twistlock CVE | Low | avahi-libs-0.7-21.el8_9.1 |
CVE-2023-2650 | Twistlock CVE | Low | openssl-1.1.1k-12.el8_9 |
CVE-2023-2650 | Twistlock CVE | Low | openssl-libs-1.1.1k-12.el8_9 |
CVE-2023-0464 | Twistlock CVE | Low | openssl-libs-1.1.1k-12.el8_9 |
CVE-2023-0464 | Twistlock CVE | Low | openssl-1.1.1k-12.el8_9 |
CVE-2023-0466 | Twistlock CVE | Low | openssl-libs-1.1.1k-12.el8_9 |
CVE-2023-0466 | Twistlock CVE | Low | openssl-1.1.1k-12.el8_9 |
CVE-2023-0465 | Twistlock CVE | Low | openssl-1.1.1k-12.el8_9 |
CVE-2023-0465 | Twistlock CVE | Low | openssl-libs-1.1.1k-12.el8_9 |
CVE-2023-7008 | Twistlock CVE | Medium | systemd-239-78.el8 |
CVE-2023-7008 | Twistlock CVE | Medium | systemd-libs-239-78.el8 |
CVE-2023-7008 | Twistlock CVE | Medium | systemd-pam-239-78.el8 |
CVE-2023-5455 | Twistlock CVE | Medium | krb5-libs-1.18.2-26.el8_9 |
CVE-2024-22365 | Twistlock CVE | Medium | pam-1.3.1-27.el8 |
CVE-2019-9674 | Twistlock CVE | Low | python3-libs-3.6.8-56.el8_9.3 |
CVE-2019-9674 | Twistlock CVE | Low | platform-python-3.6.8-56.el8_9.3 |
CVE-2019-19244 | Twistlock CVE | Low | sqlite-libs-3.26.0-19.el8_9 |
CVE-2024-0232 | Twistlock CVE | Low | sqlite-libs-3.26.0-19.el8_9 |
CVE-2019-9937 | Twistlock CVE | Low | sqlite-libs-3.26.0-19.el8_9 |
CVE-2019-9936 | Twistlock CVE | Low | sqlite-libs-3.26.0-19.el8_9 |
CVE-2024-0727 | Twistlock CVE | Low | openssl-libs-1.1.1k-12.el8_9 |
CVE-2024-0727 | Twistlock CVE | Low | openssl-1.1.1k-12.el8_9 |
CVE-2022-41409 | Twistlock CVE | Low | pcre2-10.32-3.el8_6 |
CVE-2023-6004 | Twistlock CVE | Low | libssh-0.9.6-13.el8_9 |
CVE-2023-6004 | Twistlock CVE | Low | libssh-config-0.9.6-13.el8_9 |
CVE-2023-6918 | Twistlock CVE | Low | libssh-config-0.9.6-13.el8_9 |
CVE-2023-6918 | Twistlock CVE | Low | libssh-0.9.6-13.el8_9 |
CVE-2024-25062 | Twistlock CVE | Medium | python3-libxml2-2.9.7-18.el8_9 |
CVE-2024-25062 | Twistlock CVE | Medium | libxml2-2.9.7-18.el8_9 |
CVE-2020-12413 | Twistlock CVE | Low | nss-3.90.0-6.el8_9 |
CVE-2020-12413 | Twistlock CVE | Low | nss-softokn-3.90.0-6.el8_9 |
CVE-2020-12413 | Twistlock CVE | Low | nss-sysinit-3.90.0-6.el8_9 |
CVE-2020-12413 | Twistlock CVE | Low | nss-softokn-freebl-3.90.0-6.el8_9 |
CVE-2020-12413 | Twistlock CVE | Low | nss-util-3.90.0-6.el8_9 |
CVE-2024-1597 | Twistlock CVE | Critical | org.postgresql_postgresql-42.2.5 |
CVE-2018-8088 | Twistlock CVE | Critical | org.slf4j_slf4j-ext-1.7.22.jbossorg-1 |
CVE-2019-20444 | Twistlock CVE | Critical | io.netty_netty-codec-http-4.1.24.Final |
CVE-2023-4759 | Twistlock CVE | High | org.eclipse.jgit_org.eclipse.jgit-5.0.2.201807311906-r |
CVE-2023-5072 | Twistlock CVE | High | org.json_json-20140107 |
CVE-2022-45688 | Twistlock CVE | High | org.json_json-20140107 |
CVE-2022-23913 | Twistlock CVE | High | org.apache.activemq_artemis-core-client-2.6.3.jbossorg-001 |
CVE-2021-37137 | Twistlock CVE | High | io.netty_netty-codec-4.1.24.Final |
CVE-2021-37136 | Twistlock CVE | High | io.netty_netty-codec-4.1.24.Final |
CVE-2020-35510 | Twistlock CVE | High | org.jboss.remoting_jboss-remoting-5.0.8.Final |
CVE-2020-1748 | Twistlock CVE | High | org.wildfly.security_wildfly-elytron-1.6.0.Final |
CVE-2020-1695 | Twistlock CVE | High | org.jboss.resteasy_resteasy-client-3.6.1.Final |
CVE-2020-11612 | Twistlock CVE | High | io.netty_netty-handler-4.1.24.Final |
CVE-2020-10714 | Twistlock CVE | High | org.wildfly.security_wildfly-elytron-1.6.0.Final |
CVE-2019-16869 | Twistlock CVE | High | io.netty_netty-all-4.1.25.Final |
CVE-2019-10184 | Twistlock CVE | High | io.undertow_undertow-servlet-2.0.13.Final |
CVE-2022-3143 | Twistlock CVE | High | org.wildfly.security_wildfly-elytron-1.6.0.Final |
CVE-2019-20445 | Twistlock CVE | Medium | io.netty_netty-handler-4.1.24.Final |
CVE-2023-4061 | Twistlock CVE | Medium | org.wildfly.core_wildfly-controller-6.0.2.Final |
CVE-2023-34462 | Twistlock CVE | Medium | io.netty_netty-handler-4.1.68.Final |
CVE-2023-34462 | Twistlock CVE | Medium | io.netty_netty-handler-4.1.24.Final |
CVE-2022-23437 | Twistlock CVE | Medium | xerces_xercesImpl-2.12.0.SP02 |
CVE-2021-43797 | Twistlock CVE | Medium | io.netty_netty-codec-http-4.1.24.Final |
CVE-2020-14297 | Twistlock CVE | Medium | org.jboss_jboss-ejb-client-4.0.11.Final |
CVE-2021-21290 | Twistlock CVE | Medium | io.netty_netty-codec-http-4.1.24.Final |
CVE-2022-35278 | Twistlock CVE | Medium | org.apache.activemq_artemis-server-2.6.3.jbossorg-001 |
CVE-2024-2236 | Twistlock CVE | Medium | libgcrypt-1.8.5-7.el8_6 |
CVE-2020-14340 | Twistlock CVE | Medium | org.jboss.xnio_xnio-nio-3.6.5.Final |
CVE-2023-33202 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.60 |
CVE-2022-24823 | Twistlock CVE | Medium | io.netty_netty-codec-http-4.1.24.Final |
CVE-2021-4040 | Twistlock CVE | Medium | org.apache.activemq_artemis-core-client-2.6.3.jbossorg-001 |
CVE-2021-3642 | Twistlock CVE | Medium | org.wildfly.security_wildfly-elytron-1.6.0.Final |
