chore(findings): opensource/apache/atlas
Summary
opensource/apache/atlas has 1580 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
CVE-2022-23307 | Twistlock CVE | High | log4j_log4j-1.2.17 |
CVE-2022-23302 | Twistlock CVE | High | log4j_log4j-1.2.17 |
CVE-2020-1718 | Twistlock CVE | High | org.keycloak_keycloak-core-6.0.1 |
CVE-2020-1714 | Twistlock CVE | High | org.keycloak_keycloak-core-6.0.1 |
CVE-2020-13936 | Twistlock CVE | High | org.apache.velocity_velocity-engine-core-2.0 |
CVE-2019-10199 | Twistlock CVE | High | org.keycloak_keycloak-core-6.0.1 |
CVE-2020-14389 | Twistlock CVE | High | org.keycloak_keycloak-core-6.0.1 |
CVE-2019-10201 | Twistlock CVE | High | org.keycloak_keycloak-core-6.0.1 |
PRISMA-2021-0081 | Twistlock CVE | High | org.apache.lucene_lucene-core-8.6.3 |
CVE-2022-25857 | Twistlock CVE | High | org.yaml_snakeyaml-1.18 |
CVE-2021-45105 | Twistlock CVE | High | org.apache.logging.log4j_log4j-core-2.13.2 |
CVE-2021-3637 | Twistlock CVE | High | org.keycloak_keycloak-core-6.0.1 |
CVE-2021-3632 | Twistlock CVE | High | org.keycloak_keycloak-core-6.0.1 |
CVE-2021-36090 | Twistlock CVE | High | org.apache.commons_commons-compress-1.19 |
CVE-2021-35517 | Twistlock CVE | High | org.apache.commons_commons-compress-1.19 |
CVE-2021-35516 | Twistlock CVE | High | org.apache.commons_commons-compress-1.19 |
CVE-2021-35515 | Twistlock CVE | High | org.apache.commons_commons-compress-1.19 |
CVE-2021-3513 | Twistlock CVE | High | org.keycloak_keycloak-core-6.0.1 |
CVE-2020-28491 | Twistlock CVE | High | com.fasterxml.jackson.dataformat_jackson-dataformat-cbor-2.6.7 |
CVE-2020-25649 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.10.3 |
CVE-2020-25649 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.6.7.2 |
CVE-2020-25649 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.10.1 |
CVE-2020-14366 | Twistlock CVE | High | org.keycloak_keycloak-core-6.0.1 |
CVE-2020-11612 | Twistlock CVE | High | io.netty_netty-codec-4.1.17 |
CVE-2020-11612 | Twistlock CVE | High | io.netty_netty-codec-4.1.45 |
CVE-2020-10758 | Twistlock CVE | High | org.keycloak_keycloak-core-6.0.1 |
CVE-2019-14832 | Twistlock CVE | High | org.keycloak_keycloak-core-6.0.1 |
CVE-2017-18640 | Twistlock CVE | High | org.yaml_snakeyaml-1.18 |
CVE-2016-4970 | Twistlock CVE | High | io.netty_netty-all-4.0.23 |
CVE-2021-20202 | Twistlock CVE | High | org.keycloak_keycloak-core-6.0.1 |
CVE-2019-10170 | Twistlock CVE | High | org.keycloak_keycloak-core-6.0.1 |
CVE-2019-10169 | Twistlock CVE | High | org.keycloak_keycloak-core-6.0.1 |
CVE-2022-45693 | Twistlock CVE | High | org.codehaus.jettison_jettison-1.3.7 |
CVE-2022-45693 | Twistlock CVE | High | org.codehaus.jettison_jettison-1.3.8 |
CVE-2022-45685 | Twistlock CVE | High | org.codehaus.jettison_jettison-1.3.8 |
CVE-2022-45685 | Twistlock CVE | High | org.codehaus.jettison_jettison-1.3.7 |
CVE-2022-40150 | Twistlock CVE | High | org.codehaus.jettison_jettison-1.3.7 |
CVE-2022-40150 | Twistlock CVE | High | org.codehaus.jettison_jettison-1.3.8 |
CVE-2022-37866 | Twistlock CVE | High | org.apache.ivy_ivy-2.4.0 |
CVE-2022-36364 | Twistlock CVE | High | org.apache.calcite.avatica_avatica-core-1.13.0 |
CVE-2022-31159 | Twistlock CVE | High | com.amazonaws_aws-java-sdk-s3-1.11.563 |
CVE-2022-25647 | Twistlock CVE | High | com.google.code.gson_gson-2.8.5 |
CVE-2021-31684 | Twistlock CVE | High | net.minidev_json-smart-1.3.2 |
CVE-2020-11612 | Twistlock CVE | High | io.netty_netty-handler-4.1.17 |
CVE-2020-11612 | Twistlock CVE | High | io.netty_netty-handler-4.1.45 |
CVE-2015-20107 | Twistlock CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2022-45061 | Twistlock CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2021-3827 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2021-44832 | Twistlock CVE | Medium | org.apache.logging.log4j_log4j-core-2.13.2 |
CVE-2021-4104 | Twistlock CVE | Medium | log4j_log4j-1.2.17 |
CVE-2022-41854 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.18 |
CVE-2022-38752 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.18 |
CVE-2022-38751 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.18 |
CVE-2022-38749 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.18 |
CVE-2022-1466 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2021-43797 | Twistlock CVE | Medium | io.netty_netty-all-4.0.23 |
CVE-2021-43797 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.47 |
CVE-2021-43797 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.45 |
CVE-2021-43797 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.17 |
CVE-2021-43797 | Twistlock CVE | Medium | io.netty_netty-all-4.1.48 |
CVE-2021-43797 | Twistlock CVE | Medium | io.netty_netty-3.10.6 |
CVE-2021-3733 | Twistlock CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2020-27838 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2021-20323 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2019-10219 | Twistlock CVE | Medium | org.hibernate_hibernate-validator-4.3.0 |
CVE-2021-21409 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.45 |
CVE-2021-21409 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.17 |
CVE-2021-21409 | Twistlock CVE | Medium | io.netty_netty-3.10.6 |
CVE-2021-21409 | Twistlock CVE | Medium | io.netty_netty-all-4.0.23 |
CVE-2021-21409 | Twistlock CVE | Medium | io.netty_netty-all-4.1.48 |
CVE-2021-21409 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.47 |
CVE-2021-21295 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.45 |
CVE-2021-21295 | Twistlock CVE | Medium | io.netty_netty-all-4.1.48 |
CVE-2021-21295 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.17 |
CVE-2021-21295 | Twistlock CVE | Medium | io.netty_netty-all-4.0.23 |
CVE-2021-21295 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.47 |
CVE-2021-21295 | Twistlock CVE | Medium | io.netty_netty-3.10.6 |
CVE-2020-1758 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2018-10237 | Twistlock CVE | Medium | com.google.guava_guava-11.0.2 |
CVE-2018-10237 | Twistlock CVE | Medium | com.google.guava_guava-18.0 |
CVE-2020-1744 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
PRISMA-2021-0182 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.27 |
PRISMA-2021-0182 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-servlet-9.4.31 |
PRISMA-2021-0182 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-servlet-9.4.27 |
PRISMA-2021-0182 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.31 |
PRISMA-2021-0182 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-servlet-9.3.28 |
PRISMA-2021-0182 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.3.28 |
CVE-2022-38750 | Twistlock CVE | Medium | org.yaml_snakeyaml-1.18 |
CVE-2022-30973 | Twistlock CVE | Medium | org.apache.tika_tika-core-1.24 |
CVE-2022-30126 | Twistlock CVE | Medium | org.apache.tika_tika-core-1.24 |
CVE-2022-25169 | Twistlock CVE | Medium | org.apache.tika_tika-core-1.24 |
CVE-2022-24823 | Twistlock CVE | Medium | io.netty_netty-all-4.1.48 |
CVE-2022-24823 | Twistlock CVE | Medium | io.netty_netty-3.10.6 |
CVE-2022-24823 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.45 |
CVE-2022-24823 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.17 |
CVE-2022-24823 | Twistlock CVE | Medium | io.netty_netty-all-4.0.23 |
CVE-2022-24823 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.47 |
CVE-2021-28657 | Twistlock CVE | Medium | org.apache.tika_tika-core-1.24 |
CVE-2021-21290 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.45 |
CVE-2021-21290 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.47 |
CVE-2021-21290 | Twistlock CVE | Medium | io.netty_netty-all-4.1.48 |
CVE-2021-21290 | Twistlock CVE | Medium | io.netty_netty-all-4.0.23 |
CVE-2021-21290 | Twistlock CVE | Medium | io.netty_netty-3.10.6 |
CVE-2021-21290 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.17 |
CVE-2020-9489 | Twistlock CVE | Medium | org.apache.tika_tika-core-1.24 |
CVE-2020-1698 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2020-1728 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2020-1727 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2020-1725 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2020-1697 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2022-0391 | Twistlock CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2021-28169 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.27 |
CVE-2021-28169 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.31 |
CVE-2021-28169 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.3.28 |
CVE-2020-27223 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.31 |
CVE-2020-27223 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.27 |
CVE-2020-13956 | Twistlock CVE | Medium | org.apache.httpcomponents_httpclient-4.5.3 |
CVE-2020-13956 | Twistlock CVE | Medium | org.apache.httpcomponents_httpclient-4.5.10 |
CVE-2020-10770 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2020-1694 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2020-14302 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2021-29425 | Twistlock CVE | Medium | commons-io_commons-io-2.5 |
CVE-2020-27218 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.31 |
CVE-2020-27218 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.27 |
CVE-2020-10776 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2019-3875 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2021-3856 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2020-1724 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2019-14820 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2020-27826 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
GHSA-755v-r4x4-qf7m | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2023-0105 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2023-0091 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2022-40149 | Twistlock CVE | Medium | org.codehaus.jettison_jettison-1.3.8 |
CVE-2022-40149 | Twistlock CVE | Medium | org.codehaus.jettison_jettison-1.3.7 |
CVE-2022-3171 | Twistlock CVE | Medium | com.google.protobuf_protobuf-java-3.7.1 |
CVE-2022-3171 | Twistlock CVE | Medium | com.google.protobuf_protobuf-java-3.11.4 |
CVE-2022-3171 | Twistlock CVE | Medium | com.google.protobuf_protobuf-java-2.5.0 |
CVE-2022-3171 | Twistlock CVE | Medium | com.google.protobuf_protobuf-java-3.11.0 |
CVE-2022-24823 | Twistlock CVE | Medium | io.netty_netty-codec-http-4.1.17 |
CVE-2022-24614 | Twistlock CVE | Medium | com.drewnoakes_metadata-extractor-2.11.0 |
