chore(findings): opensource/apache-pulsar/pulsar-manager
Summary
opensource/apache-pulsar/pulsar-manager has 731 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
CVE-2021-44228 | Twistlock CVE | Critical | org.apache.logging.log4j_log4j-core-2.10.0 |
CVE-2018-14721 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2022-23305 | Twistlock CVE | Critical | log4j_log4j-1.2.17 |
CVE-2022-22978 | Twistlock CVE | Critical | spring-security-core_spring-security-core-5.0.5 |
CVE-2022-22965 | Twistlock CVE | Critical | org.springframework_spring-core-5.0.6 |
CVE-2022-22965 | Twistlock CVE | Critical | spring-beans_spring-beans-5.0.6 |
CVE-2020-9548 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-9547 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-9546 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-9493 | Twistlock CVE | Critical | log4j_log4j-1.2.17 |
CVE-2020-8840 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-1938 | Twistlock CVE | Critical | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2019-20330 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-17571 | Twistlock CVE | Critical | log4j_log4j-1.2.17 |
CVE-2019-17531 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-17495 | Twistlock CVE | Critical | springfox-swagger-ui_springfox-swagger-ui-2.9.2 |
CVE-2019-17267 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-16943 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-16942 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-16335 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-14893 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-14892 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-14540 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-14379 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2018-8014 | Twistlock CVE | Critical | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2018-19362 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2018-19361 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2018-19360 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2018-14720 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2018-14719 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2018-14718 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2017-7658 | Twistlock CVE | Critical | org.eclipse.jetty_jetty-io-9.4.10 |
CVE-2017-7657 | Twistlock CVE | Critical | org.eclipse.jetty_jetty-io-9.4.10 |
CVE-2019-20445 | Twistlock CVE | Critical | io.netty_netty-codec-http-4.1.24 |
CVE-2019-20445 | Twistlock CVE | Critical | io.netty_netty-all-4.1.24 |
CVE-2019-20445 | Twistlock CVE | Critical | io.netty_netty-codec-4.1.24 |
CVE-2019-20444 | Twistlock CVE | Critical | io.netty_netty-codec-4.1.24 |
CVE-2019-20444 | Twistlock CVE | Critical | io.netty_netty-codec-http-4.1.24 |
CVE-2019-20444 | Twistlock CVE | Critical | io.netty_netty-all-4.1.24 |
CVE-2022-28111 | Twistlock CVE | Critical | com.github.pagehelper_pagehelper-5.1.11 |
CVE-2021-45046 | Twistlock CVE | Critical | org.apache.logging.log4j_log4j-core-2.10.0 |
CVE-2021-27568 | Twistlock CVE | Critical | net.minidev_json-smart-2.3 |
CVE-2019-20444 | Twistlock CVE | Critical | io.netty_netty-handler-4.1.24 |
CVE-2017-7658 | Twistlock CVE | Critical | org.eclipse.jetty_jetty-server-9.4.10 |
CVE-2020-8570 | Twistlock CVE | High | io.kubernetes_client-java-2.0.0 |
CVE-2022-23307 | Twistlock CVE | High | log4j_log4j-1.2.17 |
CVE-2022-23302 | Twistlock CVE | High | log4j_log4j-1.2.17 |
CVE-2021-22112 | Twistlock CVE | High | spring-security-core_spring-security-core-5.0.5 |
CVE-2020-11113 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-11112 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-11111 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-10969 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-10968 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-10673 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-10672 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2022-25762 | Twistlock CVE | High | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2021-23017 | Twistlock CVE | Critical | nginx-filesystem-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2021-23017 | Twistlock CVE | Critical | nginx-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2021-23017 | Twistlock CVE | Critical | nginx-mod-mail-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2021-23017 | Twistlock CVE | Critical | nginx-mod-http-xslt-filter-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2021-23017 | Twistlock CVE | Critical | nginx-mod-stream-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2021-23017 | Twistlock CVE | Critical | nginx-all-modules-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2021-23017 | Twistlock CVE | Critical | nginx-mod-http-image-filter-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2021-23017 | Twistlock CVE | Critical | nginx-mod-http-perl-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2021-20190 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36189 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36188 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36187 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36186 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36185 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36184 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36183 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36182 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36181 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36180 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-36179 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-35728 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-35491 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-35490 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-24750 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-24616 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-14195 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-14062 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-14061 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-14060 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-11620 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-11619 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-10650 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2022-42252 | Twistlock CVE | High | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2022-42004 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.10.0 |
CVE-2022-42004 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2022-42003 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2022-42003 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.10.0 |