CVE-2020-26939 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.60 |
CVE-2020-25633 | Twistlock CVE | Medium | org.jboss.resteasy_resteasy-client-3.6.1.Final |
CVE-2020-25633 | Twistlock CVE | Medium | org.jboss.resteasy_resteasy-client-microprofile-3.6.1.Final |
CVE-2020-1954 | Twistlock CVE | Medium | org.apache.cxf_cxf-rt-management-3.2.5-jbossorg-1 |
CVE-2020-14338 | Twistlock CVE | Medium | xerces_xercesImpl-2.12.0.SP02 |
CVE-2018-14642 | Twistlock CVE | Medium | io.undertow_undertow-core-2.0.13.Final |
CVE-2021-20250 | Twistlock CVE | Medium | org.jboss_jboss-ejb-client-4.0.11.Final |
CVE-2024-28752 | Twistlock CVE | Medium | org.apache.cxf_cxf-core-3.2.5-jbossorg-1 |
CVE-2024-26461 | Twistlock CVE | Low | krb5-libs-1.18.2-26.el8_9 |
CVE-2024-26458 | Twistlock CVE | Low | krb5-libs-1.18.2-26.el8_9 |
CVE-2024-25260 | Twistlock CVE | Low | elfutils-libelf-0.189-3.el8 |
CVE-2024-25260 | Twistlock CVE | Low | elfutils-libs-0.189-3.el8 |
CVE-2024-25260 | Twistlock CVE | Low | elfutils-default-yama-scope-0.189-3.el8 |
CVE-2021-3644 | Twistlock CVE | Low | org.wildfly.core_wildfly-server-6.0.2.Final |
CVE-2023-5685 | Twistlock CVE | High | org.jboss.xnio_xnio-api-3.6.5.Final |
CVE-2024-29025 | Twistlock CVE | Medium | io.netty_netty-codec-http-4.1.24.Final |
CVE-2024-2398 | Twistlock CVE | Medium | curl-7.61.1-33.el8_9.5 |
CVE-2024-2398 | Twistlock CVE | Medium | libcurl-7.61.1-33.el8_9.5 |
CVE-2022-23990 | Twistlock CVE | Medium | expat-2.2.5-11.el8_9.1 |
CVE-2023-52426 | Twistlock CVE | Medium | expat-2.2.5-11.el8_9.1 |
CVE-2023-27534 | Twistlock CVE | Low | libcurl-7.61.1-33.el8_9.5 |
CVE-2023-27534 | Twistlock CVE | Low | curl-7.61.1-33.el8_9.5 |
CVE-2024-28182 | Twistlock CVE | Medium | libnghttp2-1.33.0-5.el8_9 |
CVE-2024-3205 | Twistlock CVE | Medium | libyaml-0.1.7-5.el8 |
CVE-2024-2511 | Twistlock CVE | Low | openssl-1.1.1k-12.el8_9 |
CVE-2024-2511 | Twistlock CVE | Low | openssl-libs-1.1.1k-12.el8_9 |
CVE-2024-2511 | Anchore CVE | Low | openssl-libs-1:1.1.1k-12.el8_9 |
CVE-2024-26461 | Anchore CVE | Low | krb5-libs-1.18.2-26.el8_9 |
CVE-2024-1931 | Anchore CVE | Medium | python3-unbound-1.16.2-5.el8_9.6 |
CVE-2024-1931 | Anchore CVE | Medium | unbound-libs-1.16.2-5.el8_9.6 |
CVE-2020-17049 | Anchore CVE | Medium | krb5-libs-1.18.2-26.el8_9 |
CVE-2024-2397 | Anchore CVE | Low | libpcap-14:1.9.1-5.el8 |
GHSA-v76w-3ph8-vm66 | Anchore CVE | Medium | undertow-core-2.0.13.Final |
GHSA-v76w-3ph8-vm66 | Anchore CVE | Medium | undertow-core-2.0.13.Final |
CVE-2023-48161 | Anchore CVE | Medium | java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8 |
GHSA-9wmf-xf3h-r8pr | Anchore CVE | Medium | jberet-core-1.3.1.Final |
GHSA-9wmf-xf3h-r8pr | Anchore CVE | Medium | jberet-core-1.3.1.Final |
CVE-2023-2953 | Anchore CVE | Low | openldap-2.4.46-18.el8 |
CVE-2024-0450 | Anchore CVE | Medium | python3-libs-3.6.8-56.el8_9.3 |
CVE-2023-6597 | Anchore CVE | High | python3-libs-3.6.8-56.el8_9.3 |
CVE-2023-6597 | Anchore CVE | High | platform-python-3.6.8-56.el8_9.3 |
CVE-2024-0450 | Anchore CVE | Medium | platform-python-3.6.8-56.el8_9.3 |
GHSA-2363-cqg2-863c | Anchore CVE | High | jdom-1.0 |
GHSA-2363-cqg2-863c | Anchore CVE | High | jdom-1.1.3 |
GHSA-5499-qjvh-6j7w | Anchore CVE | Medium | wildfly-elytron-1.6.0.Final |
GHSA-6mjq-h674-j845 | Anchore CVE | Medium | netty-handler-4.1.24.Final |
CVE-2020-19188 | Anchore CVE | Low | ncurses-base-6.1-10.20180224.el8 |
GHSA-rf6q-vx79-mjxr | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-p9w3-gwc2-cr49 | Anchore CVE | Medium | undertow-core-2.0.13.Final |
GHSA-5499-qjvh-6j7w | Anchore CVE | Medium | wildfly-elytron-1.6.0.Final |
GHSA-fj7c-vg2v-ccrm | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-pr38-qpxm-g88x | Anchore CVE | High | artemis-core-client-2.6.3.jbossorg-001 |
CVE-2020-12413 | Anchore CVE | Low | nss-softokn-freebl-3.90.0-6.el8_9 |
GHSA-jmj6-p2j9-68cp | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
GHSA-9vjp-v76f-g363 | Anchore CVE | High | netty-codec-4.1.24.Final |
GHSA-gwrp-pvrq-jmwv | Anchore CVE | Medium | commons-io-2.5 |
GHSA-5mcr-gq6c-3hq2 | Anchore CVE | Medium | netty-codec-http-4.1.24.Final |
CVE-2020-12413 | Anchore CVE | Low | nss-util-3.90.0-6.el8_9 |
GHSA-2259-h742-5vr4 | Anchore CVE | Medium | jboss-ejb-client-4.0.11.Final |
CVE-2023-0466 | Anchore CVE | Low | openssl-1:1.1.1k-12.el8_9 |
GHSA-9339-86wc-4qgf | Anchore CVE | High | xalan-2.7.1.jbossorg-4 |
CVE-2019-17543 | Anchore CVE | Medium | lz4-libs-1.8.3-3.el8_4 |
CVE-2020-35512 | Anchore CVE | Low | dbus-daemon-1:1.12.8-26.el8 |
CVE-2018-1000879 | Anchore CVE | Low | libarchive-3.3.3-5.el8 |
GHSA-g4cp-h53p-v3v8 | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-6phf-73q6-gh87 | Anchore CVE | High | commons-beanutils-1.9.3 |
GHSA-qcch-9268-59jw | Anchore CVE | Medium | jboss-ejb-client-4.0.11.Final |