CVE-2022-24613 | Twistlock CVE | Medium | com.drewnoakes_metadata-extractor-2.11.0 |
CVE-2022-23437 | Twistlock CVE | Medium | xerces_xercesImpl-2.12.0 |
CVE-2022-0225 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2021-43797 | Twistlock CVE | Medium | io.netty_netty-codec-http-4.1.17 |
CVE-2021-3754 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2021-37533 | Twistlock CVE | Medium | commons-net_commons-net-3.6 |
CVE-2021-37533 | Twistlock CVE | Medium | commons-net_commons-net-3.1 |
CVE-2021-31812 | Twistlock CVE | Medium | org.apache.pdfbox_pdfbox-2.0.17 |
CVE-2021-31811 | Twistlock CVE | Medium | org.apache.pdfbox_pdfbox-2.0.17 |
CVE-2021-28169 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-servlets-9.4.27 |
CVE-2021-27906 | Twistlock CVE | Medium | org.apache.pdfbox_pdfbox-2.0.17 |
CVE-2021-27807 | Twistlock CVE | Medium | org.apache.pdfbox_pdfbox-2.0.17 |
CVE-2021-27568 | Twistlock CVE | Medium | net.minidev_json-smart-2.3 |
CVE-2021-21290 | Twistlock CVE | Medium | io.netty_netty-codec-http-4.1.17 |
CVE-2020-27223 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.31 |
CVE-2020-27223 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.27 |
CVE-2020-27218 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.31 |
CVE-2020-27218 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.27 |
CVE-2020-15250 | Twistlock CVE | Medium | junit_junit-4.12 |
CVE-2020-14338 | Twistlock CVE | Medium | xerces_xercesImpl-2.12.0 |
CVE-2022-2047 | Anchore CVE | Low | jetty-server-9.4.31.v20200723 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
GHSA-crv7-7245-f45f | Anchore CVE | High | commons-compress-1.19 |
GHSA-7r82-7xv7-xcpj | Anchore CVE | Medium | httpclient-4.5.3 |
CVE-2021-34428 | Anchore CVE | Low | jetty-alpn-client-9.4.27.v20200227 |
GHSA-rv63-gqm8-9w8q | Anchore CVE | High | netty-all-4.0.23.Final |
GHSA-grg4-wf29-r9vv | Anchore CVE | High | netty-codec-4.1.45.Final |
CVE-2020-27218 | Anchore CVE | Medium | jetty-servlets-9.4.27.v20200227 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
GHSA-f32v-vf79-p29q | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2022-2047 | Anchore CVE | Low | jetty-xml-9.4.31.v20200723 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2007-4559 | Anchore CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
GHSA-7rf3-mqpx-h7xg | Anchore CVE | High | jettison-1.3.7 |
GHSA-cf8f-w2c5-p5jr | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
CVE-2021-44832 | Anchore CVE | Medium | log4j-web-2.13.2 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-start-9.4.27.v20200227 |
CVE-2020-27223 | Anchore CVE | Medium | start-9.4.27.v20200227 |
GHSA-rpj2-w6fr-79hc | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
CVE-2022-2047 | Anchore CVE | Low | jetty-alpn-server-9.4.27.v20200227 |
CVE-2011-4461 | Anchore CVE | Medium | jetty-6.1.26 |
GHSA-mph4-vhrx-mv67 | Anchore CVE | Medium | jackson-databind-2.4.0 |
CVE-2021-34428 | Anchore CVE | Low | start-9.4.27.v20200227 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-25.0-jre |
GHSA-8vf3-4w62-m3pq | Anchore CVE | Medium | keycloak-core-6.0.1 |
GHSA-xqfj-vm6h-2x34 | Anchore CVE | High | commons-compress-1.19 |
GHSA-fg3j-q579-v8x4 | Anchore CVE | Medium | pdfbox-2.0.17 |
GHSA-m9cj-v55f-8x26 | Anchore CVE | High | keycloak-core-6.0.1 |
GHSA-7grw-6pjh-jpc9 | Anchore CVE | Medium | pdfbox-2.0.17 |
GHSA-98wm-3w3q-mw94 | Anchore CVE | Medium | snakeyaml-1.18 |
GHSA-grg4-wf29-r9vv | Anchore CVE | High | netty-codec-4.1.45.Final |
CVE-2020-27223 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-servlet-9.4.27.v20200227 |
CVE-2021-34428 | Anchore CVE | Low | jetty-alpn-client-9.4.27.v20200227 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
GHSA-g3wg-6mcf-8jj6 | Anchore CVE | High | jetty-webapp-9.4.31.v20200723 |
GHSA-grg4-wf29-r9vv | Anchore CVE | High | netty-codec-4.1.17.Final |
CVE-2022-2047 | Anchore CVE | Low | jetty-io-9.4.31.v20200723 |
GHSA-h4h5-3hr4-j3g2 | Anchore CVE | Medium | protobuf-java-3.11.4 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
GHSA-wgmr-mf83-7x4j | Anchore CVE | High | http2-server-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
GHSA-3f7h-mf4q-vrm4 | Anchore CVE | Medium | woodstox-core-5.0.3 |
CVE-2022-0391 | Anchore CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2020-27218 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
GHSA-grg4-wf29-r9vv | Anchore CVE | High | netty-codec-4.1.45.Final |
GHSA-grr4-wv38-f68w | Anchore CVE | High | jettison-1.3.8 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-webapp-9.4.27.v20200227 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2022-2047 | Anchore CVE | Low | jetty-client-9.4.27.v20200227 |
CVE-2020-1945 | Anchore CVE | Medium | ant-1.8.2 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-xml-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-http-9.3.28.v20191105 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-18.0 |
CVE-2022-2047 | Anchore CVE | Low | jetty-deploy-9.4.27.v20200227 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-servlet-9.4.31.v20200723 |
CVE-2021-34428 | Anchore CVE | Low | jetty-jmx-9.4.27.v20200227 |
GHSA-56h3-78gp-v83r | Anchore CVE | Medium | jettison-1.3.7 |
GHSA-x27m-9w8j-5vcw | Anchore CVE | High | jettison-1.3.7 |
GHSA-755v-r4x4-qf7m | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2021-28169 | Anchore CVE | Medium | start-9.4.27.v20200227 |
CVE-2022-26336 | Anchore CVE | Medium | poi-scratchpad-4.1.1 |
CVE-2011-4461 | Anchore CVE | Medium | jetty-sslengine-6.1.26 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
GHSA-crv7-7245-f45f | Anchore CVE | High | commons-compress-1.19 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
GHSA-4gf2-xv97-63m2 | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
GHSA-mm9x-g8pc-w292 | Anchore CVE | High | netty-handler-4.1.17.Final |
GHSA-cmfg-87vq-g5g4 | Anchore CVE | Medium | jackson-databind-2.4.0 |
CVE-2022-26336 | Anchore CVE | Medium | poi-ooxml-schemas-4.1.1 |
CVE-2009-1523 | Anchore CVE | Medium | jetty-sslengine-6.1.26 |
GHSA-xf46-8vvp-4hxx | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2015-3254 | Anchore CVE | Medium | libthrift-0.9.2 |
GHSA-4jrv-ppp4-jm57 | Anchore CVE | High | gson-2.8.5 |
GHSA-269q-hmxg-m83q | Anchore CVE | Medium | netty-codec-http-4.1.17.Final |
CVE-2021-34428 | Anchore CVE | Low | jetty-http-9.4.31.v20200723 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
GHSA-4jrv-ppp4-jm57 | Anchore CVE | High | gson-2.8.5 |
GHSA-h4h5-3hr4-j3g2 | Anchore CVE | Medium | protobuf-java-3.11.4 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-xml-9.4.31.v20200723 |
CVE-2022-30973 | Anchore CVE | Medium | tika-java7-1.24 |
GHSA-5mcr-gq6c-3hq2 | Anchore CVE | Medium | netty-codec-http-4.1.17.Final |
GHSA-w7f5-jrpr-5c2m | Anchore CVE | High | avatica-core-1.13.0 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-29.0-jre |
GHSA-jh7q-5mwf-qvhw | Anchore CVE | Medium | keycloak-core-6.0.1 |
GHSA-7r82-7xv7-xcpj | Anchore CVE | Medium | httpclient-4.5.10 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-http-9.4.31.v20200723 |
CVE-2021-3737 | Anchore CVE | Low | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2021-28169 | Anchore CVE | Medium | jetty-jmx-9.3.28.v20191105 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-29.0-jre |
GHSA-x27m-9w8j-5vcw | Anchore CVE | High | jettison-1.3.8 |
GHSA-7hfm-57qf-j43q | Anchore CVE | High | commons-compress-1.19 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
GHSA-7r82-7xv7-xcpj | Anchore CVE | Medium | httpclient-4.5.5 |
GHSA-qpq9-jpv4-6gwr | Anchore CVE | High | keycloak-core-6.0.1 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-webapp-9.4.31.v20200723 |
GHSA-mm9x-g8pc-w292 | Anchore CVE | High | netty-handler-4.1.45.Final |
CVE-2021-28169 | Anchore CVE | Medium | jetty-webapp-9.4.27.v20200227 |
GHSA-mc84-pj99-q6hh | Anchore CVE | High | commons-compress-1.19 |
GHSA-v436-q368-hvgg | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2021-34428 | Anchore CVE | Low | jetty-servlet-9.3.28.v20191105 |
CVE-2021-34428 | Anchore CVE | Low | jetty-webapp-9.4.27.v20200227 |
GHSA-c4r9-r8fh-9vj2 | Anchore CVE | Medium | snakeyaml-1.18 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-xml-9.4.31.v20200723 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2021-34428 | Anchore CVE | Low | jetty-servlet-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-xml-9.4.27.v20200227 |
CVE-2021-34428 | Anchore CVE | Low | jetty-client-9.4.27.v20200227 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
GHSA-fqwf-pjwf-7vqv | Anchore CVE | High | jackson-databind-2.4.0 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
CVE-2022-2047 | Anchore CVE | Low | jetty-client-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
GHSA-mph4-vhrx-mv67 | Anchore CVE | Medium | jackson-databind-2.4.0 |
CVE-2022-2047 | Anchore CVE | Low | jetty-server-9.4.27.v20200227 |
GHSA-3w4v-rvc4-2xpw | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2021-34428 | Anchore CVE | Low | jetty-servlet-9.4.31.v20200723 |
GHSA-6xp6-fmc8-pmmr | Anchore CVE | High | keycloak-core-6.0.1 |
GHSA-hhhw-99gj-p3c3 | Anchore CVE | Medium | snakeyaml-1.18 |
GHSA-fqwf-pjwf-7vqv | Anchore CVE | High | jackson-databind-2.4.0 |
GHSA-fqc7-5xxc-ph7r | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2021-34428 | Anchore CVE | Low | jetty-http-9.4.27.v20200227 |
GHSA-f8vc-wfc8-hxqh | Anchore CVE | High | hadoop-common-3.2.0 |
GHSA-7r82-7xv7-xcpj | Anchore CVE | Medium | httpclient-4.5.5 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
GHSA-h4h5-3hr4-j3g2 | Anchore CVE | Medium | protobuf-java-3.11.0 |
GHSA-f8vc-wfc8-hxqh | Anchore CVE | High | hadoop-common-2.10.0 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
GHSA-m9cj-v55f-8x26 | Anchore CVE | High | keycloak-core-6.0.1 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
GHSA-cmfg-87vq-g5g4 | Anchore CVE | Medium | jackson-databind-2.4.0 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
GHSA-v528-7hrm-frqp | Anchore CVE | Medium | json-smart-2.3 |
GHSA-gwrp-pvrq-jmwv | Anchore CVE | Medium | commons-io-2.6 |
CVE-2021-34428 | Anchore CVE | Low | jetty-client-9.4.27.v20200227 |
CVE-2020-13955 | Twistlock CVE | Medium | org.apache.calcite_calcite-core-1.18.0 |
CVE-2015-0886 | Twistlock CVE | Medium | org.mindrot_jbcrypt-0.3 |
CVE-2019-9674 | Twistlock CVE | Low | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2021-3737 | Twistlock CVE | Low | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2018-20406 | Twistlock CVE | Low | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2021-34428 | Twistlock CVE | Low | org.eclipse.jetty_jetty-io-9.4.31 |