CVE-2022-41881 | Twistlock CVE | High | io.netty_netty-all-4.1.24 |
CVE-2022-41881 | Twistlock CVE | High | io.netty_netty-codec-4.1.24 |
CVE-2022-25857 | Twistlock CVE | High | org.yaml_snakeyaml-1.19 |
CVE-2022-2048 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-9.4.10 |
CVE-2021-45105 | Twistlock CVE | High | org.apache.logging.log4j_log4j-core-2.10.0 |
CVE-2021-41079 | Twistlock CVE | High | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2021-37137 | Twistlock CVE | High | io.netty_netty-all-4.1.24 |
CVE-2021-37137 | Twistlock CVE | High | io.netty_netty-codec-4.1.24 |
CVE-2021-37136 | Twistlock CVE | High | io.netty_netty-codec-4.1.24 |
CVE-2021-37136 | Twistlock CVE | High | io.netty_netty-all-4.1.24 |
CVE-2021-36090 | Twistlock CVE | High | org.apache.commons_commons-compress-1.19 |
CVE-2021-35517 | Twistlock CVE | High | org.apache.commons_commons-compress-1.19 |
CVE-2021-35516 | Twistlock CVE | High | org.apache.commons_commons-compress-1.19 |
CVE-2021-35515 | Twistlock CVE | High | org.apache.commons_commons-compress-1.19 |
CVE-2021-25122 | Twistlock CVE | High | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2020-5398 | Twistlock CVE | High | org.springframework_spring-core-5.0.6 |
CVE-2020-36518 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.10.0 |
CVE-2020-36518 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-28491 | Twistlock CVE | High | com.fasterxml.jackson.dataformat_jackson-dataformat-cbor-2.9.5 |
CVE-2020-25649 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.10.0 |
CVE-2020-25649 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2020-17527 | Twistlock CVE | High | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2020-13935 | Twistlock CVE | High | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2020-13934 | Twistlock CVE | High | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2020-11996 | Twistlock CVE | High | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2020-11612 | Twistlock CVE | High | io.netty_netty-codec-4.1.24 |
CVE-2020-11612 | Twistlock CVE | High | io.netty_netty-all-4.1.24 |
CVE-2020-10663 | Twistlock CVE | High | org.apache.zookeeper_zookeeper-3.6.1 |
CVE-2019-17563 | Twistlock CVE | High | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2019-16869 | Twistlock CVE | High | io.netty_netty-all-4.1.24 |
CVE-2019-16869 | Twistlock CVE | High | io.netty_netty-codec-4.1.24 |
CVE-2019-14439 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-12086 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-10072 | Twistlock CVE | High | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2019-0199 | Twistlock CVE | High | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2018-8034 | Twistlock CVE | High | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2018-15756 | Twistlock CVE | High | org.springframework_spring-core-5.0.6 |
CVE-2018-12545 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-9.4.10 |
CVE-2018-12023 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2018-12022 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2018-11040 | Twistlock CVE | High | org.springframework_spring-core-5.0.6 |
CVE-2017-7656 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-9.4.10 |
CVE-2017-18640 | Twistlock CVE | High | org.yaml_snakeyaml-1.19 |
CVE-2019-10086 | Twistlock CVE | High | commons-beanutils_commons-beanutils-1.9.2 |
CVE-2022-3510 | Twistlock CVE | High | com.google.protobuf_protobuf-java-2.4.1 |
CVE-2022-3510 | Twistlock CVE | High | com.google.protobuf_protobuf-java-3.6.1 |
CVE-2022-3509 | Twistlock CVE | High | com.google.protobuf_protobuf-java-3.6.1 |
CVE-2022-3509 | Twistlock CVE | High | com.google.protobuf_protobuf-java-2.4.1 |
CVE-2022-31197 | Twistlock CVE | High | org.postgresql_postgresql-42.2.5 |
CVE-2022-25647 | Twistlock CVE | High | com.google.code.gson_gson-2.8.2 |
CVE-2022-21724 | Twistlock CVE | High | org.postgresql_postgresql-42.2.5 |
CVE-2021-25329 | Twistlock CVE | High | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2021-22569 | Twistlock CVE | High | com.google.protobuf_protobuf-java-2.4.1 |
CVE-2021-22569 | Twistlock CVE | High | com.google.protobuf_protobuf-java-3.6.1 |
CVE-2020-9484 | Twistlock CVE | High | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2020-27216 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-9.4.10 |
CVE-2020-26945 | Twistlock CVE | High | org.mybatis_mybatis-3.5.4 |
CVE-2020-13692 | Twistlock CVE | High | org.postgresql_postgresql-42.2.5 |
CVE-2020-11612 | Twistlock CVE | High | io.netty_netty-handler-4.1.24 |
CVE-2019-12418 | Twistlock CVE | High | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2018-12545 | Twistlock CVE | High | org.eclipse.jetty_jetty-server-9.4.10 |
CVE-2018-12538 | Twistlock CVE | High | org.eclipse.jetty_jetty-server-9.4.10 |
CVE-2017-7656 | Twistlock CVE | High | org.eclipse.jetty_jetty-server-9.4.10 |
CVE-2022-3970 | Twistlock CVE | Medium | libtiff-4.0.9-26.el8_7 |
CVE-2019-17543 | Twistlock CVE | Medium | lz4-1.8.3-3.el8_4 |
CVE-2022-41741 | Twistlock CVE | Medium | nginx-all-modules-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2022-41741 | Twistlock CVE | Medium | nginx-filesystem-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2022-41741 | Twistlock CVE | Medium | nginx-mod-mail-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2022-41741 | Twistlock CVE | Medium | nginx-mod-http-xslt-filter-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2022-41741 | Twistlock CVE | Medium | nginx-mod-http-perl-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2022-41741 | Twistlock CVE | Medium | nginx-mod-http-image-filter-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2022-41741 | Twistlock CVE | Medium | nginx-mod-stream-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2022-41741 | Twistlock CVE | Medium | nginx-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2015-20107 | Twistlock CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
PRISMA-2021-0213 | Twistlock CVE | Medium | com.fasterxml.jackson.core_jackson-databind-2.10.0 |
CVE-2022-45061 | Twistlock CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2020-10735 | Twistlock CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2017-17095 | Twistlock CVE | Medium | libtiff-4.0.9-26.el8_7 |
CVE-2023-0286 | Twistlock CVE | Medium | openssl-1.1.1k-7.el8_6 |