CVE-2018-1000654 | Anchore CVE | Low | libtasn1-4.13-4.el8_7 |
CVE-2022-27943 | Anchore CVE | Low | libstdc++-8.5.0-20.el8 |
CVE-2023-0465 | Anchore CVE | Low | openssl-1:1.1.1k-12.el8_9 |
CVE-2020-12413 | Anchore CVE | Low | nss-softokn-3.90.0-6.el8_9 |
CVE-2023-0464 | Anchore CVE | Low | openssl-libs-1:1.1.1k-12.el8_9 |
CVE-2022-3857 | Anchore CVE | Low | java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8 |
CVE-2020-35512 | Anchore CVE | Low | dbus-1:1.12.8-26.el8 |
CVE-2023-39804 | Anchore CVE | Low | tar-2:1.30-9.el8 |
CVE-2022-27943 | Anchore CVE | Low | libgcc-8.5.0-20.el8 |
GHSA-gf8c-j759-86mg | Anchore CVE | Medium | artemis-core-client-2.6.3.jbossorg-001 |
GHSA-p2v9-g2qv-p635 | Anchore CVE | Medium | netty-handler-4.1.24.Final |
CVE-2019-16866 | Anchore CVE | Low | unbound-libs-1.16.2-5.el8_9.6 |
GHSA-gwrp-pvrq-jmwv | Anchore CVE | Medium | commons-io-2.5 |
GHSA-qgrq-cx4c-2rmm | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
GHSA-p2v9-g2qv-p635 | Anchore CVE | Medium | netty-handler-4.1.24.Final |
GHSA-jmj6-p2j9-68cp | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
CVE-2019-8906 | Anchore CVE | Low | file-libs-5.33-25.el8 |
GHSA-mfhv-gwf8-4m88 | Anchore CVE | Medium | undertow-core-2.0.13.Final |
GHSA-gv2w-88hx-8m9r | Anchore CVE | High | undertow-core-2.0.13.Final |
CVE-2023-32636 | Anchore CVE | Low | glib2-2.56.4-161.el8 |
CVE-2018-20657 | Anchore CVE | Low | libstdc++-8.5.0-20.el8 |
CVE-2023-2650 | Anchore CVE | Medium | openssl-libs-1:1.1.1k-12.el8_9 |
GHSA-95rf-557x-44g5 | Anchore CVE | High | undertow-core-2.0.13.Final |
CVE-2020-19190 | Anchore CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
CVE-2021-33294 | Anchore CVE | Low | elfutils-libelf-0.189-3.el8 |
CVE-2023-0466 | Anchore CVE | Low | openssl-libs-1:1.1.1k-12.el8_9 |
CVE-2019-12900 | Anchore CVE | Low | bzip2-libs-1.0.6-26.el8 |
GHSA-pfcc-3g6r-8rg8 | Anchore CVE | Critical | undertow-core-2.0.13.Final |
GHSA-5jpm-x58v-624v | Anchore CVE | Medium | netty-codec-http-4.1.24.Final |
CVE-2020-12413 | Anchore CVE | Low | nss-sysinit-3.90.0-6.el8_9 |
GHSA-6phf-73q6-gh87 | Anchore CVE | High | commons-beanutils-1.9.3 |
GHSA-rf6q-vx79-mjxr | Anchore CVE | High | undertow-core-2.0.13.Final |
CVE-2020-12413 | Anchore CVE | Low | nss-3.90.0-6.el8_9 |
GHSA-8vh8-vc28-m2hf | Anchore CVE | Critical | undertow-core-2.0.13.Final |
CVE-2022-0235 | Anchore CVE | Medium | subscription-manager-1.28.40-1.el8_9 |
CVE-2024-25260 | Anchore CVE | Low | elfutils-libelf-0.189-3.el8 |
CVE-2019-9674 | Anchore CVE | Low | python3-libs-3.6.8-56.el8_9.3 |
CVE-2005-2541 | Anchore CVE | Medium | tar-2:1.30-9.el8 |
CVE-2019-19244 | Anchore CVE | Low | sqlite-libs-3.26.0-19.el8_9 |
GHSA-7fhr-2694-rg79 | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
CVE-2019-12904 | Anchore CVE | Medium | libgcrypt-1.8.5-7.el8_6 |
CVE-2022-23990 | Anchore CVE | Medium | expat-2.2.5-11.el8_9.1 |
GHSA-cccf-7xw3-p2vr | Anchore CVE | Medium | undertow-core-2.0.13.Final |
CVE-2024-0232 | Anchore CVE | Low | sqlite-libs-3.26.0-19.el8_9 |
GHSA-jwgx-9mmh-684w | Anchore CVE | Critical | undertow-core-2.0.13.Final |
CVE-2021-25317 | Anchore CVE | Low | cups-libs-1:2.2.6-54.el8_9 |
GHSA-vf6r-mmhc-3xcm | Anchore CVE | Medium | undertow-core-2.0.13.Final |
GHSA-vjxc-frw4-jmh5 | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-m4mm-pg93-fv78 | Anchore CVE | High | undertow-core-2.0.13.Final |
CVE-2001-0591 | Anchore CVE | High | jboss-jsp-api_2.3_spec-1.0.3.Final |
CVE-2021-33294 | Anchore CVE | Low | elfutils-debuginfod-client-0.189-3.el8 |
GHSA-269q-hmxg-m83q | Anchore CVE | Medium | netty-codec-http-4.1.24.Final |
GHSA-qjwc-v72v-fq6r | Anchore CVE | Medium | undertow-core-2.0.13.Final |
GHSA-gv2w-88hx-8m9r | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-cqqj-4p63-rrmm | Anchore CVE | Critical | netty-codec-http-4.1.24.Final |
CVE-2021-39537 | Anchore CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
CVE-2023-36191 | Anchore CVE | Low | sqlite-libs-3.26.0-19.el8_9 |
CVE-2024-0727 | Anchore CVE | Low | openssl-1:1.1.1k-12.el8_9 |
GHSA-9339-86wc-4qgf | Anchore CVE | High | xalan-2.7.1.jbossorg-4 |
GHSA-339q-62wm-c39w | Anchore CVE | High | undertow-core-2.0.13.Final |
CVE-2021-3997 | Anchore CVE | Medium | systemd-239-78.el8 |
GHSA-wx5j-54mm-rqqq | Anchore CVE | Medium | netty-codec-http-4.1.24.Final |
CVE-2020-19188 | Anchore CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
CVE-2019-9923 | Anchore CVE | Low | tar-2:1.30-9.el8 |
GHSA-72m5-fvvv-55m6 | Anchore CVE | Medium | bcprov-jdk15on-1.60 |
GHSA-2363-cqg2-863c | Anchore CVE | High | jdom-1.1.3 |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-25.0-jre |
GHSA-7fhr-2694-rg79 | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
CVE-2023-4156 | Anchore CVE | Low | gawk-4.2.1-4.el8 |
CVE-2020-19186 | Anchore CVE | Low | ncurses-base-6.1-10.20180224.el8 |
CVE-2024-3651 | Anchore CVE | Medium | python3-idna-2.5-5.el8 |