CVE-2021-34428 | Twistlock CVE | Low | org.eclipse.jetty_jetty-io-9.3.28 |
CVE-2021-34428 | Twistlock CVE | Low | org.eclipse.jetty_jetty-io-9.4.27 |
CVE-2022-33879 | Twistlock CVE | Low | org.apache.tika_tika-core-1.24 |
CVE-2020-8908 | Twistlock CVE | Low | com.google.guava_guava-25.0 |
CVE-2020-8908 | Twistlock CVE | Low | com.google.guava_guava-18.0 |
CVE-2020-8908 | Twistlock CVE | Low | com.google.guava_guava-29.0 |
CVE-2020-8908 | Twistlock CVE | Low | com.google.guava_guava-11.0.2 |
CVE-2020-8908 | Twistlock CVE | Low | com.google.guava_guava-25.1 |
CVE-2022-2047 | Twistlock CVE | Low | org.eclipse.jetty_jetty-io-9.4.31 |
CVE-2022-2047 | Twistlock CVE | Low | org.eclipse.jetty_jetty-io-9.3.28 |
CVE-2022-2047 | Twistlock CVE | Low | org.eclipse.jetty_jetty-io-9.4.27 |
CVE-2022-40152 | Twistlock CVE | Medium | com.fasterxml.woodstox_woodstox-core-5.0.3 |
CVE-2022-2047 | Twistlock CVE | Low | org.eclipse.jetty_jetty-http-9.3.28 |
CVE-2022-2047 | Twistlock CVE | Low | org.eclipse.jetty_jetty-http-9.4.31 |
CVE-2022-2047 | Twistlock CVE | Low | org.eclipse.jetty_jetty-http-9.4.27 |
CVE-2021-34428 | Twistlock CVE | Low | org.eclipse.jetty_jetty-server-9.3.28 |
CVE-2021-34428 | Twistlock CVE | Low | org.eclipse.jetty_jetty-server-9.4.31 |
CVE-2021-34428 | Twistlock CVE | Low | org.eclipse.jetty_jetty-server-9.4.27 |
PRISMA-2021-0055 | Twistlock CVE | Low | commons-codec_commons-codec-1.10 |
GHSA-grg4-wf29-r9vv | Anchore CVE | High | netty-codec-4.1.17.Final |
CVE-2021-28169 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
GHSA-p6xc-xr62-6r2g | Anchore CVE | High | log4j-core-2.13.2 |
GHSA-fp5r-v3w9-4333 | Anchore CVE | High | log4j-1.2.17 |
CVE-2022-2047 | Anchore CVE | Low | jetty-alpn-server-9.4.27.v20200227 |
GHSA-gwrp-pvrq-jmwv | Anchore CVE | Medium | commons-io-2.5 |
GHSA-cj7v-27pg-wf7q | Anchore CVE | Low | jetty-http-9.4.31.v20200723 |
GHSA-mm9x-g8pc-w292 | Anchore CVE | High | netty-handler-4.1.45.Final |
GHSA-grg4-wf29-r9vv | Anchore CVE | High | netty-codec-4.1.45.Final |
CVE-2020-27223 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
GHSA-m394-8rww-3jr7 | Anchore CVE | Medium | jetty-server-9.4.27.v20200227 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-11.0.2 |
CVE-2022-2047 | Anchore CVE | Low | jetty-xml-9.3.28.v20191105 |
CVE-2021-34428 | Anchore CVE | Low | jetty-http-9.4.31.v20200723 |
GHSA-f8vc-wfc8-hxqh | Anchore CVE | High | hadoop-common-2.10.0 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
GHSA-w37g-rhq8-7m4j | Anchore CVE | Medium | snakeyaml-1.18 |
GHSA-5mcr-gq6c-3hq2 | Anchore CVE | Medium | netty-codec-http-4.1.17.Final |
CVE-2020-27218 | Anchore CVE | Medium | jetty-http-9.4.31.v20200723 |
CVE-2022-2047 | Anchore CVE | Low | jetty-alpn-java-client-9.4.27.v20200227 |
GHSA-38cg-gg9j-q9j9 | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2021-31811 | Anchore CVE | Medium | pdfbox-tools-2.0.17 |
GHSA-crv7-7245-f45f | Anchore CVE | High | commons-compress-1.19 |
GHSA-mph4-vhrx-mv67 | Anchore CVE | Medium | jackson-databind-2.4.0 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2022-2047 | Anchore CVE | Low | jetty-webapp-9.4.27.v20200227 |
GHSA-m394-8rww-3jr7 | Anchore CVE | Medium | jetty-server-9.4.31.v20200723 |
CVE-2021-34428 | Anchore CVE | Low | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2021-34428 | Anchore CVE | Low | jetty-alpn-client-9.4.27.v20200227 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
GHSA-g3wg-6mcf-8jj6 | Anchore CVE | High | jetty-webapp-9.4.31.v20200723 |
CVE-2015-20107 | Anchore CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2020-9489 | Anchore CVE | Medium | tika-parsers-1.24 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-start-9.4.27.v20200227 |
GHSA-hxp5-8pgq-mgv9 | Anchore CVE | Medium | calcite-core-1.18.0 |
CVE-2022-2047 | Anchore CVE | Low | jetty-jmx-9.3.28.v20191105 |
GHSA-fx2c-96vj-985v | Anchore CVE | Medium | netty-codec-haproxy-4.1.78.Final |
CVE-2022-2047 | Anchore CVE | Low | jetty-servlet-9.4.31.v20200723 |
GHSA-c9x9-xv66-xp3v | Anchore CVE | High | keycloak-core-6.0.1 |
GHSA-p5xp-6vpf-jwvh | Anchore CVE | High | keycloak-core-6.0.1 |
CVE-2022-25647 | Anchore CVE | High | gson-2.2.4 |
CVE-2022-33879 | Anchore CVE | Low | tika-core-1.24 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-servlet-9.4.31.v20200723 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2021-34428 | Anchore CVE | Low | jetty-rewrite-9.4.27.v20200227 |
CVE-2022-30126 | Anchore CVE | Medium | tika-parsers-1.24 |
CVE-2021-34428 | Anchore CVE | Low | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2022-2047 | Anchore CVE | Low | jetty-alpn-java-client-9.4.27.v20200227 |
GHSA-mvr2-9pj6-7w5j | Anchore CVE | Medium | guava-18.0 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-webapp-9.4.31.v20200723 |
GHSA-cgp8-4m63-fhh5 | Anchore CVE | Medium | commons-net-3.1 |
GHSA-9h6p-92jq-888x | Anchore CVE | Medium | jbcrypt-0.3m |
CVE-2021-34428 | Anchore CVE | Low | jetty-servlets-9.4.27.v20200227 |
GHSA-9vjp-v76f-g363 | Anchore CVE | High | netty-codec-4.1.45.Final |
GHSA-cmfg-87vq-g5g4 | Anchore CVE | Medium | jackson-databind-2.4.0 |
GHSA-mph4-vhrx-mv67 | Anchore CVE | Medium | jackson-databind-2.4.0 |
CVE-2021-34428 | Anchore CVE | Low | jetty-io-9.4.27.v20200227 |
GHSA-fg2v-w576-w4v3 | Anchore CVE | High | json-smart-1.3.2 |
GHSA-xfqh-7356-vqjj | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
CVE-2021-28657 | Anchore CVE | Medium | tika-xmp-1.24 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
GHSA-8489-44mv-ggj8 | Anchore CVE | Medium | log4j-core-2.13.2 |
GHSA-845h-985r-jrqh | Anchore CVE | Medium | hibernate-validator-4.3.0.Final |
CVE-2021-28169 | Anchore CVE | Medium | jetty-servlet-9.4.31.v20200723 |
CVE-2022-2047 | Anchore CVE | Low | jetty-jmx-9.4.27.v20200227 |
CVE-2022-2047 | Anchore CVE | Low | jetty-xml-9.4.27.v20200227 |
CVE-2022-30973 | Anchore CVE | Medium | tika-xmp-1.24 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-http-9.4.31.v20200723 |
CVE-2022-2047 | Anchore CVE | Low | jetty-deploy-9.4.27.v20200227 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2022-2047 | Anchore CVE | Low | jetty-server-9.4.31.v20200723 |
GHSA-rvwf-54qp-4r6v | Anchore CVE | High | snakeyaml-1.18 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-29.0-jre |
GHSA-7m27-3587-83xf | Anchore CVE | High | keycloak-core-6.0.1 |
CVE-2022-33879 | Anchore CVE | Low | tika-java7-1.24 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
CVE-2022-30973 | Anchore CVE | Medium | tika-parsers-1.24 |
GHSA-gwcr-j4wh-j3cq | Anchore CVE | Medium | jetty-servlets-9.4.27.v20200227 |
CVE-2022-2047 | Anchore CVE | Low | jetty-io-9.4.27.v20200227 |
GHSA-xqfj-vm6h-2x34 | Anchore CVE | High | commons-compress-1.19 |
GHSA-7rf3-mqpx-h7xg | Anchore CVE | High | jettison-1.3.7 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-xml-9.4.31.v20200723 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-webapp-9.4.31.v20200723 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2022-2047 | Anchore CVE | Low | jetty-alpn-java-client-9.4.27.v20200227 |
GHSA-fqwf-pjwf-7vqv | Anchore CVE | High | jackson-databind-2.4.0 |
GHSA-mph4-vhrx-mv67 | Anchore CVE | Medium | jackson-databind-2.4.0 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-io-9.4.31.v20200723 |
CVE-2022-24823 | Anchore CVE | Medium | netty-3.10.6.Final |
GHSA-cmfg-87vq-g5g4 | Anchore CVE | Medium | jackson-databind-2.6.7.2 |
CVE-2022-25647 | Anchore CVE | High | gson-2.2.4 |
GHSA-m6cp-vxjx-65j6 | Anchore CVE | Low | jetty-server-9.3.28.v20191105 |
GHSA-9w3m-gqgf-c4p9 | Anchore CVE | Medium | snakeyaml-1.18 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-io-9.4.31.v20200723 |
CVE-2021-28657 | Anchore CVE | Medium | tika-parsers-1.24 |
GHSA-gwrp-pvrq-jmwv | Anchore CVE | Medium | commons-io-2.6 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-webapp-9.4.27.v20200227 |
GHSA-fqwf-pjwf-7vqv | Anchore CVE | High | jackson-databind-2.4.0 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
CVE-2022-2047 | Anchore CVE | Low | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2021-34428 | Anchore CVE | Low | jetty-webapp-9.3.28.v20191105 |
GHSA-38cg-gg9j-q9j9 | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2022-2047 | Anchore CVE | Low | jetty-alpn-client-9.4.27.v20200227 |
GHSA-cmfg-87vq-g5g4 | Anchore CVE | Medium | jackson-databind-2.4.0 |
GHSA-cmfg-87vq-g5g4 | Anchore CVE | Medium | jackson-databind-2.6.7.2 |
CVE-2020-13955 | Anchore CVE | Medium | calcite-linq4j-1.18.0 |
CVE-2021-34428 | Anchore CVE | Low | jetty-io-9.3.28.v20191105 |
CVE-2021-45105 | Anchore CVE | Medium | log4j-web-2.13.2 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-http-9.4.31.v20200723 |
GHSA-h4h5-3hr4-j3g2 | Anchore CVE | Medium | protobuf-java-2.5.0 |
GHSA-cf8f-w2c5-p5jr | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-servlet-9.4.31.v20200723 |
CVE-2021-27807 | Anchore CVE | Medium | pdfbox-tools-2.0.17 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
GHSA-xf46-8vvp-4hxx | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2022-2047 | Anchore CVE | Low | jetty-servlet-9.3.28.v20191105 |
CVE-2009-1523 | Anchore CVE | Medium | jetty-6.1.26 |
GHSA-fp5r-v3w9-4333 | Anchore CVE | High | log4j-1.2.17 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
GHSA-hxp5-8pgq-mgv9 | Anchore CVE | Medium | calcite-core-1.18.0 |
CVE-2022-2047 | Anchore CVE | Low | jetty-io-9.3.28.v20191105 |
GHSA-4jrv-ppp4-jm57 | Anchore CVE | High | gson-2.8.5 |
GHSA-mm9x-g8pc-w292 | Anchore CVE | High | netty-handler-4.1.45.Final |
CVE-2020-13949 | Anchore CVE | High | libthrift-0.13.0 |
CVE-2022-2047 | Anchore CVE | Low | jetty-webapp-9.4.31.v20200723 |
CVE-2022-2047 | Anchore CVE | Low | jetty-alpn-client-9.4.27.v20200227 |
CVE-2022-2047 | Anchore CVE | Low | jetty-rewrite-9.4.27.v20200227 |
CVE-2021-34428 | Anchore CVE | Low | jetty-io-9.4.27.v20200227 |
CVE-2022-2047 | Anchore CVE | Low | jetty-alpn-java-server-9.4.27.v20200227 |
GHSA-9vjp-v76f-g363 | Anchore CVE | High | netty-codec-4.1.45.Final |
CVE-2020-27218 | Anchore CVE | Medium | jetty-webapp-9.4.31.v20200723 |
GHSA-gwrp-pvrq-jmwv | Anchore CVE | Medium | commons-io-2.6 |
GHSA-h4h5-3hr4-j3g2 | Anchore CVE | Medium | protobuf-java-3.7.1 |
CVE-2022-30126 | Anchore CVE | Medium | tika-xmp-1.24 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
CVE-2021-34428 | Anchore CVE | Low | jetty-io-9.4.27.v20200227 |
GHSA-w9p3-5cr8-m3jj | Anchore CVE | High | log4j-1.2.17 |