CVE-2021-3618 | Twistlock CVE | Medium | nginx-mod-http-xslt-filter-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2021-3618 | Twistlock CVE | Medium | nginx-all-modules-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2021-3618 | Twistlock CVE | Medium | nginx-mod-stream-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2021-3618 | Twistlock CVE | Medium | nginx-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2021-3618 | Twistlock CVE | Medium | nginx-mod-http-perl-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2021-3618 | Twistlock CVE | Medium | nginx-filesystem-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2021-3618 | Twistlock CVE | Medium | nginx-mod-mail-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2021-3618 | Twistlock CVE | Medium | nginx-mod-http-image-filter-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2022-41742 | Twistlock CVE | Medium | nginx-mod-http-image-filter-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2022-41742 | Twistlock CVE | Medium | nginx-all-modules-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2022-41742 | Twistlock CVE | Medium | nginx-filesystem-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2022-41742 | Twistlock CVE | Medium | nginx-mod-stream-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2022-41742 | Twistlock CVE | Medium | nginx-mod-http-perl-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2022-41742 | Twistlock CVE | Medium | nginx-mod-http-xslt-filter-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2022-41742 | Twistlock CVE | Medium | nginx-mod-mail-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2022-41742 | Twistlock CVE | Medium | nginx-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2021-44832 | Twistlock CVE | Medium | org.apache.logging.log4j_log4j-core-2.10.0 |
CVE-2021-42550 | Twistlock CVE | Medium | ch.qos.logback_logback-core-1.2.3 |
CVE-2021-4104 | Twistlock CVE | Medium | log4j_log4j-1.2.17 |
CVE-2022-41915 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.24 |
CVE-2022-41915 | Twistlock CVE | Medium | io.netty_netty-all-4.1.24 |
CVE-2022-41854 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.19 |
CVE-2022-38752 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.19 |
CVE-2022-38751 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.19 |
CVE-2022-38749 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.19 |
CVE-2022-22950 | Twistlock CVE | Medium | org.springframework_spring-core-5.0.6 |
CVE-2021-43797 | Twistlock CVE | Medium | io.netty_netty-all-4.1.24 |
CVE-2021-43797 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.24 |
CVE-2021-3733 | Twistlock CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2021-30640 | Twistlock CVE | Medium | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2020-5421 | Twistlock CVE | Medium | org.springframework_spring-core-5.0.6 |
CVE-2020-5408 | Twistlock CVE | Medium | spring-security-core_spring-security-core-5.0.5 |
CVE-2020-5408 | Twistlock CVE | Medium | org.springframework.security_spring-security-crypto-5.0.5 |
CVE-2019-10241 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.10 |
CVE-2019-10219 | Twistlock CVE | Medium | org.hibernate.validator_hibernate-validator-6.0.9 |
CVE-2019-0221 | Twistlock CVE | Medium | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2023-0215 | Twistlock CVE | Medium | openssl-1.1.1k-7.el8_6 |
CVE-2022-4450 | Twistlock CVE | Medium | openssl-1.1.1k-7.el8_6 |
CVE-2022-4304 | Twistlock CVE | Medium | openssl-1.1.1k-7.el8_6 |
CVE-2022-40897 | Twistlock CVE | Medium | python3-setuptools-39.2.0-6.el8 |
CVE-2021-24122 | Twistlock CVE | Medium | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2021-21409 | Twistlock CVE | Medium | io.netty_netty-all-4.1.24 |
CVE-2021-21409 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.24 |
CVE-2021-21295 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.24 |
CVE-2021-21295 | Twistlock CVE | Medium | io.netty_netty-all-4.1.24 |
CVE-2019-2684 | Twistlock CVE | Medium | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2019-12814 | Twistlock CVE | Medium | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2019-12384 | Twistlock CVE | Medium | com.fasterxml.jackson.core_jackson-databind-2.9.5 |
CVE-2018-8037 | Twistlock CVE | Medium | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2018-11039 | Twistlock CVE | Medium | org.springframework_spring-core-5.0.6 |
CVE-2018-10237 | Twistlock CVE | Medium | com.google.guava_guava-21.0 |
PRISMA-2021-0182 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-servlet-9.4.10 |
PRISMA-2021-0182 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.10 |
CVE-2022-48281 | Twistlock CVE | Medium | libtiff-4.0.9-26.el8_7 |
CVE-2022-38750 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.19 |
CVE-2022-3627 | Twistlock CVE | Medium | libtiff-4.0.9-26.el8_7 |
CVE-2022-3599 | Twistlock CVE | Medium | libtiff-4.0.9-26.el8_7 |
CVE-2022-3598 | Twistlock CVE | Medium | libtiff-4.0.9-26.el8_7 |
CVE-2022-3570 | Twistlock CVE | Medium | libtiff-4.0.9-26.el8_7 |
CVE-2022-24823 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.24 |
CVE-2022-24823 | Twistlock CVE | Medium | io.netty_netty-all-4.1.24 |
CVE-2021-39537 | Twistlock CVE | Medium | ncurses-6.1-9.20180224.el8 |
CVE-2021-21290 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.24 |
CVE-2021-21290 | Twistlock CVE | Medium | io.netty_netty-all-4.1.24 |
CVE-2022-22976 | Twistlock CVE | Medium | spring-security-core_spring-security-core-5.0.5 |
CVE-2022-22970 | Twistlock CVE | Medium | org.springframework_spring-core-5.0.6 |
CVE-2022-22968 | Twistlock CVE | Medium | org.springframework_spring-core-5.0.6 |
CVE-2022-0391 | Twistlock CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2021-33037 | Twistlock CVE | Medium | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2021-28169 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.10 |
CVE-2020-27223 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.10 |
CVE-2020-13956 | Twistlock CVE | Medium | org.apache.httpcomponents_httpclient-4.5.9 |
CVE-2020-13956 | Twistlock CVE | Medium | org.apache.httpcomponents_httpclient-4.5.5 |
CVE-2019-3795 | Twistlock CVE | Medium | spring-security-core_spring-security-core-5.0.5 |
CVE-2019-20372 | Twistlock CVE | Medium | nginx-all-modules-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2019-20372 | Twistlock CVE | Medium | nginx-mod-stream-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2019-20372 | Twistlock CVE | Medium | nginx-mod-http-image-filter-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2019-20372 | Twistlock CVE | Medium | nginx-mod-mail-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2019-20372 | Twistlock CVE | Medium | nginx-mod-http-perl-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2019-20372 | Twistlock CVE | Medium | nginx-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2019-20372 | Twistlock CVE | Medium | nginx-mod-http-xslt-filter-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2019-20372 | Twistlock CVE | Medium | nginx-filesystem-1.14.1-9.module+el8.0.0+4108+af250afe |
CVE-2018-16335 | Twistlock CVE | Medium | libtiff-4.0.9-26.el8_7 |