GHSA-qgrq-cx4c-2rmm | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
GHSA-7fhr-2694-rg79 | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
CVE-2018-19211 | Anchore CVE | Low | ncurses-base-6.1-10.20180224.el8 |
GHSA-grg4-wf29-r9vv | Anchore CVE | High | netty-codec-4.1.24.Final |
CVE-2021-4209 | Anchore CVE | Low | gnutls-3.6.16-8.el8_9.3 |
CVE-2019-7317 | Anchore CVE | Low | libpng-2:1.6.34-5.el8 |
CVE-2023-4504 | Anchore CVE | Medium | cups-libs-1:2.2.6-54.el8_9 |
CVE-2023-45322 | Anchore CVE | Low | libxml2-2.9.7-18.el8_9 |
GHSA-jmj6-p2j9-68cp | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
GHSA-p6j8-hgv5-m35g | Anchore CVE | High | jboss-remoting-5.0.8.Final |
GHSA-5499-qjvh-6j7w | Anchore CVE | Medium | wildfly-elytron-1.6.0.Final |
CVE-2020-19190 | Anchore CVE | Low | ncurses-base-6.1-10.20180224.el8 |
GHSA-2w73-fqqj-c92p | Anchore CVE | High | undertow-core-2.0.13.Final |
CVE-2001-0591 | Anchore CVE | High | jboss-jsp-api_2.3_spec-1.0.3.Final |
GHSA-mm9x-g8pc-w292 | Anchore CVE | High | netty-handler-4.1.24.Final |
GHSA-c738-77x8-wmq5 | Anchore CVE | Medium | xnio-nio-3.6.5.Final |
GHSA-7f88-5hhx-67m2 | Anchore CVE | High | xnio-api-3.6.5.Final |
GHSA-7f88-5hhx-67m2 | Anchore CVE | High | xnio-api-3.6.5.Final |
GHSA-hr8g-6v94-x4m9 | Anchore CVE | Medium | bcprov-jdk15on-1.60 |
CVE-2020-19185 | Anchore CVE | Low | ncurses-base-6.1-10.20180224.el8 |
CVE-2021-33294 | Anchore CVE | Low | elfutils-libs-0.189-3.el8 |
GHSA-5jpm-x58v-624v | Anchore CVE | Medium | netty-codec-http-4.1.24.Final |
GHSA-qgrq-cx4c-2rmm | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
CVE-2018-20839 | Anchore CVE | Medium | systemd-libs-239-78.el8 |
GHSA-6xx3-rg99-gc3p | Anchore CVE | Medium | bcprov-jdk15on-1.60 |
CVE-2023-0464 | Anchore CVE | Low | openssl-1:1.1.1k-12.el8_9 |
GHSA-hr8g-6v94-x4m9 | Anchore CVE | Medium | bcprov-jdk15on-1.60 |
CVE-2023-50495 | Anchore CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
CVE-2020-19189 | Anchore CVE | Low | ncurses-base-6.1-10.20180224.el8 |
CVE-2021-39537 | Anchore CVE | Low | ncurses-base-6.1-10.20180224.el8 |
GHSA-p6j8-hgv5-m35g | Anchore CVE | High | jboss-remoting-5.0.8.Final |
GHSA-pr38-qpxm-g88x | Anchore CVE | High | artemis-core-client-2.6.3.jbossorg-001 |
GHSA-mm9x-g8pc-w292 | Anchore CVE | High | netty-handler-4.1.24.Final |
CVE-2018-19211 | Anchore CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
GHSA-cccf-7xw3-p2vr | Anchore CVE | Medium | undertow-core-2.0.13.Final |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-25.0-jre |
CVE-2021-42694 | Anchore CVE | Medium | libgcc-8.5.0-20.el8 |
GHSA-p979-4mfw-53vg | Anchore CVE | High | netty-all-4.1.25.Final |
GHSA-jmj6-p2j9-68cp | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
GHSA-v76w-3ph8-vm66 | Anchore CVE | Medium | undertow-core-2.0.13.Final |
CVE-2021-3997 | Anchore CVE | Medium | systemd-libs-239-78.el8 |
CVE-2023-2650 | Anchore CVE | Medium | openssl-1:1.1.1k-12.el8_9 |
GHSA-p9w3-gwc2-cr49 | Anchore CVE | Medium | undertow-core-2.0.13.Final |
GHSA-fj7c-vg2v-ccrm | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-c738-77x8-wmq5 | Anchore CVE | Medium | xnio-nio-3.6.5.Final |
GHSA-7f88-5hhx-67m2 | Anchore CVE | High | xnio-api-3.6.5.Final |
GHSA-mfhv-gwf8-4m88 | Anchore CVE | Medium | undertow-core-2.0.13.Final |
CVE-2023-27534 | Anchore CVE | Low | libcurl-7.61.1-33.el8_9.5 |
GHSA-jmj6-p2j9-68cp | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
CVE-2020-21674 | Anchore CVE | Medium | libarchive-3.3.3-5.el8 |
GHSA-9vjp-v76f-g363 | Anchore CVE | High | netty-codec-4.1.24.Final |
CVE-2021-3997 | Anchore CVE | Medium | systemd-pam-239-78.el8 |
CVE-2024-25260 | Anchore CVE | Low | elfutils-default-yama-scope-0.189-3.el8 |
CVE-2022-0235 | Anchore CVE | Medium | python3-syspurpose-1.28.40-1.el8_9 |
CVE-2019-16866 | Anchore CVE | Low | python3-unbound-1.16.2-5.el8_9.6 |
GHSA-cqqj-4p63-rrmm | Anchore CVE | Critical | netty-codec-http-4.1.24.Final |
CVE-2020-19189 | Anchore CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
GHSA-5499-qjvh-6j7w | Anchore CVE | Medium | wildfly-elytron-1.6.0.Final |
CVE-2022-0235 | Anchore CVE | Medium | python3-subscription-manager-rhsm-1.28.40-1.el8_9 |
GHSA-rhcw-wjcm-9h6g | Anchore CVE | High | undertow-core-2.0.13.Final |
CVE-2023-45322 | Anchore CVE | Low | python3-libxml2-2.9.7-18.el8_9 |
CVE-2018-20839 | Anchore CVE | Medium | systemd-pam-239-78.el8 |
GHSA-c738-77x8-wmq5 | Anchore CVE | Medium | xnio-nio-3.6.5.Final |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-25.0-jre |
CVE-2020-19186 | Anchore CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
CVE-2020-19187 | Anchore CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
GHSA-7fhr-2694-rg79 | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
CVE-2021-33294 | Anchore CVE | Low | elfutils-default-yama-scope-0.189-3.el8 |