GHSA-56h3-78gp-v83r | Anchore CVE | Medium | jettison-1.3.8 |
CVE-2022-2047 | Anchore CVE | Low | jetty-rewrite-9.4.27.v20200227 |
GHSA-wx5j-54mm-rqqq | Anchore CVE | Medium | netty-codec-http-4.1.17.Final |
CVE-2021-28169 | Anchore CVE | Medium | jetty-server-9.4.31.v20200723 |
CVE-2020-9489 | Anchore CVE | Medium | tika-core-1.24 |
GHSA-3f7h-mf4q-vrm4 | Anchore CVE | Medium | woodstox-core-5.0.3 |
GHSA-gwrp-pvrq-jmwv | Anchore CVE | Medium | commons-io-2.6 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
GHSA-w9p3-5cr8-m3jj | Anchore CVE | High | log4j-1.2.17 |
GHSA-58jx-f5rf-qgqf | Anchore CVE | High | hadoop-yarn-server-common-2.10.0 |
CVE-2021-34428 | Anchore CVE | Low | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2021-27906 | Anchore CVE | Medium | pdfbox-tools-2.0.17 |
GHSA-h4h5-3hr4-j3g2 | Anchore CVE | Medium | protobuf-java-3.11.4 |
GHSA-86wm-rrjm-8wh8 | Anchore CVE | Medium | jetty-server-9.4.27.v20200227 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2012-1574 | Anchore CVE | Medium | hadoop-shaded-protobuf_3_7-1.0.0 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-xml-9.4.31.v20200723 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
GHSA-9h6p-92jq-888x | Anchore CVE | Medium | jbcrypt-0.3m |
CVE-2021-28169 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-29.0-jre |
CVE-2020-27218 | Anchore CVE | Medium | jetty-servlets-9.4.27.v20200227 |
GHSA-cmfg-87vq-g5g4 | Anchore CVE | Medium | jackson-databind-2.4.0 |
GHSA-mm9x-g8pc-w292 | Anchore CVE | High | netty-handler-4.1.45.Final |
GHSA-grg4-wf29-r9vv | Anchore CVE | High | netty-codec-4.1.47.Final |
CVE-2021-34428 | Anchore CVE | Low | jetty-io-9.4.31.v20200723 |
GHSA-mjmj-j48q-9wg2 | Anchore CVE | High | snakeyaml-1.18 |
GHSA-mc84-pj99-q6hh | Anchore CVE | High | commons-compress-1.19 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-25.1-jre |
CVE-2020-27218 | Anchore CVE | Medium | jetty-io-9.4.31.v20200723 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-29.0-jre |
CVE-2022-2047 | Anchore CVE | Low | jetty-rewrite-9.4.27.v20200227 |
CVE-2019-0205 | Anchore CVE | High | libthrift-0.9.2 |
CVE-2022-25169 | Anchore CVE | Medium | tika-java7-1.24 |
CVE-2021-3733 | Anchore CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2020-27218 | Anchore CVE | Medium | jetty-io-9.4.31.v20200723 |
CVE-2022-37866 | Anchore CVE | High | ivy-2.4.0 |
GHSA-wgmr-mf83-7x4j | Anchore CVE | High | http2-server-9.4.27.v20200227 |
GHSA-4fgq-gq9g-3rw7 | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
GHSA-fqwf-pjwf-7vqv | Anchore CVE | High | jackson-databind-2.4.0 |
CVE-2021-34428 | Anchore CVE | Low | jetty-http-9.4.27.v20200227 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2020-27218 | Anchore CVE | Medium | start-9.4.27.v20200227 |
CVE-2022-2047 | Anchore CVE | Low | jetty-io-9.4.31.v20200723 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2021-34428 | Anchore CVE | Low | jetty-rewrite-9.4.27.v20200227 |
CVE-2021-34428 | Anchore CVE | Low | jetty-jmx-9.4.27.v20200227 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-servlets-9.4.27.v20200227 |
GHSA-h4h5-3hr4-j3g2 | Anchore CVE | Medium | protobuf-java-2.5.0 |
CVE-2022-2047 | Anchore CVE | Low | jetty-servlets-9.4.27.v20200227 |
CVE-2022-25169 | Anchore CVE | Medium | tika-core-1.24 |
GHSA-rpj2-w6fr-79hc | Anchore CVE | Medium | keycloak-core-6.0.1 |
GHSA-p2v9-g2qv-p635 | Anchore CVE | Medium | netty-handler-4.1.17.Final |
GHSA-x27m-9w8j-5vcw | Anchore CVE | High | jettison-1.3.7 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
GHSA-mph4-vhrx-mv67 | Anchore CVE | Medium | jackson-databind-2.4.0 |
GHSA-p5pg-wm9q-8v6r | Anchore CVE | Medium | metadata-extractor-2.11.0 |
GHSA-grg4-wf29-r9vv | Anchore CVE | High | netty-codec-4.1.47.Final |
CVE-2012-1574 | Anchore CVE | Medium | hadoop-shaded-protobuf_3_7-1.0.0 |
GHSA-hfrx-6qgj-fp6c | Anchore CVE | High | commons-fileupload-1.3.3 |
GHSA-v528-7hrm-frqp | Anchore CVE | Medium | json-smart-2.3 |
CVE-2022-2047 | Anchore CVE | Low | jetty-client-9.4.27.v20200227 |
CVE-2022-2047 | Anchore CVE | Low | start-9.4.27.v20200227 |
GHSA-cmfg-87vq-g5g4 | Anchore CVE | Medium | jackson-databind-2.4.0 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
CVE-2021-34428 | Anchore CVE | Low | jetty-rewrite-9.4.27.v20200227 |
GHSA-w7f5-jrpr-5c2m | Anchore CVE | High | avatica-core-1.13.0 |
CVE-2011-4461 | Anchore CVE | Medium | jetty-sslengine-6.1.26 |
CVE-2021-34428 | Anchore CVE | Low | jetty-webapp-9.4.31.v20200723 |
CVE-2022-2047 | Anchore CVE | Low | jetty-alpn-client-9.4.27.v20200227 |
GHSA-7hfm-57qf-j43q | Anchore CVE | High | commons-compress-1.19 |
GHSA-9vjp-v76f-g363 | Anchore CVE | High | netty-codec-4.1.47.Final |
GHSA-gwrp-pvrq-jmwv | Anchore CVE | Medium | commons-io-2.6 |
GHSA-fqwf-pjwf-7vqv | Anchore CVE | High | jackson-databind-2.4.0 |
CVE-2021-34428 | Anchore CVE | Low | jetty-servlets-9.4.27.v20200227 |
CVE-2022-30126 | Anchore CVE | Medium | tika-core-1.24 |
GHSA-755v-r4x4-qf7m | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-servlet-9.4.27.v20200227 |
GHSA-7hfm-57qf-j43q | Anchore CVE | High | commons-compress-1.19 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-http-9.4.31.v20200723 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-xml-9.4.27.v20200227 |
CVE-2009-1523 | Anchore CVE | Medium | jetty-sslengine-6.1.26 |
CVE-2021-34428 | Anchore CVE | Low | jetty-xml-9.3.28.v20191105 |
GHSA-wx5j-54mm-rqqq | Anchore CVE | Medium | netty-codec-http-4.1.17.Final |
CVE-2022-33879 | Anchore CVE | Low | tika-parsers-1.24 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-29.0-jre |
CVE-2021-28169 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2022-2047 | Anchore CVE | Low | jetty-start-9.4.27.v20200227 |
GHSA-xqfj-vm6h-2x34 | Anchore CVE | High | commons-compress-1.19 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
GHSA-cj7v-27pg-wf7q | Anchore CVE | Low | jetty-http-9.4.27.v20200227 |
CVE-2022-2047 | Anchore CVE | Low | jetty-servlet-9.4.27.v20200227 |
CVE-2021-34428 | Anchore CVE | Low | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
GHSA-mc84-pj99-q6hh | Anchore CVE | High | commons-compress-1.19 |
CVE-2022-26336 | Anchore CVE | Medium | poi-ooxml-4.1.1 |
GHSA-hfrx-6qgj-fp6c | Anchore CVE | High | commons-fileupload-1.3.3 |
CVE-2018-11798 | Anchore CVE | Medium | libthrift-0.9.2 |
CVE-2021-44832 | Anchore CVE | Medium | log4j-slf4j-impl-2.13.2 |
CVE-2022-2047 | Anchore CVE | Low | jetty-client-9.4.27.v20200227 |
CVE-2018-1320 | Anchore CVE | High | libthrift-0.9.2 |
GHSA-fqwf-pjwf-7vqv | Anchore CVE | High | jackson-databind-2.4.0 |
GHSA-mc84-pj99-q6hh | Anchore CVE | High | commons-compress-1.19 |
CVE-2021-34428 | Anchore CVE | Low | jetty-servlet-9.4.31.v20200723 |
CVE-2022-2047 | Anchore CVE | Low | jetty-server-9.3.28.v20191105 |
GHSA-fqwf-pjwf-7vqv | Anchore CVE | High | jackson-databind-2.6.7.2 |
GHSA-cj7v-27pg-wf7q | Anchore CVE | Low | jetty-http-9.4.27.v20200227 |
CVE-2022-2047 | Anchore CVE | Low | jetty-webapp-9.4.31.v20200723 |
CVE-2021-34428 | Anchore CVE | Low | jetty-alpn-java-client-9.4.27.v20200227 |
GHSA-p6xc-xr62-6r2g | Anchore CVE | High | log4j-core-2.13.2 |
CVE-2022-2047 | Anchore CVE | Low | jetty-jmx-9.4.27.v20200227 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
GHSA-4gf2-xv97-63m2 | Anchore CVE | Medium | keycloak-core-6.0.1 |
GHSA-xqfj-vm6h-2x34 | Anchore CVE | High | commons-compress-1.19 |
CVE-2021-28657 | Anchore CVE | Medium | tika-java7-1.24 |
CVE-2022-45061 | Anchore CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2020-27218 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-server-9.4.27.v20200227 |
GHSA-crv7-7245-f45f | Anchore CVE | High | commons-compress-1.19 |
GHSA-fqwf-pjwf-7vqv | Anchore CVE | High | jackson-databind-2.6.7.2 |
GHSA-3w4v-rvc4-2xpw | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2021-34428 | Anchore CVE | Low | jetty-deploy-9.4.27.v20200227 |
GHSA-jh7q-5mwf-qvhw | Anchore CVE | Medium | keycloak-core-6.0.1 |
GHSA-8489-44mv-ggj8 | Anchore CVE | Medium | log4j-core-2.13.2 |
CVE-2021-34428 | Anchore CVE | Low | jetty-xml-9.4.27.v20200227 |
GHSA-cj7v-27pg-wf7q | Anchore CVE | Low | jetty-http-9.4.31.v20200723 |
GHSA-8vf3-4w62-m3pq | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-servlets-9.4.27.v20200227 |
CVE-2021-34428 | Anchore CVE | Low | jetty-start-9.4.27.v20200227 |
CVE-2022-25169 | Anchore CVE | Medium | tika-parsers-1.24 |
GHSA-qpq9-jpv4-6gwr | Anchore CVE | High | keycloak-core-6.0.1 |
GHSA-grr4-wv38-f68w | Anchore CVE | High | jettison-1.3.7 |
CVE-2022-2047 | Anchore CVE | Low | jetty-alpn-client-9.4.27.v20200227 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-servlets-9.4.27.v20200227 |
GHSA-v436-q368-hvgg | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2021-31812 | Anchore CVE | Medium | pdfbox-tools-2.0.17 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
GHSA-845h-985r-jrqh | Anchore CVE | Medium | hibernate-validator-4.3.0.Final |
GHSA-3gg7-9q2x-79fc | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2022-24823 | Anchore CVE | Medium | netty-3.10.6.Final |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-25.0-jre |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-25.1-jre |
CVE-2022-33879 | Anchore CVE | Low | tika-xmp-1.24 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
GHSA-4v6p-cxf9-98rf | Anchore CVE | Medium | metadata-extractor-2.11.0 |
CVE-2022-30126 | Anchore CVE | Medium | tika-java7-1.24 |
GHSA-6xp6-fmc8-pmmr | Anchore CVE | High | keycloak-core-6.0.1 |
CVE-2021-44832 | Anchore CVE | Medium | log4j-slf4j-impl-2.13.2 |
GHSA-fqc7-5xxc-ph7r | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2022-2047 | Anchore CVE | Low | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2015-3254 | Anchore CVE | Medium | libthrift-0.9.2 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
GHSA-h4h5-3hr4-j3g2 | Anchore CVE | Medium | protobuf-java-3.7.1 |
CVE-2022-2047 | Anchore CVE | Low | jetty-deploy-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-xml-9.3.28.v20191105 |
CVE-2022-25647 | Anchore CVE | High | gson-2.2.4 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2022-2047 | Anchore CVE | Low | jetty-servlet-9.4.31.v20200723 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
GHSA-cgp8-4m63-fhh5 | Anchore CVE | Medium | commons-net-3.6 |
CVE-2020-13955 | Anchore CVE | Medium | calcite-linq4j-1.18.0 |
GHSA-fg2v-w576-w4v3 | Anchore CVE | High | json-smart-1.3.2 |
CVE-2021-34428 | Anchore CVE | Low | jetty-jmx-9.3.28.v20191105 |
GHSA-mph4-vhrx-mv67 | Anchore CVE | Medium | jackson-databind-2.4.0 |