CVE-2018-15209 | Twistlock CVE | Medium | libtiff-4.0.9-26.el8_7 |
CVE-2018-12536 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.10 |
CVE-2021-29425 | Twistlock CVE | Medium | commons-io_commons-io-2.5 |
CVE-2020-27218 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.10 |
CVE-2020-1935 | Twistlock CVE | Medium | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2023-0687 | Twistlock CVE | Medium | glibc-langpack-en-2.28-211.el8 |
CVE-2020-13943 | Twistlock CVE | Medium | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2018-11784 | Twistlock CVE | Medium | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2016-4607 | Twistlock CVE | Medium | libxslt-1.1.32-6.el8 |
GHSA-673j-qm5f-xpv8 | Twistlock CVE | Medium | org.postgresql_postgresql-42.2.5 |
CVE-2022-41946 | Twistlock CVE | Medium | org.postgresql_postgresql-42.2.5 |
CVE-2022-33683 | Twistlock CVE | Medium | org.apache.pulsar_pulsar-broker-2.4.1 |
CVE-2022-33682 | Twistlock CVE | Medium | org.apache.pulsar_pulsar-broker-2.4.1 |
CVE-2022-32531 | Twistlock CVE | Medium | org.apache.bookkeeper_bookkeeper-common-4.11.0 |
CVE-2022-3171 | Twistlock CVE | Medium | com.google.protobuf_protobuf-java-3.6.1 |
CVE-2022-3171 | Twistlock CVE | Medium | com.google.protobuf_protobuf-java-2.4.1 |
CVE-2022-24823 | Twistlock CVE | Medium | io.netty_netty-codec-http-4.1.24 |
CVE-2021-43797 | Twistlock CVE | Medium | io.netty_netty-codec-http-4.1.24 |
CVE-2021-28169 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-servlets-9.4.10 |
CVE-2021-28168 | Twistlock CVE | Medium | org.glassfish.jersey.core_jersey-common-2.29.1 |
CVE-2021-25738 | Twistlock CVE | Medium | io.kubernetes_client-java-2.0.0 |
CVE-2021-22113 | Twistlock CVE | Medium | org.springframework.cloud_spring-cloud-netflix-zuul-2.0.2 |
CVE-2021-21409 | Twistlock CVE | Medium | io.netty_netty-codec-http2-4.1.24 |
CVE-2021-21295 | Twistlock CVE | Medium | io.netty_netty-codec-http2-4.1.24 |
CVE-2021-21290 | Twistlock CVE | Medium | io.netty_netty-codec-http-4.1.24 |
CVE-2020-27223 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.10 |
CVE-2020-27218 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.10 |
CVE-2020-15522 | Twistlock CVE | Medium | org.bouncycastle_bcprov-ext-jdk15on-1.60.0.0 |
CVE-2020-15250 | Twistlock CVE | Medium | junit_junit-4.12 |
CVE-2019-20445 | Twistlock CVE | Medium | io.netty_netty-handler-4.1.24 |
CVE-2019-10247 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.10 |
CVE-2019-10246 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.10 |
CVE-2019-10241 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.10 |
CVE-2018-12536 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.10 |
CVE-2018-1000873 | Twistlock CVE | Medium | com.fasterxml.jackson.datatype_jackson-datatype-jsr310-2.9.5 |
CVE-2019-6128 | Twistlock CVE | Low | libtiff-4.0.9-26.el8_7 |
CVE-2019-9674 | Twistlock CVE | Low | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2021-3737 | Twistlock CVE | Low | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2018-20406 | Twistlock CVE | Low | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2022-1354 | Twistlock CVE | Low | libtiff-4.0.9-26.el8_7 |
CVE-2020-35538 | Twistlock CVE | Low | libjpeg-turbo-1.5.3-12.el8 |
CVE-2018-10779 | Twistlock CVE | Low | libtiff-4.0.9-26.el8_7 |
CVE-2018-19211 | Twistlock CVE | Low | ncurses-6.1-9.20180224.el8 |
CVE-2018-17101 | Twistlock CVE | Low | libtiff-4.0.9-26.el8_7 |
CVE-2018-5711 | Twistlock CVE | Low | gd-2.2.5-7.el8 |
CVE-2019-13118 | Twistlock CVE | Low | libxslt-1.1.32-6.el8 |
CVE-2021-43980 | Twistlock CVE | Low | apache tomcat_tomcat-embed-core-8.5.31 |
CVE-2021-34428 | Twistlock CVE | Low | org.eclipse.jetty_jetty-io-9.4.10 |
CVE-2020-8908 | Twistlock CVE | Low | com.google.guava_guava-21.0 |
CVE-2019-13117 | Twistlock CVE | Low | libxslt-1.1.32-6.el8 |
CVE-2019-11038 | Twistlock CVE | Low | gd-2.2.5-7.el8 |
CVE-2018-5360 | Twistlock CVE | Low | libtiff-4.0.9-26.el8_7 |
CVE-2018-19210 | Twistlock CVE | Low | libtiff-4.0.9-26.el8_7 |
CVE-2018-10801 | Twistlock CVE | Low | libtiff-4.0.9-26.el8_7 |
CVE-2022-2047 | Twistlock CVE | Low | org.eclipse.jetty_jetty-io-9.4.10 |
CVE-2022-2047 | Twistlock CVE | Low | org.eclipse.jetty_jetty-http-9.4.10 |
CVE-2021-34428 | Twistlock CVE | Low | org.eclipse.jetty_jetty-server-9.4.10 |
PRISMA-2021-0055 | Twistlock CVE | Low | commons-codec_commons-codec-1.11 |
GHSA-57j2-w4cx-62h2 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-m8p2-495h-ccmh | Anchore CVE | Medium | hibernate-validator-6.0.9.Final |
GHSA-h4x4-5qp2-wp46 | Anchore CVE | Medium | jackson-datatype-jsr310-2.9.5 |
GHSA-562r-vg33-8x8h | Anchore CVE | Medium | postgresql-42.2.5 |
CVE-2022-32531 | Anchore CVE | Medium | bookkeeper-common-allocator-4.11.0 |
GHSA-cqqj-4p63-rrmm | Anchore CVE | Critical | netty-handler-4.1.24.Final |
GHSA-6fpp-rgj9-8rwc | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-jjjh-jjxp-wpff | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2022-2047 | Anchore CVE | Low | jetty-xml-9.4.10.v20180503 |
GHSA-4jrv-ppp4-jm57 | Anchore CVE | High | gson-2.8.2 |
CVE-2022-33681 | Anchore CVE | Medium | pulsar-functions-runtime-2.4.1 |
CVE-2022-33681 | Anchore CVE | Medium | pulsar-websocket-2.4.1 |
GHSA-r38f-c4h4-hqq2 | Anchore CVE | High | postgresql-42.2.5 |
GHSA-cghx-9gcr-r42x | Anchore CVE | High | client-java-2.0.0 |
CVE-2022-24280 | Anchore CVE | Medium | pulsar-zookeeper-utils-2.4.1 |
CVE-2020-9493 | Anchore CVE | Critical | log4j-1.2.17 |
CVE-2017-7658 | Anchore CVE | Critical | jetty-servlet-9.4.10.v20180503 |
GHSA-9rgv-h7x4-qw8g | Anchore CVE | Medium | jetty-server-9.4.10.v20180503 |
CVE-2021-22160 | Anchore CVE | Critical | pulsar-zookeeper-utils-2.4.1 |
CVE-2020-27216 | Anchore CVE | High | jetty-io-9.4.10.v20180503 |
GHSA-p979-4mfw-53vg | Anchore CVE | High | netty-all-4.1.24.Final |
CVE-2021-22160 | Anchore CVE | Critical | pulsar-client-auth-sasl-2.5.2 |
GHSA-wrvw-hg22-4m67 | Anchore CVE | High | protobuf-java-3.6.1 |
CVE-2022-33684 | Anchore CVE | High | pulsar-manager-* |
GHSA-9mxf-g3x6-wv74 | Anchore CVE | Critical | jackson-databind-2.9.5 |
CVE-2022-33684 | Anchore CVE | High | pulsar-functions-instance-2.4.1 |
GHSA-f3j5-rmmp-3fc5 | Anchore CVE | Critical | jackson-databind-2.9.5 |
CVE-2022-24280 | Anchore CVE | Medium | pulsar-client-auth-sasl-2.5.2 |
GHSA-qmqc-x3r4-6v39 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-7vx9-xjhr-rw6h | Anchore CVE | Medium | jetty-server-9.4.10.v20180503 |
CVE-2020-27216 | Anchore CVE | High | jetty-xml-9.4.10.v20180503 |
GHSA-7r82-7xv7-xcpj | Anchore CVE | Medium | httpclient-4.5.9 |
GHSA-gjmw-vf9h-g25v | Anchore CVE | Critical | jackson-databind-2.9.5 |
CVE-2017-7658 | Anchore CVE | Critical | jetty-servlets-9.4.10.v20180503 |
CVE-2022-33684 | Anchore CVE | High | pulsar-functions-runtime-2.4.1 |