GHSA-2w73-fqqj-c92p | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-5499-qjvh-6j7w | Anchore CVE | Medium | wildfly-elytron-1.6.0.Final |
CVE-2017-6519 | Anchore CVE | Low | avahi-libs-0.7-21.el8_9.1 |
CVE-2022-41409 | Anchore CVE | Low | pcre2-10.32-3.el8_6 |
GHSA-6mjq-h674-j845 | Anchore CVE | Medium | netty-handler-4.1.24.Final |
GHSA-wjxj-5m7g-mg7q | Anchore CVE | Medium | bcprov-jdk15on-1.60 |
GHSA-pfcc-3g6r-8rg8 | Anchore CVE | Critical | undertow-core-2.0.13.Final |
CVE-2020-35512 | Anchore CVE | Low | dbus-libs-1:1.12.8-26.el8 |
GHSA-rc2w-r4jq-7pfx | Anchore CVE | High | xalan-2.7.1.jbossorg-4 |
GHSA-gf8c-j759-86mg | Anchore CVE | Medium | artemis-core-client-2.6.3.jbossorg-001 |
GHSA-95rf-557x-44g5 | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-g4cp-h53p-v3v8 | Anchore CVE | High | undertow-core-2.0.13.Final |
CVE-2023-50495 | Anchore CVE | Low | ncurses-base-6.1-10.20180224.el8 |
GHSA-8vh8-vc28-m2hf | Anchore CVE | Critical | undertow-core-2.0.13.Final |
GHSA-j8jw-g6fq-mp7h | Anchore CVE | High | hibernate-core-5.3.6.Final |
CVE-2019-9937 | Anchore CVE | Low | sqlite-libs-3.26.0-19.el8_9 |
CVE-2019-9936 | Anchore CVE | Low | sqlite-libs-3.26.0-19.el8_9 |
GHSA-c738-77x8-wmq5 | Anchore CVE | Medium | xnio-nio-3.6.5.Final |
GHSA-wjxj-5m7g-mg7q | Anchore CVE | Medium | bcprov-jdk15on-1.60 |
GHSA-5mcr-gq6c-3hq2 | Anchore CVE | Medium | netty-codec-http-4.1.24.Final |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-25.0-jre |
GHSA-m4mm-pg93-fv78 | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-qjwc-v72v-fq6r | Anchore CVE | Medium | undertow-core-2.0.13.Final |
CVE-2020-19185 | Anchore CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
GHSA-7fhr-2694-rg79 | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
GHSA-p6j8-hgv5-m35g | Anchore CVE | High | jboss-remoting-5.0.8.Final |
GHSA-qcch-9268-59jw | Anchore CVE | Medium | jboss-ejb-client-4.0.11.Final |
GHSA-rc2w-r4jq-7pfx | Anchore CVE | High | xalan-2.7.1.jbossorg-4 |
GHSA-vf6r-mmhc-3xcm | Anchore CVE | Medium | undertow-core-2.0.13.Final |
CVE-2021-20193 | Anchore CVE | Medium | tar-2:1.30-9.el8 |
GHSA-qgrq-cx4c-2rmm | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
CVE-2024-25260 | Anchore CVE | Low | elfutils-libs-0.189-3.el8 |
GHSA-rhcw-wjcm-9h6g | Anchore CVE | High | undertow-core-2.0.13.Final |
CVE-2018-20657 | Anchore CVE | Low | libgcc-8.5.0-20.el8 |
CVE-2022-3219 | Anchore CVE | Low | gnupg2-2.2.20-3.el8_6 |
CVE-2023-2004 | Anchore CVE | Low | freetype-2.9.1-9.el8 |
GHSA-p979-4mfw-53vg | Anchore CVE | High | netty-all-4.1.25.Final |
CVE-2024-0727 | Anchore CVE | Low | openssl-libs-1:1.1.1k-12.el8_9 |
CVE-2019-9674 | Anchore CVE | Low | platform-python-3.6.8-56.el8_9.3 |
GHSA-jwgx-9mmh-684w | Anchore CVE | Critical | undertow-core-2.0.13.Final |
CVE-2018-19217 | Anchore CVE | Low | ncurses-libs-6.1-10.20180224.el8 |
GHSA-7fhr-2694-rg79 | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
GHSA-jmj6-p2j9-68cp | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
GHSA-339q-62wm-c39w | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-qgrq-cx4c-2rmm | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
CVE-2023-27534 | Anchore CVE | Low | curl-7.61.1-33.el8_9.5 |
CVE-2020-19187 | Anchore CVE | Low | ncurses-base-6.1-10.20180224.el8 |
CVE-2022-0235 | Anchore CVE | Medium | dnf-plugin-subscription-manager-1.28.40-1.el8_9 |
GHSA-vjxc-frw4-jmh5 | Anchore CVE | High | undertow-core-2.0.13.Final |
GHSA-2259-h742-5vr4 | Anchore CVE | Medium | jboss-ejb-client-4.0.11.Final |
GHSA-j8jw-g6fq-mp7h | Anchore CVE | High | hibernate-core-5.3.6.Final |
CVE-2020-35512 | Anchore CVE | Low | dbus-tools-1:1.12.8-26.el8 |
CVE-2018-19217 | Anchore CVE | Low | ncurses-base-6.1-10.20180224.el8 |
GHSA-6xx3-rg99-gc3p | Anchore CVE | Medium | bcprov-jdk15on-1.60 |
GHSA-5499-qjvh-6j7w | Anchore CVE | Medium | wildfly-elytron-1.6.0.Final |
GHSA-qgrq-cx4c-2rmm | Anchore CVE | High | wildfly-elytron-1.6.0.Final |
CVE-2020-35512 | Anchore CVE | Low | dbus-common-1:1.12.8-26.el8 |
CVE-2022-3857 | Anchore CVE | Low | libpng-2:1.6.34-5.el8 |
CVE-2019-14250 | Anchore CVE | Low | libgcc-8.5.0-20.el8 |
CVE-2024-25260 | Anchore CVE | Low | elfutils-debuginfod-client-0.189-3.el8 |
GHSA-grg4-wf29-r9vv | Anchore CVE | High | netty-codec-4.1.24.Final |
GHSA-7f88-5hhx-67m2 | Anchore CVE | High | xnio-api-3.6.5.Final |
GHSA-p6j8-hgv5-m35g | Anchore CVE | High | jboss-remoting-5.0.8.Final |
CVE-2018-20839 | Anchore CVE | Medium | systemd-239-78.el8 |
CVE-2018-20225 | Anchore CVE | Low | platform-python-pip-9.0.3-23.el8_9.1 |
GHSA-269q-hmxg-m83q | Anchore CVE | Medium | netty-codec-http-4.1.24.Final |
GHSA-v76w-3ph8-vm66 | Anchore CVE | Medium | undertow-core-2.0.13.Final |
CVE-2018-1000880 | Anchore CVE | Low | libarchive-3.3.3-5.el8 |
CVE-2019-8905 | Anchore CVE | Low | file-libs-5.33-25.el8 |
CVE-2023-0465 | Anchore CVE | Low | openssl-libs-1:1.1.1k-12.el8_9 |