GHSA-f32v-vf79-p29q | Anchore CVE | Medium | keycloak-core-6.0.1 |
GHSA-mm9x-g8pc-w292 | Anchore CVE | High | netty-handler-4.1.17.Final |
GHSA-g3wg-6mcf-8jj6 | Anchore CVE | High | jetty-webapp-9.4.27.v20200227 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-servlet-9.4.31.v20200723 |
CVE-2012-5370 | Anchore CVE | Medium | jruby-complete-9.1.17.0 |
GHSA-7rf3-mqpx-h7xg | Anchore CVE | High | jettison-1.3.8 |
GHSA-g3wg-6mcf-8jj6 | Anchore CVE | High | jetty-webapp-9.3.28.v20191105 |
GHSA-fqwf-pjwf-7vqv | Anchore CVE | High | jackson-databind-2.4.0 |
GHSA-c28r-hw5m-5gv3 | Anchore CVE | High | aws-java-sdk-s3-1.11.563 |
GHSA-c9x9-xv66-xp3v | Anchore CVE | High | keycloak-core-6.0.1 |
GHSA-p5xp-6vpf-jwvh | Anchore CVE | High | keycloak-core-6.0.1 |
GHSA-mvr2-9pj6-7w5j | Anchore CVE | Medium | guava-11.0.2 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
GHSA-2h3j-m7gr-25xj | Anchore CVE | Medium | pdfbox-2.0.17 |
CVE-2022-2047 | Anchore CVE | Low | jetty-alpn-server-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-servlet-9.4.31.v20200723 |
GHSA-4jrv-ppp4-jm57 | Anchore CVE | High | gson-2.8.5 |
GHSA-cmfg-87vq-g5g4 | Anchore CVE | Medium | jackson-databind-2.4.0 |
GHSA-p2v9-g2qv-p635 | Anchore CVE | Medium | netty-handler-4.1.17.Final |
GHSA-mjmj-j48q-9wg2 | Anchore CVE | High | snakeyaml-1.32 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
GHSA-hxp5-8pgq-mgv9 | Anchore CVE | Medium | calcite-core-1.18.0 |
CVE-2021-34428 | Anchore CVE | Low | jetty-webapp-9.4.31.v20200723 |
CVE-2021-34428 | Anchore CVE | Low | jetty-jmx-9.4.27.v20200227 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
GHSA-p979-4mfw-53vg | Anchore CVE | High | netty-all-4.0.23.Final |
GHSA-6vqp-h455-42mr | Anchore CVE | Medium | pdfbox-2.0.17 |
GHSA-xfqh-7356-vqjj | Anchore CVE | Medium | keycloak-core-6.0.1 |
GHSA-7hfm-57qf-j43q | Anchore CVE | High | commons-compress-1.19 |
GHSA-cgp8-4m63-fhh5 | Anchore CVE | Medium | commons-net-3.6 |
CVE-2020-9489 | Anchore CVE | Medium | tika-java7-1.24 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
GHSA-cj7v-27pg-wf7q | Anchore CVE | Low | jetty-http-9.3.28.v20191105 |
GHSA-wgmr-mf83-7x4j | Anchore CVE | High | http2-server-9.4.27.v20200227 |
CVE-2021-45105 | Anchore CVE | Medium | log4j-slf4j-impl-2.13.2 |
CVE-2015-4035 | Anchore CVE | High | xz-1.8 |
GHSA-fqwf-pjwf-7vqv | Anchore CVE | High | jackson-databind-2.4.0 |
CVE-2021-34428 | Anchore CVE | Low | jetty-http-9.4.27.v20200227 |
GHSA-m6cp-vxjx-65j6 | Anchore CVE | Low | jetty-server-9.4.31.v20200723 |
GHSA-9vjp-v76f-g363 | Anchore CVE | High | netty-codec-4.1.45.Final |
CVE-2021-34428 | Anchore CVE | Low | jetty-alpn-server-9.4.27.v20200227 |
CVE-2022-26336 | Anchore CVE | Medium | poi-4.1.1 |
CVE-2022-25169 | Anchore CVE | Medium | tika-xmp-1.24 |
GHSA-7r82-7xv7-xcpj | Anchore CVE | Medium | httpclient-4.5.10 |
GHSA-m6cp-vxjx-65j6 | Anchore CVE | Low | jetty-server-9.4.31.v20200723 |
GHSA-86wm-rrjm-8wh8 | Anchore CVE | Medium | jetty-server-9.4.31.v20200723 |
GHSA-gwcr-j4wh-j3cq | Anchore CVE | Medium | jetty-servlets-9.4.27.v20200227 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
CVE-2021-34428 | Anchore CVE | Low | jetty-servlets-9.4.27.v20200227 |
GHSA-3f7h-mf4q-vrm4 | Anchore CVE | Medium | woodstox-core-5.0.3 |
GHSA-3mc7-4q67-w48m | Anchore CVE | High | snakeyaml-1.18 |
GHSA-fx2c-96vj-985v | Anchore CVE | Medium | netty-codec-haproxy-4.1.78.Final |
GHSA-3f7h-mf4q-vrm4 | Anchore CVE | Medium | woodstox-core-5.0.3 |
CVE-2020-13949 | Anchore CVE | High | libthrift-0.13.0 |
CVE-2022-2047 | Anchore CVE | Low | jetty-servlets-9.4.27.v20200227 |
CVE-2021-34428 | Anchore CVE | Low | jetty-xml-9.4.31.v20200723 |
GHSA-3gg7-9q2x-79fc | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2021-34428 | Anchore CVE | Low | jetty-deploy-9.4.27.v20200227 |
CVE-2022-2047 | Anchore CVE | Low | jetty-servlets-9.4.27.v20200227 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
CVE-2022-2047 | Anchore CVE | Low | jetty-webapp-9.3.28.v20191105 |
GHSA-9vjp-v76f-g363 | Anchore CVE | High | netty-codec-4.1.17.Final |
CVE-2021-34428 | Anchore CVE | Low | jetty-io-9.4.31.v20200723 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2021-34428 | Anchore CVE | Low | jetty-alpn-java-client-9.4.27.v20200227 |
GHSA-7m27-3587-83xf | Anchore CVE | High | keycloak-core-6.0.1 |
GHSA-cgp8-4m63-fhh5 | Anchore CVE | Medium | commons-net-3.1 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-io-9.4.31.v20200723 |
CVE-2022-2047 | Anchore CVE | Low | jetty-jmx-9.4.27.v20200227 |
CVE-2021-34428 | Anchore CVE | Low | jetty-alpn-server-9.4.27.v20200227 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
GHSA-h4h5-3hr4-j3g2 | Anchore CVE | Medium | protobuf-java-2.5.0 |
CVE-2021-34428 | Anchore CVE | Low | jetty-client-9.4.27.v20200227 |
GHSA-gwcr-j4wh-j3cq | Anchore CVE | Medium | jetty-servlets-9.4.27.v20200227 |
CVE-2022-2047 | Anchore CVE | Low | jetty-xml-9.4.31.v20200723 |
CVE-2020-13955 | Anchore CVE | Medium | calcite-linq4j-1.18.0 |
CVE-2021-45105 | Anchore CVE | Medium | log4j-slf4j-impl-2.13.2 |
GHSA-grr4-wv38-f68w | Anchore CVE | High | jettison-1.3.7 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-servlet-9.4.27.v20200227 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-xml-9.4.31.v20200723 |
CVE-2018-11798 | Anchore CVE | Medium | libthrift-0.9.2 |
GHSA-56h3-78gp-v83r | Anchore CVE | Medium | jettison-1.3.7 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-io-9.4.31.v20200723 |
GHSA-7hfm-57qf-j43q | Anchore CVE | High | commons-compress-1.19 |
CVE-2018-1320 | Anchore CVE | High | libthrift-0.9.2 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
GHSA-xqfj-vm6h-2x34 | Anchore CVE | High | commons-compress-1.19 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-http-9.4.31.v20200723 |
GHSA-cj7v-27pg-wf7q | Anchore CVE | Low | jetty-http-9.4.27.v20200227 |
GHSA-86wm-rrjm-8wh8 | Anchore CVE | Medium | jetty-server-9.4.31.v20200723 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-25.0-jre |
CVE-2021-28169 | Anchore CVE | Medium | jetty-servlet-9.3.28.v20191105 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-io-9.3.28.v20191105 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
GHSA-mph4-vhrx-mv67 | Anchore CVE | Medium | jackson-databind-2.4.0 |
GHSA-4jrv-ppp4-jm57 | Anchore CVE | High | gson-2.8.5 |
GHSA-fp5r-v3w9-4333 | Anchore CVE | High | log4j-1.2.17 |
CVE-2021-34428 | Anchore CVE | Low | jetty-http-9.3.28.v20191105 |
GHSA-c28r-hw5m-5gv3 | Anchore CVE | High | aws-java-sdk-s3-1.11.563 |
CVE-2022-2047 | Anchore CVE | Low | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2020-9489 | Anchore CVE | Medium | tika-xmp-1.24 |
GHSA-fqwf-pjwf-7vqv | Anchore CVE | High | jackson-databind-2.4.0 |
GHSA-mc84-pj99-q6hh | Anchore CVE | High | commons-compress-1.19 |
GHSA-mph4-vhrx-mv67 | Anchore CVE | Medium | jackson-databind-2.6.7.2 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-start-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-webapp-9.3.28.v20191105 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
GHSA-cmfg-87vq-g5g4 | Anchore CVE | Medium | jackson-databind-2.4.0 |
GHSA-h4h5-3hr4-j3g2 | Anchore CVE | Medium | protobuf-java-3.11.4 |
GHSA-crv7-7245-f45f | Anchore CVE | High | commons-compress-1.19 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2019-0205 | Anchore CVE | High | libthrift-0.9.2 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-server-9.3.28.v20191105 |
CVE-2021-28657 | Anchore CVE | Medium | tika-core-1.24 |
GHSA-4jrv-ppp4-jm57 | Anchore CVE | High | gson-2.8.5 |
GHSA-mph4-vhrx-mv67 | Anchore CVE | Medium | jackson-databind-2.4.0 |
CVE-2021-34428 | Anchore CVE | Low | jetty-deploy-9.4.27.v20200227 |
GHSA-9vjp-v76f-g363 | Anchore CVE | High | netty-codec-4.1.17.Final |
CVE-2021-34428 | Anchore CVE | Low | jetty-client-9.4.27.v20200227 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-servlets-9.4.27.v20200227 |
CVE-2022-37866 | Anchore CVE | High | ivy-2.4.0 |
GHSA-cmfg-87vq-g5g4 | Anchore CVE | Medium | jackson-databind-2.4.0 |
GHSA-w7f5-jrpr-5c2m | Anchore CVE | High | avatica-core-1.13.0 |
GHSA-mph4-vhrx-mv67 | Anchore CVE | Medium | jackson-databind-2.4.0 |
GHSA-mph4-vhrx-mv67 | Anchore CVE | Medium | jackson-databind-2.6.7.2 |
GHSA-gwrp-pvrq-jmwv | Anchore CVE | Medium | commons-io-2.6 |
GHSA-9vjp-v76f-g363 | Anchore CVE | High | netty-codec-4.1.45.Final |
GHSA-9vjp-v76f-g363 | Anchore CVE | High | netty-codec-4.1.47.Final |
GHSA-mjmj-j48q-9wg2 | Anchore CVE | High | snakeyaml-1.32 |
CVE-2021-34428 | Anchore CVE | Low | jetty-alpn-java-client-9.4.27.v20200227 |
GHSA-j9xq-j329-2xvg | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-server-9.4.31.v20200723 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-webapp-9.4.31.v20200723 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
GHSA-m6cp-vxjx-65j6 | Anchore CVE | Low | jetty-server-9.4.27.v20200227 |
CVE-2021-34428 | Anchore CVE | Low | jetty-alpn-client-9.4.27.v20200227 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
GHSA-m394-8rww-3jr7 | Anchore CVE | Medium | jetty-server-9.4.31.v20200723 |
GHSA-h4h5-3hr4-j3g2 | Anchore CVE | Medium | protobuf-java-3.11.4 |
GHSA-cmfg-87vq-g5g4 | Anchore CVE | Medium | jackson-databind-2.4.0 |
CVE-2022-2047 | Anchore CVE | Low | jetty-io-9.4.27.v20200227 |
GHSA-w9p3-5cr8-m3jj | Anchore CVE | High | log4j-1.2.17 |
CVE-2021-34428 | Anchore CVE | Low | jetty-xml-9.4.31.v20200723 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-25.1-jre |
CVE-2020-27218 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
CVE-2021-34428 | Anchore CVE | Low | jetty-alpn-server-9.4.27.v20200227 |
GHSA-h4h5-3hr4-j3g2 | Anchore CVE | Medium | protobuf-java-3.11.4 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-xml-9.4.31.v20200723 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-webapp-9.4.31.v20200723 |
CVE-2020-27218 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
GHSA-j9xq-j329-2xvg | Anchore CVE | Medium | keycloak-core-6.0.1 |
GHSA-269q-hmxg-m83q | Anchore CVE | Medium | netty-codec-http-4.1.17.Final |
GHSA-7r82-7xv7-xcpj | Anchore CVE | Medium | httpclient-4.5.3 |
GHSA-4fgq-gq9g-3rw7 | Anchore CVE | Medium | keycloak-core-6.0.1 |
CVE-2022-2047 | Anchore CVE | Low | jetty-io-9.4.27.v20200227 |
CVE-2023-26464 | Anchore CVE | High | log4j-1.2.17 |
CVE-2023-26464 | Anchore CVE | High | log4j-1.2.17 |
CVE-2023-26464 | Anchore CVE | High | log4j-1.2.17 |
GHSA-3x8x-79m2-3w2w | Anchore CVE | High | jackson-databind-2.10.3 |
GHSA-3x8x-79m2-3w2w | Anchore CVE | High | jackson-databind-2.10.1 |