CVE-2022-24280 | Anchore CVE | Medium | pulsar-functions-worker-2.4.1 |
CVE-2022-33682 | Anchore CVE | Medium | pulsar-client-auth-athenz-2.5.2 |
CVE-2022-4304 | Anchore CVE | Medium | openssl-1:1.1.1k-7.el8_6 |
CVE-2016-1000027 | Anchore CVE | Critical | spring-core-5.0.6.release |
CVE-2021-34428 | Anchore CVE | Low | jetty-http-9.4.10.v20180503 |
GHSA-c2q3-4qrh-fm48 | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2017-7657 | Anchore CVE | Critical | jetty-servlets-9.4.10.v20180503 |
CVE-2022-33684 | Anchore CVE | High | pulsar-functions-secrets-2.4.1 |
GHSA-c8hm-7hpq-7jhg | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2019-17571 | Anchore CVE | Critical | bookkeeper-proto-4.11.0 |
CVE-2021-45105 | Anchore CVE | Medium | log4j-slf4j-impl-2.10.0 |
CVE-2022-24280 | Anchore CVE | Medium | pulsar-functions-utils-2.4.1 |
CVE-2022-33681 | Anchore CVE | Medium | pulsar-client-original-2.5.2 |
CVE-2021-28165 | Anchore CVE | High | jetty-servlet-9.4.10.v20180503 |
CVE-2020-13955 | Anchore CVE | Medium | calcite-core-1.24.0 |
CVE-2022-24280 | Anchore CVE | Medium | pulsar-broker-common-2.4.1 |
CVE-2018-12536 | Anchore CVE | Medium | jetty-io-9.4.10.v20180503 |
GHSA-4gg5-vx3j-xwc7 | Anchore CVE | High | protobuf-java-3.6.1 |
CVE-2022-24280 | Anchore CVE | Medium | pulsar-transaction-common-2.5.2 |
GHSA-645p-88qh-w398 | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-rpr3-cw39-3pxh | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-21.0 |
CVE-2022-3570 | Anchore CVE | Medium | libtiff-4.0.9-26.el8_7 |
CVE-2022-2048 | Anchore CVE | High | jetty-client-9.4.10.v20180503 |
GHSA-5ww9-j83m-q7qx | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2022-33681 | Anchore CVE | Medium | pulsar-transaction-common-2.5.2 |
CVE-2021-34428 | Anchore CVE | Low | jetty-client-9.4.10.v20180503 |
CVE-2021-28165 | Anchore CVE | High | jetty-server-9.4.10.v20180503 |
GHSA-xc67-hjx6-cgg6 | Anchore CVE | Medium | jetty-server-9.4.10.v20180503 |
GHSA-65fg-84f6-3jq3 | Anchore CVE | Critical | log4j-1.2.17 |
CVE-2022-33684 | Anchore CVE | High | pulsar-client-auth-sasl-2.5.2 |
CVE-1999-1237 | Anchore CVE | High | http-server-4.11.0 |
GHSA-h2f4-v4c4-6wx4 | Anchore CVE | High | jetty-server-9.4.10.v20180503 |
CVE-2017-7656 | Anchore CVE | High | jetty-client-9.4.10.v20180503 |
CVE-2022-32531 | Anchore CVE | Medium | bookkeeper-proto-4.11.0 |
CVE-2022-33684 | Anchore CVE | High | pulsar-functions-worker-2.4.1 |
CVE-2021-22160 | Anchore CVE | Critical | pulsar-client-original-2.5.2 |
CVE-2021-3733 | Anchore CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
GHSA-758m-v56v-grj4 | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-io-9.4.10.v20180503 |
GHSA-269q-hmxg-m83q | Anchore CVE | Medium | netty-codec-http-4.1.24.Final |
GHSA-9m6f-7xcq-8vf8 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-3mc7-4q67-w48m | Anchore CVE | High | snakeyaml-1.19 |
CVE-2022-33684 | Anchore CVE | High | pulsar-client-api-2.5.2 |
CVE-2022-33681 | Anchore CVE | Medium | pulsar-functions-utils-2.4.1 |
GHSA-rgv9-q543-rqg4 | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-1999-0678 | Anchore CVE | Medium | http-server-4.11.0 |
CVE-2022-33682 | Anchore CVE | Medium | pulsar-broker-common-2.4.1 |
GHSA-rmrm-75hp-phr2 | Anchore CVE | Medium | hibernate-validator-6.0.9.Final |
CVE-2017-7658 | Anchore CVE | Critical | jetty-http-9.4.10.v20180503 |
CVE-2021-45105 | Anchore CVE | Medium | log4j-to-slf4j-2.10.0 |
CVE-2022-24280 | Anchore CVE | Medium | pulsar-functions-runtime-2.4.1 |
GHSA-5949-rw7g-wx7w | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2022-33684 | Anchore CVE | High | pulsar-transaction-common-2.5.2 |
CVE-2018-12536 | Anchore CVE | Medium | jetty-xml-9.4.10.v20180503 |
CVE-2021-22160 | Anchore CVE | Critical | pulsar-client-admin-original-2.5.2 |
GHSA-w9p3-5cr8-m3jj | Anchore CVE | High | log4j-1.2.17 |
CVE-2022-33683 | Anchore CVE | Medium | pulsar-functions-proto-2.4.1 |
CVE-2022-33683 | Anchore CVE | Medium | pulsar-functions-secrets-2.4.1 |
CVE-2022-33681 | Anchore CVE | Medium | pulsar-io-core-2.4.1 |
CVE-2022-2047 | Anchore CVE | Low | jetty-server-9.4.10.v20180503 |
GHSA-c265-37vj-cwcc | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2022-33682 | Anchore CVE | Medium | pulsar-client-original-2.5.2 |
CVE-2021-22160 | Anchore CVE | Critical | pulsar-transaction-common-2.5.2 |
CVE-2022-2048 | Anchore CVE | High | jetty-servlet-9.4.10.v20180503 |
CVE-2018-12536 | Anchore CVE | Medium | jetty-client-9.4.10.v20180503 |
CVE-2022-33681 | Anchore CVE | Medium | pulsar-client-auth-sasl-2.5.2 |
CVE-2020-27216 | Anchore CVE | High | jetty-client-9.4.10.v20180503 |
GHSA-mx7p-6679-8g3q | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-cf6r-3wgc-h863 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-mc84-pj99-q6hh | Anchore CVE | High | commons-compress-1.19 |
CVE-2022-33684 | Anchore CVE | High | pulsar-io-core-2.4.1 |
CVE-2019-17571 | Anchore CVE | Critical | bookkeeper-stats-api-4.11.0 |
CVE-2022-33684 | Anchore CVE | High | pulsar-zookeeper-utils-2.4.1 |
GHSA-q93h-jc49-78gg | Anchore CVE | Critical | jackson-databind-2.9.5 |
CVE-2022-33684 | Anchore CVE | High | pulsar-functions-utils-2.4.1 |
CVE-2022-33682 | Anchore CVE | Medium | pulsar-functions-runtime-2.4.1 |
GHSA-cmfg-87vq-g5g4 | Anchore CVE | Medium | jackson-databind-2.9.5 |
CVE-2021-22160 | Anchore CVE | Critical | pulsar-functions-worker-2.4.1 |
CVE-2022-33684 | Anchore CVE | High | pulsar-functions-api-2.4.1 |
CVE-2022-24280 | Anchore CVE | Medium | pulsar-functions-secrets-2.4.1 |
CVE-2022-48281 | Anchore CVE | Medium | libtiff-4.0.9-26.el8_7 |
GHSA-w37g-rhq8-7m4j | Anchore CVE | Medium | snakeyaml-1.19 |
CVE-2019-17571 | Anchore CVE | Critical | bookkeeper-server-4.11.0 |
CVE-1999-0236 | Anchore CVE | High | http-server-4.11.0 |
GHSA-2qrg-x229-3v8q | Anchore CVE | Critical | log4j-1.2.17 |
CVE-2022-33683 | Anchore CVE | Medium | pulsar-functions-utils-2.4.1 |
GHSA-j3qw-g67q-7m64 | Anchore CVE | Medium | pulsar-broker-2.4.1 |
CVE-2018-12536 | Anchore CVE | Medium | jetty-servlets-9.4.10.v20180503 |
GHSA-f9xh-2qgp-cq57 | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2022-2048 | Anchore CVE | High | jetty-io-9.4.10.v20180503 |
GHSA-cvm9-fjm9-3572 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-jjjh-jjxp-wpff | Anchore CVE | High | jackson-databind-2.10.0 |
CVE-2022-33682 | Anchore CVE | Medium | pulsar-transaction-common-2.5.2 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-xml-9.4.10.v20180503 |
CVE-2022-33683 | Anchore CVE | Medium | pulsar-client-original-2.5.2 |
CVE-2022-2047 | Anchore CVE | Low | jetty-servlets-9.4.10.v20180503 |
CVE-2022-33681 | Anchore CVE | Medium | pulsar-client-admin-original-2.5.2 |
CVE-2021-44832 | Anchore CVE | Medium | log4j-slf4j-impl-2.10.0 |