CVE-2021-42694 | Anchore CVE | Medium | libstdc++-8.5.0-20.el8 |
CVE-2019-14250 | Anchore CVE | Low | libstdc++-8.5.0-20.el8 |
CVE-2018-20225 | Anchore CVE | Low | python3-pip-wheel-9.0.3-23.el8_9.1 |
CVE-2022-0235 | Anchore CVE | Medium | python3-cloud-what-1.28.40-1.el8_9 |
GHSA-wx5j-54mm-rqqq | Anchore CVE | Medium | netty-codec-http-4.1.24.Final |
CVE-2021-24032 | Anchore CVE | Low | libzstd-1.4.4-1.el8 |
GHSA-72m5-fvvv-55m6 | Anchore CVE | Medium | bcprov-jdk15on-1.60 |
CVE-2023-43804 | Anchore CVE | Medium | platform-python-pip-9.0.3-23.el8_9.1 |
CVE-2023-43804 | Anchore CVE | Medium | python3-pip-wheel-9.0.3-23.el8_9.1 |
CVE-2020-17049 | Twistlock CVE | Medium | krb5-libs-1.18.2-26.el8_9 |
CVE-2021-4209 | Twistlock CVE | Low | gnutls-3.6.16-8.el8_9.3 |
CVE-2019-16866 | Twistlock CVE | Low | unbound-libs-1.16.2-5.el8_9.6 |
CVE-2019-16866 | Twistlock CVE | Low | python3-unbound-1.16.2-5.el8_9.6 |
CVE-2024-1459 | Twistlock CVE | Medium | io.undertow_undertow-core-2.0.13.Final |
CVE-2023-48161 | Twistlock CVE | Medium | java-1.8.0-openjdk-headless-1.8.0.412.b08-2.el8 |
CVE-2022-3857 | Twistlock CVE | Low | java-1.8.0-openjdk-headless-1.8.0.412.b08-2.el8 |
CVE-2023-6597 | Twistlock CVE | Critical | python3-libs-3.6.8-56.el8_9.3 |
CVE-2023-6597 | Twistlock CVE | Critical | platform-python-3.6.8-56.el8_9.3 |
CVE-2024-1102 | Twistlock CVE | Medium | org.jberet_jberet-core-1.3.1.Final |
CVE-2024-0450 | Twistlock CVE | Medium | python3-libs-3.6.8-56.el8_9.3 |
CVE-2024-0450 | Twistlock CVE | Medium | platform-python-3.6.8-56.el8_9.3 |
CVE-2023-43804 | Twistlock CVE | Medium | platform-python-pip-9.0.3-23.el8_9.1 |
CVE-2023-43804 | Twistlock CVE | Medium | python3-pip-wheel-9.0.3-23.el8_9.1 |
CVE-2024-29040 | Twistlock CVE | Medium | tpm2-tss-2.3.2-5.el8 |
CVE-2018-14721 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2022-46364 | Twistlock CVE | Critical | org.apache.cxf_cxf-core-3.2.5-jbossorg-1 |
CVE-2022-1471 | Twistlock CVE | Critical | org.yaml_snakeyaml-1.18 |
CVE-2020-9548 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-9547 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-9546 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-8840 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-1745 | Twistlock CVE | Critical | io.undertow_undertow-core-2.0.13.Final |
CVE-2020-10683 | Twistlock CVE | Critical | org.dom4j_dom4j-1.6.1 |
CVE-2019-3888 | Twistlock CVE | Critical | io.undertow_undertow-core-2.0.13.Final |
CVE-2019-20330 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-17531 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-17267 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-16943 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-16942 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-16335 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-14893 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-14892 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-14540 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-14379 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-12419 | Twistlock CVE | Critical | org.apache.cxf_cxf-core-3.2.5-jbossorg-1 |
CVE-2019-10212 | Twistlock CVE | Critical | io.undertow_undertow-core-2.0.13.Final |
CVE-2019-10158 | Twistlock CVE | Critical | org.infinispan_infinispan-core-9.3.1.Final |
CVE-2018-19362 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2018-19361 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2018-19360 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2018-14720 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2018-14719 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2018-14718 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2018-11307 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-13936 | Twistlock CVE | High | org.apache.velocity_velocity-engine-core-2.0 |
CVE-2020-11113 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-11112 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-11111 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-10969 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-10968 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-10673 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-10672 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-10174 | Twistlock CVE | High | org.infinispan_infinispan-core-9.3.1.Final |