GHSA-3x8x-79m2-3w2w | Anchore CVE | High | jackson-databind-2.10.1 |
GHSA-3x8x-79m2-3w2w | Anchore CVE | High | jackson-databind-2.11.3 |
GHSA-3x8x-79m2-3w2w | Anchore CVE | High | jackson-databind-2.11.3 |
GHSA-3x8x-79m2-3w2w | Anchore CVE | High | jackson-databind-2.10.1 |
GHSA-3x8x-79m2-3w2w | Anchore CVE | High | jackson-databind-2.10.1 |
GHSA-3x8x-79m2-3w2w | Anchore CVE | High | jackson-databind-2.10.3 |
GHSA-cqqj-4p63-rrmm | Anchore CVE | Critical | netty-codec-http-4.1.17.Final |
GHSA-cqqj-4p63-rrmm | Anchore CVE | Critical | netty-codec-http-4.1.17.Final |
GHSA-q6g2-g7f3-rr83 | Anchore CVE | High | jettison-1.3.7 |
GHSA-q6g2-g7f3-rr83 | Anchore CVE | High | jettison-1.3.7 |
GHSA-q6g2-g7f3-rr83 | Anchore CVE | High | jettison-1.3.8 |
GHSA-493p-pfq6-5258 | Anchore CVE | High | json-smart-1.3.2 |
GHSA-493p-pfq6-5258 | Anchore CVE | High | json-smart-1.3.2 |
GHSA-493p-pfq6-5258 | Anchore CVE | High | json-smart-2.3 |
GHSA-493p-pfq6-5258 | Anchore CVE | High | json-smart-2.3 |
CVE-2022-42003 | Anchore CVE | High | jackson-databind-2.4.0 |
CVE-2022-42003 | Anchore CVE | High | jackson-databind-2.4.0 |
CVE-2022-42003 | Anchore CVE | High | jackson-databind-2.4.0 |
CVE-2023-20861 | Anchore CVE | Medium | spring-core-5.3.21 |
CVE-2022-42003 | Anchore CVE | High | jackson-databind-2.4.0 |
CVE-2022-42003 | Anchore CVE | High | jackson-databind-2.4.0 |
CVE-2023-20861 | Anchore CVE | Medium | spring-core-5.3.21 |
CVE-2022-42003 | Anchore CVE | High | jackson-databind-2.4.0 |
CVE-2022-42003 | Anchore CVE | High | jackson-databind-2.4.0 |
CVE-2022-42003 | Anchore CVE | High | jackson-databind-2.4.0 |
CVE-2022-42003 | Anchore CVE | High | jackson-databind-2.4.0 |
CVE-2022-42003 | Anchore CVE | High | jackson-databind-2.4.0 |
CVE-2023-20860 | Anchore CVE | High | spring-core-5.3.21 |
CVE-2023-20860 | Anchore CVE | High | spring-core-5.3.21 |
GHSA-p26g-97m4-6q7c | Anchore CVE | Low | jetty-server-9.4.31.v20200723 |
GHSA-p26g-97m4-6q7c | Anchore CVE | Low | jetty-server-9.4.27.v20200227 |
GHSA-p26g-97m4-6q7c | Anchore CVE | Low | jetty-server-9.3.28.v20191105 |
GHSA-qw69-rqj8-6qw8 | Anchore CVE | Medium | jetty-server-9.4.31.v20200723 |
GHSA-p26g-97m4-6q7c | Anchore CVE | Low | jetty-server-9.4.31.v20200723 |
GHSA-qw69-rqj8-6qw8 | Anchore CVE | Medium | jetty-server-9.4.27.v20200227 |
GHSA-qw69-rqj8-6qw8 | Anchore CVE | Medium | jetty-server-9.3.28.v20191105 |
GHSA-qw69-rqj8-6qw8 | Anchore CVE | Medium | jetty-server-9.4.31.v20200723 |
CVE-2023-20863 | Anchore CVE | Medium | spring-core-5.3.21 |
CVE-2023-20863 | Anchore CVE | Medium | spring-core-5.3.21 |
GHSA-jgvc-jfgh-rjvv | Anchore CVE | Medium | jose4j-0.6.5 |
GHSA-jgvc-jfgh-rjvv | Anchore CVE | Medium | jose4j-0.6.5 |
GHSA-jgvc-jfgh-rjvv | Anchore CVE | Medium | jose4j-0.6.5 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-util-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-servlet-9.4.31.v20200723 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-util-9.4.31.v20200723 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-util-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-security-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-security-9.4.31.v20200723 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-util-ajax-9.3.28.v20191105 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-continuation-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-continuation-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-xml-9.3.28.v20191105 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-webapp-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-util-ajax-9.3.28.v20191105 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-io-9.4.31.v20200723 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-xml-9.4.31.v20200723 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-util-9.4.31.v20200723 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-servlets-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-http-9.4.31.v20200723 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-security-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-http-9.4.31.v20200723 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-util-9.3.28.v20191105 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-webapp-9.3.28.v20191105 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-continuation-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-io-9.4.31.v20200723 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-servlet-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-continuation-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-continuation-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-servlets-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-servlet-9.4.31.v20200723 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-security-9.3.28.v20191105 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-util-9.4.31.v20200723 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-io-9.3.28.v20191105 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-servlet-9.3.28.v20191105 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-io-9.4.31.v20200723 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-webapp-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-util-9.4.31.v20200723 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-webapp-9.4.31.v20200723 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-util-9.3.28.v20191105 |
CCE-83375-6 | OSCAP Compliance | Medium | |
CCE-80783-4 | OSCAP Compliance | Medium | |
CCE-85886-0 | OSCAP Compliance | Medium | |
CVE-2023-26464 | Twistlock CVE | High | log4j_log4j-1.2.17 |
CVE-2021-46877 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.11.3 |
CVE-2021-46877 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.10.1 |
CVE-2021-46877 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.10.3 |
CVE-2022-1471 | Twistlock CVE | Critical | org.yaml_snakeyaml-1.18 |
CVE-2023-1436 | Twistlock CVE | High | org.codehaus.jettison_jettison-1.3.7 |
CVE-2023-1436 | Twistlock CVE | High | org.codehaus.jettison_jettison-1.3.8 |
CVE-2023-1370 | Twistlock CVE | High | net.minidev_json-smart-1.3.2 |
CVE-2023-1370 | Twistlock CVE | High | net.minidev_json-smart-2.3 |
CVE-2022-1274 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2022-31692 | Twistlock CVE | Critical | spring-security-core-5.7.2 |
CVE-2016-1000027 | Twistlock CVE | Critical | spring-web-5.3.21 |
CVE-2019-10202 | Twistlock CVE | Critical | jackson-mapper-asl-1.9.2 |
CVE-2016-5397 | Twistlock CVE | High | libthrift-0.9.2 |
CVE-2022-31690 | Twistlock CVE | High | spring-security-core-5.7.2 |
CVE-2023-20860 | Twistlock CVE | High | spring-core-5.3.21 |
CVE-2023-20860 | Twistlock CVE | High | spring-web-5.3.21 |
CVE-2020-13949 | Twistlock CVE | High | libthrift-0.13.0 |
CVE-2019-10172 | Twistlock CVE | High | jackson-mapper-asl-1.9.2 |
CVE-2019-0205 | Twistlock CVE | High | libthrift-0.9.2 |
CVE-2018-1320 | Twistlock CVE | High | libthrift-0.9.2 |
CVE-2018-1000180 | Twistlock CVE | High | org.bouncycastle_bcprov-jdk15on-1.56 |
CVE-2022-25647 | Twistlock CVE | High | gson-2.2.4 |
CVE-2023-20861 | Twistlock CVE | Medium | spring-web-5.3.21 |
CVE-2023-20861 | Twistlock CVE | Medium | spring-core-5.3.21 |
CVE-2017-13098 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.56 |
CVE-2022-26336 | Twistlock CVE | Medium | org.apache.poi_poi-ooxml-4.1.1 |
CVE-2022-26336 | Twistlock CVE | Medium | org.apache.poi_poi-scratchpad-4.1.1 |
CVE-2020-15522 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.56 |
CVE-2020-15522 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.60 |
CVE-2020-15522 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.64 |
CVE-2018-11798 | Twistlock CVE | Medium | libthrift-0.9.2 |
CVE-2023-20863 | Twistlock CVE | Medium | spring-core-5.3.21 |
CVE-2023-26048 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.27 |
CVE-2023-26048 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.3.28 |
CVE-2023-26048 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.31 |
CVE-2023-26049 | Twistlock CVE | Low | org.eclipse.jetty_jetty-server-9.4.31 |
CVE-2023-26049 | Twistlock CVE | Low | org.eclipse.jetty_jetty-server-9.3.28 |
CVE-2023-26049 | Twistlock CVE | Low | org.eclipse.jetty_jetty-server-9.4.27 |
CVE-2023-20863 | Twistlock CVE | Medium | spring-web-5.3.21 |
GHSA-jgvc-jfgh-rjvv | Twistlock CVE | Medium | org.bitbucket.b_c_jose4j-0.6.5 |
CVE-2023-26049 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.27 |
CVE-2023-26049 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.3.28 |
CVE-2023-26049 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.31 |
CVE-2023-26048 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.3.28 |
CVE-2023-26048 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.27 |
CVE-2023-26048 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.31 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-xml-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-webapp-9.4.31.v20200723 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-jmx-9.3.28.v20191105 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-io-9.4.31.v20200723 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-util-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-security-9.4.31.v20200723 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-security-9.4.31.v20200723 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-start-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-servlets-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-servlets-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-http-9.4.31.v20200723 |
CVE-2023-26049 | Anchore CVE | Medium | start-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-xml-9.4.31.v20200723 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-servlet-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-security-9.3.28.v20191105 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-http-9.4.31.v20200723 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-io-9.3.28.v20191105 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-http-9.3.28.v20191105 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-util-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-continuation-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-xml-9.4.31.v20200723 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-util-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-xml-9.4.31.v20200723 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-security-9.4.31.v20200723 |