CVE-2022-33682 | Anchore CVE | Medium | pulsar-functions-secrets-2.4.1 |
CVE-2007-0086 | Anchore CVE | High | http-server-4.11.0 |
CVE-2022-33683 | Anchore CVE | Medium | pulsar-functions-instance-2.4.1 |
CVE-2022-33683 | Anchore CVE | Medium | pulsar-io-core-2.4.1 |
GHSA-4w82-r329-3q67 | Anchore CVE | Critical | jackson-databind-2.9.5 |
CVE-2022-33684 | Anchore CVE | High | pulsar-functions-proto-2.4.1 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-servlets-9.4.10.v20180503 |
GHSA-h4rc-386g-6m85 | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2017-7656 | Anchore CVE | High | jetty-xml-9.4.10.v20180503 |
CVE-2021-3737 | Anchore CVE | Low | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
GHSA-qjw2-hr98-qgfh | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-wh8g-3j2c-rqj5 | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2017-7657 | Anchore CVE | Critical | jetty-xml-9.4.10.v20180503 |
CVE-2020-27216 | Anchore CVE | High | jetty-http-9.4.10.v20180503 |
GHSA-727h-hrw8-jg8q | Anchore CVE | Low | postgresql-42.2.5 |
CVE-2022-41881 | Anchore CVE | High | netty-reactive-streams-2.0.0 |
CVE-1999-1412 | Anchore CVE | Medium | http-server-4.11.0 |
GHSA-mvr2-9pj6-7w5j | Anchore CVE | Medium | guava-21.0 |
GHSA-mm9x-g8pc-w292 | Anchore CVE | High | netty-handler-4.1.24.Final |
GHSA-h822-r4r5-v8jg | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-crv7-7245-f45f | Anchore CVE | High | commons-compress-1.19 |
CVE-2022-39135 | Anchore CVE | Critical | avatica-core-1.17.0 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-servlets-9.4.10.v20180503 |
CVE-2017-7658 | Anchore CVE | Critical | jetty-io-9.4.10.v20180503 |
CVE-2017-7656 | Anchore CVE | High | jetty-io-9.4.10.v20180503 |
CVE-2022-33681 | Anchore CVE | Medium | pulsar-broker-common-2.4.1 |
GHSA-gww7-p5w4-wrfv | Anchore CVE | Critical | jackson-databind-2.9.5 |
CVE-2022-33681 | Anchore CVE | Medium | pulsar-functions-api-2.4.1 |
GHSA-f256-j965-7f32 | Anchore CVE | Medium | netty-codec-http2-4.1.24.Final |
CVE-2022-33683 | Anchore CVE | Medium | pulsar-functions-runtime-2.4.1 |
GHSA-m6cp-vxjx-65j6 | Anchore CVE | Low | jetty-server-9.4.10.v20180503 |
GHSA-v7wg-cpwc-24m4 | Anchore CVE | High | postgresql-42.2.5 |
CVE-2021-28165 | Anchore CVE | High | jetty-xml-9.4.10.v20180503 |
CVE-2022-33682 | Anchore CVE | Medium | pulsar-functions-proto-2.4.1 |
GHSA-4gq5-ch57-c2mg | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-9w3m-gqgf-c4p9 | Anchore CVE | Medium | snakeyaml-1.19 |
CVE-2022-33681 | Anchore CVE | Medium | pulsar-manager-* |
CVE-2019-17571 | Anchore CVE | Critical | bookkeeper-common-4.11.0 |
CVE-2022-33682 | Anchore CVE | Medium | pulsar-common-2.5.2 |
GHSA-9vvp-fxw6-jcxr | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2018-11040 | Anchore CVE | High | spring-core-5.0.6.release |
CVE-2022-33682 | Anchore CVE | Medium | pulsar-functions-worker-2.4.1 |
CVE-2022-33683 | Anchore CVE | Medium | pulsar-zookeeper-utils-2.4.1 |
CVE-2017-7657 | Anchore CVE | Critical | jetty-http-9.4.10.v20180503 |
GHSA-668q-qrv7-99fm | Anchore CVE | Medium | logback-core-1.2.3 |
CVE-2017-7657 | Anchore CVE | Critical | jetty-client-9.4.10.v20180503 |
CVE-2022-33683 | Anchore CVE | Medium | pulsar-common-2.5.2 |
GHSA-57j2-w4cx-62h2 | Anchore CVE | High | jackson-databind-2.10.0 |
CVE-2017-7657 | Anchore CVE | Critical | jetty-servlet-9.4.10.v20180503 |
CVE-2020-25649 | Anchore CVE | High | jackson-databind-2.10.0 |
GHSA-5mcr-gq6c-3hq2 | Anchore CVE | Medium | netty-codec-http-4.1.24.Final |
CVE-2022-33681 | Anchore CVE | Medium | pulsar-functions-secrets-2.4.1 |
CVE-2021-34428 | Anchore CVE | Low | jetty-servlet-9.4.10.v20180503 |
GHSA-4gg5-vx3j-xwc7 | Anchore CVE | High | protobuf-java-2.4.1 |
CVE-2021-34428 | Anchore CVE | Low | jetty-servlets-9.4.10.v20180503 |
GHSA-wrvw-hg22-4m67 | Anchore CVE | High | protobuf-java-2.4.1 |
CVE-2022-33682 | Anchore CVE | Medium | pulsar-client-admin-original-2.5.2 |
GHSA-j823-4qch-3rgm | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2020-27216 | Anchore CVE | High | jetty-servlets-9.4.10.v20180503 |
GHSA-673j-qm5f-xpv8 | Anchore CVE | Medium | postgresql-42.2.5 |
CVE-2017-7658 | Anchore CVE | Critical | jetty-xml-9.4.10.v20180503 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-servlet-9.4.10.v20180503 |
CVE-2021-22160 | Anchore CVE | Critical | pulsar-broker-common-2.4.1 |
CVE-2020-10735 | Anchore CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2021-28165 | Anchore CVE | High | jetty-http-9.4.10.v20180503 |
GHSA-95cm-88f5-f2c7 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-vwpg-f6gw-rjvf | Anchore CVE | Medium | spring-cloud-netflix-zuul-2.0.2.RELEASE |
GHSA-xqfj-vm6h-2x34 | Anchore CVE | High | commons-compress-1.19 |
GHSA-mjmj-j48q-9wg2 | Anchore CVE | High | snakeyaml-1.19 |
GHSA-88cc-g835-76rp | Anchore CVE | High | postgresql-42.2.5 |
CVE-2020-9488 | Anchore CVE | Low | log4j-slf4j-impl-2.10.0 |
CVE-2022-24280 | Anchore CVE | Medium | pulsar-io-core-2.4.1 |
GHSA-84q7-p226-4x5w | Anchore CVE | High | jetty-server-9.4.10.v20180503 |
GHSA-c4r9-r8fh-9vj2 | Anchore CVE | Medium | snakeyaml-1.19 |
CVE-2022-33684 | Anchore CVE | High | pulsar-websocket-2.4.1 |
GHSA-w559-623p-vfg8 | Anchore CVE | Critical | pagehelper-5.1.11 |
GHSA-grg4-wf29-r9vv | Anchore CVE | High | netty-codec-4.1.24.Final |
GHSA-v585-23hc-c647 | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2022-2047 | Anchore CVE | Low | jetty-servlet-9.4.10.v20180503 |
CVE-2021-22160 | Anchore CVE | Critical | pulsar-functions-instance-2.4.1 |
CVE-2022-33683 | Anchore CVE | Medium | pulsar-client-api-2.5.2 |
CVE-2022-33684 | Anchore CVE | High | pulsar-common-2.5.2 |
GHSA-vfqx-33qm-g869 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-mc6h-4qgp-37qh | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2007-4559 | Anchore CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2020-35728 | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2022-33682 | Anchore CVE | Medium | pulsar-manager-* |
CVE-2021-22160 | Anchore CVE | Critical | pulsar-functions-utils-2.4.1 |
CVE-2022-33683 | Anchore CVE | Medium | pulsar-client-auth-sasl-2.5.2 |
CVE-2021-28165 | Anchore CVE | High | jetty-servlets-9.4.10.v20180503 |
GHSA-9vjp-v76f-g363 | Anchore CVE | High | netty-codec-4.1.24.Final |
CVE-2021-44832 | Anchore CVE | Medium | log4j-to-slf4j-2.10.0 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-xml-9.4.10.v20180503 |
CVE-2022-33682 | Anchore CVE | Medium | pulsar-websocket-2.4.1 |
GHSA-r28m-g6j9-r2h5 | Anchore CVE | Medium | jetty-server-9.4.10.v20180503 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-client-9.4.10.v20180503 |
GHSA-g5ww-5jh7-63cx | Anchore CVE | High | protobuf-java-3.6.1 |
GHSA-rgv9-q543-rqg4 | Anchore CVE | High | jackson-databind-2.10.0 |