CVE-2021-20190 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36189 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36188 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36187 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36186 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36185 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36184 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36183 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36182 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36181 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36180 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36179 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-35728 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-35491 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-35490 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-24750 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-24616 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-1757 | Twistlock CVE | High | io.undertow_undertow-core-2.0.13.Final |
CVE-2020-14195 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-14062 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-14061 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-14060 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-11620 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-11619 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-10650 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2021-3717 | Twistlock CVE | High | org.wildfly.core_wildfly-host-controller-6.0.2.Final |
CVE-2023-3223 | Twistlock CVE | High | io.undertow_undertow-core-2.0.13.Final |
CVE-2023-1108 | Twistlock CVE | High | io.undertow_undertow-core-2.0.13.Final |
CVE-2022-46363 | Twistlock CVE | High | org.apache.cxf_cxf-core-3.2.5-jbossorg-1 |
CVE-2022-42004 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2022-42003 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2022-25857 | Twistlock CVE | High | org.yaml_snakeyaml-1.18 |
CVE-2022-23913 | Twistlock CVE | High | org.apache.activemq_artemis-jms-client-2.6.3.jbossorg-001 |
CVE-2022-2053 | Twistlock CVE | High | io.undertow_undertow-core-2.0.13.Final |
CVE-2022-1259 | Twistlock CVE | High | io.undertow_undertow-core-2.0.13.Final |
CVE-2021-40690 | Twistlock CVE | High | org.apache.santuario_xmlsec-2.1.2 |
CVE-2021-3859 | Twistlock CVE | High | io.undertow_undertow-core-2.0.13.Final |
CVE-2024-33601 | Anchore CVE | Low | glibc-gconv-extra-2.28-236.el8_9.13 |
CVE-2024-33599 | Anchore CVE | High | glibc-langpack-en-2.28-236.el8_9.13 |
CVE-2024-33601 | Anchore CVE | Low | glibc-2.28-236.el8_9.13 |
CVE-2024-2961 | Anchore CVE | High | glibc-langpack-en-2.28-236.el8_9.13 |
CVE-2024-33602 | Anchore CVE | Low | glibc-langpack-en-2.28-236.el8_9.13 |
CVE-2024-33602 | Anchore CVE | Low | glibc-common-2.28-236.el8_9.13 |
CVE-2019-1010022 | Anchore CVE | Critical | glibc-common-2.28-236.el8_9.13 |
CVE-2024-33599 | Anchore CVE | High | glibc-2.28-236.el8_9.13 |
CVE-2024-2961 | Anchore CVE | High | glibc-minimal-langpack-2.28-236.el8_9.13 |
CVE-2019-1010022 | Anchore CVE | Critical | glibc-gconv-extra-2.28-236.el8_9.13 |
CVE-2024-33600 | Anchore CVE | Medium | glibc-common-2.28-236.el8_9.13 |
CVE-2024-33600 | Anchore CVE | Medium | glibc-2.28-236.el8_9.13 |
CVE-2024-33599 | Anchore CVE | High | glibc-common-2.28-236.el8_9.13 |
CVE-2024-33600 | Anchore CVE | Medium | glibc-gconv-extra-2.28-236.el8_9.13 |
CVE-2024-2961 | Anchore CVE | High | glibc-2.28-236.el8_9.13 |
CVE-2024-33602 | Anchore CVE | Low | glibc-2.28-236.el8_9.13 |
CVE-2019-1010022 | Anchore CVE | Critical | glibc-minimal-langpack-2.28-236.el8_9.13 |
CVE-2024-33600 | Anchore CVE | Medium | glibc-langpack-en-2.28-236.el8_9.13 |
CVE-2024-33601 | Anchore CVE | Low | glibc-minimal-langpack-2.28-236.el8_9.13 |
CVE-2024-33602 | Anchore CVE | Low | glibc-minimal-langpack-2.28-236.el8_9.13 |
CVE-2024-33600 | Anchore CVE | Medium | glibc-minimal-langpack-2.28-236.el8_9.13 |
CVE-2019-1010022 | Anchore CVE | Critical | glibc-langpack-en-2.28-236.el8_9.13 |
CVE-2024-2961 | Anchore CVE | High | glibc-common-2.28-236.el8_9.13 |
CVE-2024-33599 | Anchore CVE | High | glibc-minimal-langpack-2.28-236.el8_9.13 |
CVE-2024-33601 | Anchore CVE | Low | glibc-common-2.28-236.el8_9.13 |
CVE-2024-33601 | Anchore CVE | Low | glibc-langpack-en-2.28-236.el8_9.13 |
CVE-2024-33602 | Anchore CVE | Low | glibc-gconv-extra-2.28-236.el8_9.13 |
CVE-2019-1010022 | Anchore CVE | Critical | glibc-2.28-236.el8_9.13 |
CVE-2024-2961 | Anchore CVE | High | glibc-gconv-extra-2.28-236.el8_9.13 |
CVE-2024-33599 | Anchore CVE | High | glibc-gconv-extra-2.28-236.el8_9.13 |
CVE-2021-37714 | Twistlock CVE | High | org.jsoup_jsoup-1.8.3 |
CVE-2021-3690 | Twistlock CVE | High | io.undertow_undertow-core-2.0.13.Final |
CVE-2021-30468 | Twistlock CVE | High | org.apache.cxf_cxf-core-3.2.5-jbossorg-1 |
CVE-2021-26117 | Twistlock CVE | High | org.apache.activemq_artemis-jms-client-2.6.3.jbossorg-001 |
CVE-2021-22696 | Twistlock CVE | High | org.apache.cxf_cxf-core-3.2.5-jbossorg-1 |
CVE-2020-7226 | Twistlock CVE | High | org.cryptacular_cryptacular-1.2.0 |
CVE-2020-25649 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-13949 | Twistlock CVE | High | libthrift-0.11.0 |
CVE-2020-10705 | Twistlock CVE | High | io.undertow_undertow-core-2.0.13.Final |
CVE-2019-19343 | Twistlock CVE | High | io.undertow_undertow-core-2.0.13.Final |