CVE-2023-26048 | Anchore CVE | Medium | start-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-jmx-9.3.28.v20191105 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-xml-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-webapp-9.4.31.v20200723 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-webapp-9.4.31.v20200723 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-util-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-servlet-9.3.28.v20191105 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-servlets-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-servlets-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-xml-9.3.28.v20191105 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-servlet-9.4.31.v20200723 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-servlet-9.4.31.v20200723 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-http-9.3.28.v20191105 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-start-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-webapp-9.3.28.v20191105 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-29.0-jre |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-25.1-jre |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-29.0-jre |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-29.0-jre |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-25.1-jre |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-25.0-jre |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-29.0-jre |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-18.0 |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-29.0-jre |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-25.1-jre |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-25.0-jre |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-29.0-jre |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-11.0.2 |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-25.0-jre |
GHSA-779h-3r69-4f5p | Anchore CVE | High | json-io-2.5.1 |
GHSA-qcwq-55hx-v3vh | Anchore CVE | High | snappy-java-1.0.5 |
GHSA-fjpj-2g6w-x25r | Anchore CVE | Medium | snappy-java-1.0.5 |
GHSA-pqr6-cmr2-h8hf | Anchore CVE | Medium | snappy-java-1.0.5 |
GHSA-pqr6-cmr2-h8hf | Anchore CVE | Medium | snappy-java-1.0.5 |
GHSA-qcwq-55hx-v3vh | Anchore CVE | High | snappy-java-1.0.5 |
GHSA-fjpj-2g6w-x25r | Anchore CVE | Medium | snappy-java-1.0.5 |
GHSA-6mjq-h674-j845 | Anchore CVE | Medium | netty-handler-4.1.78.Final |
GHSA-6mjq-h674-j845 | Anchore CVE | Medium | netty-handler-4.1.47.Final |
GHSA-6mjq-h674-j845 | Anchore CVE | Medium | netty-handler-4.1.17.Final |
GHSA-6mjq-h674-j845 | Anchore CVE | Medium | netty-handler-4.1.45.Final |
GHSA-6mjq-h674-j845 | Anchore CVE | Medium | netty-handler-4.1.45.Final |
GHSA-6mjq-h674-j845 | Anchore CVE | Medium | netty-handler-4.1.45.Final |
GHSA-6mjq-h674-j845 | Anchore CVE | Medium | netty-handler-4.1.78.Final |
GHSA-6mjq-h674-j845 | Anchore CVE | Medium | netty-handler-4.1.17.Final |
GHSA-6mjq-h674-j845 | Anchore CVE | Medium | netty-handler-4.1.45.Final |
GHSA-6mjq-h674-j845 | Anchore CVE | Medium | netty-handler-4.1.47.Final |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.11.3 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.4.0 |
CVE-2023-34453 | Anchore CVE | High | snappy-java-1.1.8.1 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.11.3 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.4.0 |
CVE-2023-34453 | Anchore CVE | High | snappy-java-1.1.8.1 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.10.1 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.10.1 |
CVE-2023-34455 | Anchore CVE | High | snappy-java-1.1.8.1 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.10.1 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.4.0 |
CVE-2023-34454 | Anchore CVE | High | snappy-java-1.1.8.1 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.4.0 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.10.3 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.10.1 |
CVE-2023-34455 | Anchore CVE | High | snappy-java-1.1.8.1 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.4.0 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.4.0 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.10.3 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.4.0 |
CVE-2023-34454 | Anchore CVE | High | snappy-java-1.1.8.1 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.4.0 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.6.7.2 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.4.0 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.4.0 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.6.7.2 |
CVE-2023-34462 | Anchore CVE | Medium | netty-3.10.6.Final |
CVE-2023-34462 | Anchore CVE | Medium | netty-3.10.6.Final |
GHSA-5cc8-pgp5-7mpm | Anchore CVE | Medium | keycloak-core-6.0.1 |
GHSA-5cc8-pgp5-7mpm | Anchore CVE | Medium | keycloak-core-6.0.1 |
GHSA-58qw-p7qm-5rvh | Anchore CVE | Low | jetty-xml-9.3.28.v20191105 |
GHSA-w33c-445m-f8w7 | Anchore CVE | Medium | okio-1.6.0 |
GHSA-w33c-445m-f8w7 | Anchore CVE | Medium | okio-1.6.0 |
GHSA-58qw-p7qm-5rvh | Anchore CVE | Low | jetty-xml-9.4.31.v20200723 |
GHSA-w33c-445m-f8w7 | Anchore CVE | Medium | okio-1.6.0 |
GHSA-58qw-p7qm-5rvh | Anchore CVE | Low | jetty-xml-9.4.27.v20200227 |
GHSA-58qw-p7qm-5rvh | Anchore CVE | Low | jetty-xml-9.4.31.v20200723 |
GHSA-c7xw-p58w-h6fj | Anchore CVE | Medium | keycloak-core-6.0.1 |
GHSA-c7xw-p58w-h6fj | Anchore CVE | Medium | keycloak-core-6.0.1 |
GHSA-77rm-9x9h-xj3g | Anchore CVE | High | protobuf-java-3.11.4 |
GHSA-77rm-9x9h-xj3g | Anchore CVE | High | protobuf-java-3.7.1 |
GHSA-p2v9-g2qv-p635 | Anchore CVE | Medium | netty-3.10.6.Final |
GHSA-77rm-9x9h-xj3g | Anchore CVE | High | protobuf-java-3.11.4 |
GHSA-wm47-8v5p-wjpj | Anchore CVE | Medium | netty-3.10.6.Final |
GHSA-f256-j965-7f32 | Anchore CVE | Medium | netty-3.10.6.Final |
GHSA-wm47-8v5p-wjpj | Anchore CVE | Medium | netty-3.10.6.Final |
GHSA-f256-j965-7f32 | Anchore CVE | Medium | netty-3.10.6.Final |
GHSA-9vjp-v76f-g363 | Anchore CVE | High | netty-3.10.6.Final |
GHSA-77rm-9x9h-xj3g | Anchore CVE | High | protobuf-java-3.7.1 |
GHSA-77rm-9x9h-xj3g | Anchore CVE | High | protobuf-java-3.11.4 |
GHSA-9vjp-v76f-g363 | Anchore CVE | High | netty-3.10.6.Final |
GHSA-cqqj-4p63-rrmm | Anchore CVE | Critical | netty-3.10.6.Final |
GHSA-77rm-9x9h-xj3g | Anchore CVE | High | protobuf-java-2.5.0 |
GHSA-77rm-9x9h-xj3g | Anchore CVE | High | protobuf-java-3.11.4 |
GHSA-cqqj-4p63-rrmm | Anchore CVE | Critical | netty-3.10.6.Final |
GHSA-wx5j-54mm-rqqq | Anchore CVE | Medium | netty-3.10.6.Final |
GHSA-77rm-9x9h-xj3g | Anchore CVE | High | protobuf-java-3.11.4 |
GHSA-77rm-9x9h-xj3g | Anchore CVE | High | protobuf-java-3.11.4 |
GHSA-5mcr-gq6c-3hq2 | Anchore CVE | Medium | netty-3.10.6.Final |
GHSA-77rm-9x9h-xj3g | Anchore CVE | High | protobuf-java-3.11.0 |
GHSA-grg4-wf29-r9vv | Anchore CVE | High | netty-3.10.6.Final |
GHSA-77rm-9x9h-xj3g | Anchore CVE | High | protobuf-java-2.5.0 |
GHSA-77rm-9x9h-xj3g | Anchore CVE | High | protobuf-java-2.5.0 |
GHSA-grg4-wf29-r9vv | Anchore CVE | High | netty-3.10.6.Final |
GHSA-p2v9-g2qv-p635 | Anchore CVE | Medium | netty-3.10.6.Final |
GHSA-5mcr-gq6c-3hq2 | Anchore CVE | Medium | netty-3.10.6.Final |
GHSA-wx5j-54mm-rqqq | Anchore CVE | Medium | netty-3.10.6.Final |
CVE-2022-31690 | Anchore CVE | High | spring-security-core-5.7.2 |
CVE-2022-31692 | Anchore CVE | Critical | spring-security-core-5.7.2 |
CVE-2023-20862 | Anchore CVE | Medium | spring-security-core-5.7.2 |
CVE-2023-34034 | Anchore CVE | Critical | spring-security-core-5.7.2 |
CVE-2022-31690 | Anchore CVE | High | spring-security-core-5.7.2 |
CVE-2023-20862 | Twistlock CVE | Medium | spring-security-core-5.7.2 |
PRISMA-2023-0067 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-core-2.11.3 |
PRISMA-2023-0067 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-core-2.7.8 |
PRISMA-2023-0067 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-core-2.6.7 |
PRISMA-2023-0067 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-core-2.4.0 |
PRISMA-2023-0067 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-core-2.10.1 |
PRISMA-2023-0069 | Twistlock CVE | Medium | com.fasterxml.jackson.core_jackson-core-2.6.7 |
PRISMA-2023-0069 | Twistlock CVE | Medium | com.fasterxml.jackson.core_jackson-core-2.4.0 |
PRISMA-2023-0068 | Twistlock CVE | Medium | com.fasterxml.jackson.core_jackson-core-2.6.7 |
PRISMA-2023-0068 | Twistlock CVE | Medium | com.fasterxml.jackson.core_jackson-core-2.7.8 |
PRISMA-2023-0068 | Twistlock CVE | Medium | com.fasterxml.jackson.core_jackson-core-2.4.0 |
CVE-2018-1121 | Twistlock CVE | Low | procps-ng-3.3.15-13.el8 |
CVE-2023-1664 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2019-10202 | Twistlock CVE | Critical | jackson-mapper-asl-1.9.13 |
CVE-2023-24998 | Twistlock CVE | High | commons-fileupload_commons-fileupload-1.3.3 |
CVE-2019-10172 | Twistlock CVE | High | jackson-mapper-asl-1.9.13 |
CVE-2017-7525 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.4.0 |
CVE-2017-17485 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.4.0 |
CVE-2023-2976 | Twistlock CVE | High | com.google.guava_guava-11.0.2 |
CVE-2023-2976 | Twistlock CVE | High | com.google.guava_guava-25.1 |
CVE-2023-2976 | Twistlock CVE | High | com.google.guava_guava-29.0 |
CVE-2023-2976 | Twistlock CVE | High | com.google.guava_guava-25.0 |
CVE-2023-2976 | Twistlock CVE | High | com.google.guava_guava-18.0 |
CVE-2023-34610 | Twistlock CVE | High | com.cedarsoftware_json-io-2.5.1 |
CVE-2023-34455 | Twistlock CVE | High | org.xerial.snappy_snappy-java-1.0.5 |
CVE-2023-34455 | Twistlock CVE | High | org.xerial.snappy_snappy-java-1.1.8.1 |
CVE-2023-34454 | Twistlock CVE | Medium | org.xerial.snappy_snappy-java-1.1.8.1 |
CVE-2023-34454 | Twistlock CVE | Medium | org.xerial.snappy_snappy-java-1.0.5 |
CVE-2023-34453 | Twistlock CVE | Medium | org.xerial.snappy_snappy-java-1.1.8.1 |
CVE-2023-34453 | Twistlock CVE | Medium | org.xerial.snappy_snappy-java-1.0.5 |
CVE-2023-34462 | Twistlock CVE | Medium | io.netty_netty-handler-4.1.78 |
CVE-2023-34462 | Twistlock CVE | Medium | io.netty_netty-handler-4.1.45 |
CVE-2023-34462 | Twistlock CVE | Medium | io.netty_netty-handler-4.1.17 |
CVE-2023-34462 | Twistlock CVE | Medium | io.netty_netty-handler-4.1.47 |
CVE-2023-34462 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.17 |
CVE-2023-34462 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.47 |
CVE-2023-34462 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.78 |