CVE-2021-22160 | Anchore CVE | Critical | pulsar-functions-api-2.4.1 |
CVE-2022-4450 | Anchore CVE | Medium | openssl-1:1.1.1k-7.el8_6 |
GHSA-h4h5-3hr4-j3g2 | Anchore CVE | Medium | protobuf-java-2.4.1 |
CVE-2022-33682 | Anchore CVE | Medium | pulsar-functions-api-2.4.1 |
GHSA-7r82-7xv7-xcpj | Anchore CVE | Medium | httpclient-4.5.5 |
GHSA-cj7v-27pg-wf7q | Anchore CVE | Low | jetty-http-9.4.10.v20180503 |
CVE-2022-33682 | Anchore CVE | Medium | pulsar-zookeeper-utils-2.4.1 |
CVE-2020-27216 | Anchore CVE | High | jetty-server-9.4.10.v20180503 |
CVE-2022-32531 | Anchore CVE | Medium | bookkeeper-tools-framework-4.11.0 |
GHSA-p2v9-g2qv-p635 | Anchore CVE | Medium | netty-handler-4.1.24.Final |
CVE-2022-33683 | Anchore CVE | Medium | pulsar-functions-api-2.4.1 |
CVE-2007-0450 | Anchore CVE | Medium | http-server-4.11.0 |
GHSA-fmmc-742q-jg75 | Anchore CVE | Critical | jackson-databind-2.9.5 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-http-9.4.10.v20180503 |
CVE-2022-33684 | Anchore CVE | High | pulsar-client-auth-athenz-2.5.2 |
CVE-2015-20107 | Anchore CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
GHSA-gwrp-pvrq-jmwv | Anchore CVE | Medium | commons-io-2.5 |
CVE-2017-7657 | Anchore CVE | Critical | jetty-io-9.4.10.v20180503 |
CVE-2022-45061 | Anchore CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2021-34428 | Anchore CVE | Low | jetty-io-9.4.10.v20180503 |
CVE-2022-33681 | Anchore CVE | Medium | pulsar-broker-2.4.1 |
CVE-2020-13955 | Anchore CVE | Medium | avatica-metrics-1.17.0 |
CVE-2022-33683 | Anchore CVE | Medium | pulsar-client-auth-athenz-2.5.2 |
CVE-2022-33681 | Anchore CVE | Medium | pulsar-functions-proto-2.4.1 |
CVE-2023-0286 | Anchore CVE | Medium | openssl-1:1.1.1k-7.el8_6 |
GHSA-rf6r-2c4q-2vwg | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-gwcr-j4wh-j3cq | Anchore CVE | Medium | jetty-servlets-9.4.10.v20180503 |
GHSA-mph4-vhrx-mv67 | Anchore CVE | Medium | jackson-databind-2.9.5 |
CVE-2022-33681 | Anchore CVE | Medium | pulsar-common-2.5.2 |
CVE-2023-0687 | Anchore CVE | Medium | glibc-gconv-extra-2.28-211.el8 |
CVE-2022-33683 | Anchore CVE | Medium | pulsar-websocket-2.4.1 |
GHSA-rvwf-54qp-4r6v | Anchore CVE | High | snakeyaml-1.19 |
CVE-2022-39135 | Anchore CVE | Critical | avatica-metrics-1.17.0 |
GHSA-fqwf-pjwf-7vqv | Anchore CVE | Medium | jackson-databind-2.9.5 |
GHSA-f9hv-mg5h-xcw9 | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-58pp-9c76-5625 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-gxq5-79m2-gvvq | Anchore CVE | Medium | bookkeeper-common-4.11.0 |
CVE-2018-11039 | Anchore CVE | Medium | spring-core-5.0.6.release |
GHSA-9gph-22xh-8x98 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-wx5j-54mm-rqqq | Anchore CVE | Medium | netty-codec-http-4.1.24.Final |
GHSA-h3cw-g4mq-c5x2 | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2022-2048 | Anchore CVE | High | jetty-server-9.4.10.v20180503 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-http-9.4.10.v20180503 |
CVE-2022-2048 | Anchore CVE | High | jetty-xml-9.4.10.v20180503 |
CVE-2022-33683 | Anchore CVE | Medium | pulsar-functions-worker-2.4.1 |
GHSA-r3gr-cxrf-hg25 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-89qr-369f-5m5x | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-6x9x-8qw9-9pp6 | Anchore CVE | Critical | jetty-server-9.4.10.v20180503 |
CVE-2022-33681 | Anchore CVE | Medium | pulsar-functions-instance-2.4.1 |
GHSA-6phf-73q6-gh87 | Anchore CVE | High | commons-beanutils-1.9.2 |
CVE-2022-33682 | Anchore CVE | Medium | pulsar-client-api-2.5.2 |
CVE-2022-24280 | Anchore CVE | Medium | pulsar-functions-instance-2.4.1 |
CVE-2021-22160 | Anchore CVE | Critical | pulsar-io-core-2.4.1 |
CVE-2022-24280 | Anchore CVE | Medium | pulsar-functions-api-2.4.1 |
GHSA-mx9v-gmh4-mgqw | Anchore CVE | Critical | jackson-databind-2.9.5 |
CVE-2020-9488 | Anchore CVE | Low | log4j-to-slf4j-2.10.0 |
GHSA-qr7j-h6gg-jmgc | Anchore CVE | Critical | jackson-databind-2.9.5 |
CVE-2022-39135 | Anchore CVE | Critical | calcite-linq4j-1.24.0 |
CVE-2021-22160 | Anchore CVE | Critical | pulsar-client-api-2.5.2 |
GHSA-26vr-8j45-3r4w | Anchore CVE | High | jetty-io-9.4.10.v20180503 |
CVE-2022-33682 | Anchore CVE | Medium | pulsar-client-auth-sasl-2.5.2 |
GHSA-cjjf-94ff-43w7 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-86wm-rrjm-8wh8 | Anchore CVE | Medium | jetty-server-9.4.10.v20180503 |
CVE-2021-22160 | Anchore CVE | Critical | pulsar-functions-proto-2.4.1 |
GHSA-p43x-xfjf-5jhr | Anchore CVE | Critical | jackson-databind-2.9.5 |
CVE-2022-41915 | Anchore CVE | Medium | netty-reactive-streams-2.0.0 |
CVE-2017-7658 | Anchore CVE | Critical | jetty-client-9.4.10.v20180503 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-xml-9.4.10.v20180503 |
CVE-2021-22160 | Anchore CVE | Critical | pulsar-websocket-2.4.1 |
CVE-2022-33683 | Anchore CVE | Medium | pulsar-transaction-common-2.5.2 |
CVE-2022-33682 | Anchore CVE | Medium | pulsar-functions-utils-2.4.1 |
CVE-2022-33684 | Anchore CVE | High | pulsar-broker-2.4.1 |
GHSA-vwqq-5vrc-xw9h | Anchore CVE | Low | log4j-core-2.10.0 |
CVE-2023-0215 | Anchore CVE | Medium | openssl-1:1.1.1k-7.el8_6 |
CVE-2022-22965 | Anchore CVE | Critical | spring-core-5.0.6.release |
CVE-2022-24280 | Anchore CVE | Medium | pulsar-client-auth-athenz-2.5.2 |
CVE-2022-3627 | Anchore CVE | Medium | libtiff-4.0.9-26.el8_7 |
GHSA-85cw-hj65-qqv9 | Anchore CVE | Critical | jackson-databind-2.9.5 |
CVE-2020-5398 | Anchore CVE | High | spring-core-5.0.6.release |
CVE-2020-5421 | Anchore CVE | Medium | spring-core-5.0.6.release |
CVE-2021-22160 | Anchore CVE | Critical | pulsar-common-2.5.2 |
CVE-2022-2048 | Anchore CVE | High | jetty-http-9.4.10.v20180503 |
GHSA-f7vh-qwp3-x37m | Anchore CVE | Critical | log4j-1.2.17 |
CVE-2022-32531 | Anchore CVE | Medium | bookkeeper-stats-api-4.11.0 |
CVE-2022-22968 | Anchore CVE | Medium | spring-core-5.0.6.release |
CVE-2022-24280 | Anchore CVE | Medium | pulsar-client-api-2.5.2 |
CVE-2017-7657 | Anchore CVE | Critical | jetty-server-9.4.10.v20180503 |
GHSA-jvf3-mfxv-jcqr | Anchore CVE | Medium | pulsar-broker-2.4.1 |
GHSA-27xj-rqx5-2255 | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2022-2048 | Anchore CVE | High | jetty-servlets-9.4.10.v20180503 |
CVE-2022-24280 | Anchore CVE | Medium | pulsar-manager-* |
CVE-2017-7656 | Anchore CVE | High | jetty-http-9.4.10.v20180503 |
CVE-2022-33682 | Anchore CVE | Medium | pulsar-io-core-2.4.1 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-http-9.4.10.v20180503 |
CVE-2022-39135 | Anchore CVE | Critical | calcite-core-1.24.0 |
CVE-2023-0687 | Anchore CVE | Medium | glibc-langpack-en-2.28-211.el8 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-io-9.4.10.v20180503 |
CVE-2022-33681 | Anchore CVE | Medium | pulsar-functions-worker-2.4.1 |