CVE-2019-14888 | Twistlock CVE | High | io.undertow_undertow-core-2.0.13.Final |
CVE-2019-14439 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-12423 | Twistlock CVE | High | org.apache.cxf_cxf-core-3.2.5-jbossorg-1 |
CVE-2019-12086 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-10184 | Twistlock CVE | High | io.undertow_undertow-core-2.0.13.Final |
CVE-2019-10172 | Twistlock CVE | High | jackson-mapper-asl-1.9.13 |
CVE-2019-0210 | Twistlock CVE | High | libthrift-0.11.0 |
CVE-2019-0205 | Twistlock CVE | High | libthrift-0.11.0 |
CVE-2018-1320 | Twistlock CVE | High | libthrift-0.11.0 |
CVE-2018-12023 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2018-12022 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2017-18640 | Twistlock CVE | High | org.yaml_snakeyaml-1.18 |
CVE-2020-25638 | Twistlock CVE | High | org.hibernate_hibernate-core-5.3.6.Final |
CVE-2019-10086 | Twistlock CVE | High | commons-beanutils_commons-beanutils-1.9.3 |
CVE-2023-2976 | Twistlock CVE | High | com.google.guava_guava-20.0 |
CVE-2023-2976 | Twistlock CVE | High | com.google.guava_guava-25.0-jre |
CVE-2023-44483 | Twistlock CVE | Medium | org.apache.santuario_xmlsec-2.1.2 |
CVE-2023-4061 | Twistlock CVE | Medium | org.wildfly.core_wildfly-host-controller-6.0.2.Final |
CVE-2022-41854 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.18 |
CVE-2022-38752 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.18 |
CVE-2022-38751 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.18 |
CVE-2022-38749 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.18 |
CVE-2020-25711 | Twistlock CVE | Medium | org.infinispan_infinispan-core-9.3.1.Final |
CVE-2020-10719 | Twistlock CVE | Medium | io.undertow_undertow-core-2.0.13.Final |
CVE-2019-14900 | Twistlock CVE | Medium | org.hibernate_hibernate-core-5.3.6.Final |
CVE-2019-12406 | Twistlock CVE | Medium | org.apache.cxf_cxf-core-3.2.5-jbossorg-1 |
CVE-2022-36033 | Twistlock CVE | Medium | org.jsoup_jsoup-1.8.3 |
CVE-2022-35278 | Twistlock CVE | Medium | org.apache.activemq_artemis-jms-client-2.6.3.jbossorg-001 |
CVE-2020-13954 | Twistlock CVE | Medium | org.apache.cxf_cxf-core-3.2.5-jbossorg-1 |
CVE-2020-13932 | Twistlock CVE | Medium | org.apache.activemq_artemis-jms-client-2.6.3.jbossorg-001 |
CVE-2019-17573 | Twistlock CVE | Medium | org.apache.cxf_cxf-core-3.2.5-jbossorg-1 |
CVE-2019-10219 | Twistlock CVE | Medium | org.hibernate.validator_hibernate-validator-6.0.13.Final |
CVE-2015-6254 | Twistlock CVE | Medium | org.picketlink_picketlink-api-2.5.5.SP12 |
CVE-2015-0277 | Twistlock CVE | Medium | org.picketlink_picketlink-api-2.5.5.SP12 |
CVE-2021-3629 | Twistlock CVE | Medium | org.wildfly.core_wildfly-host-controller-6.0.2.Final |
CVE-2021-3629 | Twistlock CVE | Medium | io.undertow_undertow-core-2.0.13.Final |
CVE-2021-3597 | Twistlock CVE | Medium | io.undertow_undertow-core-2.0.13.Final |
CVE-2019-12814 | Twistlock CVE | Medium | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-12384 | Twistlock CVE | Medium | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2018-10237 | Twistlock CVE | Medium | com.google.guava_guava-20.0 |
CVE-2023-0833 | Twistlock CVE | Medium | com.squareup.okhttp3_okhttp-3.9.0 |
CVE-2022-38750 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.18 |
CVE-2019-12400 | Twistlock CVE | Medium | org.apache.santuario_xmlsec-2.1.2 |
CVE-2021-4040 | Twistlock CVE | Medium | org.apache.activemq_artemis-jms-client-2.6.3.jbossorg-001 |
CVE-2020-1954 | Twistlock CVE | Medium | org.apache.cxf_cxf-core-3.2.5-jbossorg-1 |
CVE-2020-13956 | Twistlock CVE | Medium | org.apache.httpcomponents_httpclient-4.5.2 |
CVE-2020-10693 | Twistlock CVE | Medium | org.hibernate.validator_hibernate-validator-6.0.13.Final |
CVE-2022-2764 | Twistlock CVE | Medium | io.undertow_undertow-core-2.0.13.Final |
CVE-2021-29425 | Twistlock CVE | Medium | commons-io_commons-io-2.5 |
CVE-2021-20220 | Twistlock CVE | Medium | io.undertow_undertow-core-2.0.13.Final |
CVE-2020-10687 | Twistlock CVE | Medium | io.undertow_undertow-core-2.0.13.Final |
CVE-2015-3158 | Twistlock CVE | Medium | org.picketlink_picketlink-api-2.5.5.SP12 |
CVE-2020-8908 | Twistlock CVE | Low | com.google.guava_guava-25.0-jre |
CVE-2020-8908 | Twistlock CVE | Low | com.google.guava_guava-20.0 |
CVE-2024-34397 | Twistlock CVE | Medium | glib2-2.56.4-161.el8 |
CVE-2024-33655 | Twistlock CVE | Low | unbound-libs-1.16.2-5.el8_9.6 |
CVE-2024-33655 | Twistlock CVE | Low | python3-unbound-1.16.2-5.el8_9.6 |
VAT: https://vat.dso.mil/vat/image?imageName=microfocus/idol/mmap_app&tag=12.12&branch=master
More information can be found in the failed pipeline located here: https://repo1.dso.mil/dsop/microfocus/idol/mmap_app/-/jobs/23485275
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the ~"Hardening::Verification" label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.