CVE-2022-3970 | Anchore CVE | Medium | libtiff-4.0.9-26.el8_7 |
CVE-2022-22950 | Anchore CVE | Medium | spring-core-5.0.6.release |
CVE-2021-28169 | Anchore CVE | Medium | jetty-servlet-9.4.10.v20180503 |
GHSA-x2w5-5m2g-7h5m | Anchore CVE | Critical | jackson-databind-2.9.5 |
GHSA-m394-8rww-3jr7 | Anchore CVE | Medium | jetty-server-9.4.10.v20180503 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-io-9.4.10.v20180503 |
GHSA-fp5r-v3w9-4333 | Anchore CVE | High | log4j-1.2.17 |
CVE-2022-33681 | Anchore CVE | Medium | pulsar-zookeeper-utils-2.4.1 |
CVE-2022-33683 | Anchore CVE | Medium | pulsar-broker-common-2.4.1 |
CVE-1999-0289 | Anchore CVE | Medium | http-server-4.11.0 |
CVE-2022-0391 | Anchore CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
GHSA-98wm-3w3q-mw94 | Anchore CVE | Medium | snakeyaml-1.19 |
CVE-2022-24280 | Anchore CVE | Medium | pulsar-client-original-2.5.2 |
CVE-2019-17571 | Anchore CVE | Critical | bookkeeper-tools-framework-4.11.0 |
GHSA-wm47-8v5p-wjpj | Anchore CVE | Medium | netty-codec-http2-4.1.24.Final |
GHSA-c43q-5hpj-4crv | Anchore CVE | Medium | jersey-common-2.29.1 |
CVE-2022-33683 | Anchore CVE | Medium | pulsar-manager-* |
GHSA-m8wh-mqgf-rr8g | Anchore CVE | Medium | client-java-2.0.0 |
CVE-2018-12536 | Anchore CVE | Medium | jetty-http-9.4.10.v20180503 |
CVE-2021-22160 | Anchore CVE | Critical | pulsar-client-auth-athenz-2.5.2 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-client-9.4.10.v20180503 |
GHSA-v528-7hrm-frqp | Anchore CVE | Critical | json-smart-2.3 |
CVE-2017-7656 | Anchore CVE | High | jetty-servlet-9.4.10.v20180503 |
CVE-2021-22160 | Anchore CVE | Critical | pulsar-manager-* |
GHSA-8489-44mv-ggj8 | Anchore CVE | Medium | log4j-core-2.10.0 |
GHSA-mwcx-532g-8pq3 | Anchore CVE | High | jetty-server-9.4.10.v20180503 |
CVE-2020-13955 | Anchore CVE | Medium | calcite-linq4j-1.24.0 |
CVE-2021-28165 | Anchore CVE | High | jetty-client-9.4.10.v20180503 |
CVE-2022-33682 | Anchore CVE | Medium | pulsar-functions-instance-2.4.1 |
CVE-2017-7656 | Anchore CVE | High | jetty-servlets-9.4.10.v20180503 |
GHSA-gwp4-hfv6-p7hw | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2022-2047 | Anchore CVE | Low | jetty-client-9.4.10.v20180503 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-servlet-9.4.10.v20180503 |
GHSA-6wqp-v4v6-c87c | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-client-9.4.10.v20180503 |
GHSA-v3xw-c963-f5hc | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-r695-7vr9-jgc2 | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2021-22160 | Anchore CVE | Critical | pulsar-broker-2.4.1 |
CVE-2019-17571 | Anchore CVE | Critical | bookkeeper-common-allocator-4.11.0 |
CVE-2022-40897 | Anchore CVE | Medium | python3-setuptools-39.2.0-6.el8 |
GHSA-p6xc-xr62-6r2g | Anchore CVE | High | log4j-core-2.10.0 |
GHSA-h4h5-3hr4-j3g2 | Anchore CVE | Medium | protobuf-java-3.6.1 |
CVE-2022-33684 | Anchore CVE | High | pulsar-broker-common-2.4.1 |
CVE-2022-22970 | Anchore CVE | Medium | spring-core-5.0.6.release |
GHSA-5p34-5m6p-p58g | Anchore CVE | Critical | jackson-databind-2.9.5 |
CVE-2020-27216 | Anchore CVE | High | jetty-servlet-9.4.10.v20180503 |
CVE-2022-33681 | Anchore CVE | Medium | pulsar-client-auth-athenz-2.5.2 |
CVE-2022-24280 | Anchore CVE | Medium | pulsar-websocket-2.4.1 |
GHSA-7hfm-57qf-j43q | Anchore CVE | High | commons-compress-1.19 |
CVE-2022-33683 | Anchore CVE | Medium | pulsar-client-admin-original-2.5.2 |
GHSA-hhhw-99gj-p3c3 | Anchore CVE | Medium | snakeyaml-1.19 |
CVE-2018-12536 | Anchore CVE | Medium | jetty-servlet-9.4.10.v20180503 |
CVE-2021-22160 | Anchore CVE | Critical | pulsar-functions-runtime-2.4.1 |
CVE-2018-15756 | Anchore CVE | High | spring-core-5.0.6.release |
GHSA-8c4j-34r4-xr8g | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2021-28861 | Anchore CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2022-33684 | Anchore CVE | High | pulsar-client-original-2.5.2 |
GHSA-8w26-6f25-cm9x | Anchore CVE | High | jackson-databind-2.9.5 |
CVE-2021-22160 | Anchore CVE | Critical | pulsar-functions-secrets-2.4.1 |
CVE-2022-24280 | Anchore CVE | Medium | pulsar-functions-proto-2.4.1 |
CVE-2022-33681 | Anchore CVE | Medium | pulsar-client-api-2.5.2 |
GHSA-m6x4-97wx-4q27 | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-288c-cq4h-88gq | Anchore CVE | High | jackson-databind-2.9.5 |
GHSA-g5ww-5jh7-63cx | Anchore CVE | High | protobuf-java-2.4.1 |
CVE-2020-13955 | Anchore CVE | Medium | avatica-core-1.17.0 |
CVE-2022-24280 | Anchore CVE | Medium | pulsar-broker-2.4.1 |
CVE-2022-24280 | Anchore CVE | Medium | pulsar-common-2.5.2 |
GHSA-7rjr-3q55-vv33 | Anchore CVE | Critical | log4j-core-2.10.0 |
CVE-2022-32531 | Anchore CVE | Medium | bookkeeper-server-4.11.0 |
GHSA-qq48-m4jx-xqh8 | Anchore CVE | High | mybatis-3.5.4 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-server-9.4.10.v20180503 |
CVE-2022-24280 | Anchore CVE | Medium | pulsar-client-admin-original-2.5.2 |
CVE-2021-34428 | Anchore CVE | Low | jetty-xml-9.4.10.v20180503 |
CVE-2022-33684 | Anchore CVE | High | pulsar-client-admin-original-2.5.2 |
CVE-2022-2047 | Anchore CVE | Low | jetty-io-9.4.10.v20180503 |
GHSA-jfh8-c2jp-5v3q | Anchore CVE | Critical | log4j-core-2.10.0 |
2228a5b8f67210d4b73807855ea9f575 | Anchore Compliance | Critical | |
ca115b55f80aec9aad78321164d1707a | Anchore Compliance | Critical | |
0e7ea499780af3f8571c4bd37d736be8 | Anchore Compliance | Critical | |
f3d1c98e9519e29d1f3161075b9851fe | Anchore Compliance | Critical | |
09b5dd919f3fa36a102c4c6e57d762a3 | Anchore Compliance | Critical | |
5fb928edbee78ef6927224de69396a00 | Anchore Compliance | Critical | |
45de46fc2db256a1cdca93bc5fe89a82 | Anchore Compliance | Critical | |
d2f3303aa659520e49dbfb25a66e6b27 | Anchore Compliance | Critical | |
63a5da66d3385848b7da6c8a51ca8603 | Anchore Compliance | Critical | |
a5a7f7f66b9c8683c1bbcdcb37d34636 | Anchore Compliance | Critical | |
0a20889fcc88b1871eb7359384f9bc36 | Anchore Compliance | Critical | |
CVE-2022-3626 | Twistlock CVE | Medium | libtiff-4.0.9-26.el8_7 |
VAT: https://vat.dso.mil/vat/image?imageName=opensource/apache-pulsar/pulsar-manager&tag=0.2.0&branch=master
More information can be found in the failed pipeline located here: https://repo1.dso.mil/dsop/opensource/apache-pulsar/pulsar-manager/-/jobs/18705387
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the ~"Hardening::Approval" label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications -
Send approval request to Authorizing Official -
Close issue after approval from Authorizing Official
Note: If the above approval process is rejected for any reason, the
Approval
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theApproval
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.