CVE-2023-34462 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.45 |
CVE-2023-34462 | Twistlock CVE | Medium | io.netty_netty-all-4.0.23 |
CVE-2023-34462 | Twistlock CVE | Medium | io.netty_netty-3.10.6 |
CVE-2023-34462 | Twistlock CVE | Medium | io.netty_netty-all-4.1.48 |
CVE-2023-34462 | Twistlock CVE | Medium | io.netty_netty-all-4.1.78 |
CVE-2022-4361 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2023-3635 | Twistlock CVE | Medium | com.squareup.okio_okio-1.6.0 |
GHSA-58qw-p7qm-5rvh | Twistlock CVE | Low | org.eclipse.jetty_jetty-xml-9.4.31 |
GHSA-58qw-p7qm-5rvh | Twistlock CVE | Low | org.eclipse.jetty_jetty-xml-9.3.28 |
GHSA-58qw-p7qm-5rvh | Twistlock CVE | Low | org.eclipse.jetty_jetty-xml-9.4.27 |
CVE-2023-34034 | Twistlock CVE | Critical | spring-security-core-5.7.2 |
CVE-2023-34034 | Twistlock CVE | Critical | spring-security-config-5.7.2 |
CVE-2021-22570 | Twistlock CVE | High | com.google.protobuf_protobuf-java-3.7.1 |
CVE-2021-22570 | Twistlock CVE | High | com.google.protobuf_protobuf-java-3.11.4 |
CVE-2021-22570 | Twistlock CVE | High | com.google.protobuf_protobuf-java-2.5.0 |
CVE-2021-22570 | Twistlock CVE | High | com.google.protobuf_protobuf-java-3.11.0 |
CVE-2023-4016 | Twistlock CVE | Low | procps-ng-3.3.15-13.el8 |
CVE-2023-0264 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2023-4016 | Anchore CVE | Low | procps-ng-3.3.15-13.el8 |
CVE-2023-34034 | Anchore CVE | Critical | spring-security-core-5.7.2 |
CVE-2022-31692 | Anchore CVE | Critical | spring-security-core-5.7.2 |
CVE-2023-20862 | Anchore CVE | Medium | spring-security-core-5.7.2 |
GHSA-qw3f-w4pf-jh5f | Anchore CVE | Medium | tika-core-1.24 |
CVE-2022-46751 | Anchore CVE | High | ivy-2.4.0 |
CVE-2022-46751 | Anchore CVE | High | ivy-2.4.0 |
CVE-2017-15095 | Anchore CVE | Critical | jackson-databind-2.4.0 |
GHSA-hmr7-m48g-48f6 | Anchore CVE | Medium | jetty-http-9.3.28.v20191105 |
GHSA-hmr7-m48g-48f6 | Anchore CVE | Medium | jetty-http-9.4.31.v20200723 |
CVE-2017-15095 | Anchore CVE | Critical | jackson-databind-2.4.0 |
GHSA-hmr7-m48g-48f6 | Anchore CVE | Medium | jetty-http-9.4.31.v20200723 |
GHSA-hmr7-m48g-48f6 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
GHSA-3gh6-v5v9-6v9j | Anchore CVE | Low | jetty-servlets-9.4.27.v20200227 |
GHSA-hmr7-m48g-48f6 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
CVE-2017-15095 | Anchore CVE | Critical | jackson-databind-2.4.0 |
GHSA-3gh6-v5v9-6v9j | Anchore CVE | Low | jetty-servlets-9.4.27.v20200227 |
CVE-2017-15095 | Anchore CVE | Critical | jackson-databind-2.4.0 |
CVE-2017-15095 | Anchore CVE | Critical | jackson-databind-2.4.0 |
GHSA-3gh6-v5v9-6v9j | Anchore CVE | Low | jetty-servlets-9.4.27.v20200227 |
CVE-2017-15095 | Anchore CVE | Critical | jackson-databind-2.4.0 |
CVE-2017-15095 | Anchore CVE | Critical | jackson-databind-2.4.0 |
GHSA-hmr7-m48g-48f6 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
CVE-2017-15095 | Anchore CVE | Critical | jackson-databind-2.4.0 |
CVE-2017-15095 | Anchore CVE | Critical | jackson-databind-2.4.0 |
CVE-2017-15095 | Anchore CVE | Critical | jackson-databind-2.4.0 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-server-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-servlet-9.4.31.v20200723 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-servlet-9.4.31.v20200723 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-webapp-9.4.31.v20200723 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-server-9.4.31.v20200723 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-servlet-9.4.31.v20200723 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-util-9.4.31.v20200723 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-servlet-9.4.31.v20200723 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-security-9.4.31.v20200723 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-start-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-security-9.4.31.v20200723 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-server-9.4.31.v20200723 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-start-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-xml-9.4.31.v20200723 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-util-9.4.31.v20200723 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-util-9.4.31.v20200723 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-io-9.3.28.v20191105 |
CVE-2023-41900 | Anchore CVE | Medium | start-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-io-9.3.28.v20191105 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-servlet-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-http-9.4.31.v20200723 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-servlets-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-servlets-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-util-9.4.31.v20200723 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-xml-9.4.31.v20200723 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-util-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-security-9.4.31.v20200723 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-util-ajax-9.3.28.v20191105 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-webapp-9.4.31.v20200723 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-servlets-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-server-9.3.28.v20191105 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-webapp-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-util-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-server-9.4.31.v20200723 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-io-9.4.31.v20200723 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-util-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-security-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-security-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-http-9.4.31.v20200723 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-xml-9.3.28.v20191105 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-webapp-9.4.31.v20200723 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-continuation-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-http-9.3.28.v20191105 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-continuation-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-http-9.4.31.v20200723 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-xml-9.3.28.v20191105 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-continuation-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-server-9.4.31.v20200723 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-security-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-xml-9.4.31.v20200723 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-servlets-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-util-9.3.28.v20191105 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-xml-9.4.31.v20200723 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-io-9.4.31.v20200723 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-util-9.4.31.v20200723 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-xml-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-http-9.4.31.v20200723 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-util-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-io-9.4.31.v20200723 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-xml-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-util-9.3.28.v20191105 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-xml-9.4.31.v20200723 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-util-9.4.31.v20200723 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-xml-9.4.31.v20200723 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-util-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-xml-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-io-9.4.31.v20200723 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-security-9.4.31.v20200723 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-util-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-server-9.4.31.v20200723 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-servlet-9.3.28.v20191105 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-util-ajax-9.3.28.v20191105 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-security-9.4.31.v20200723 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | start-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-server-9.4.31.v20200723 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-continuation-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-util-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-security-9.3.28.v20191105 |
CVE-2023-40167 | Anchore CVE | Medium | start-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-webapp-9.4.31.v20200723 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-server-9.3.28.v20191105 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-start-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-server-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-continuation-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-io-9.4.31.v20200723 |
CVE-2022-46751 | Twistlock CVE | High | org.apache.ivy_ivy-2.4.0 |
CVE-2022-1471 | Twistlock CVE | Critical | org.yaml_snakeyaml-1.32 |
CVE-2023-33201 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.60 |
CVE-2023-33201 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.56 |
CVE-2023-33201 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.64 |
CVE-2015-2156 | Twistlock CVE | High | io.netty_netty-all-4.0.23 |
CVE-2015-3254 | Twistlock CVE | Medium | libthrift-0.9.2 |
CVE-2021-20190 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.6.7.2 |
CVE-2021-20190 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.4.0 |
CVE-2020-36189 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.6.7.2 |
CVE-2020-36189 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.4.0 |
CVE-2020-36188 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.6.7.2 |
CVE-2020-36188 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.4.0 |
CVE-2020-36187 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.6.7.2 |
CVE-2020-36187 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.4.0 |
CVE-2020-36186 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.4.0 |
CVE-2020-36186 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.6.7.2 |
CVE-2020-36185 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.4.0 |
CVE-2020-36185 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.6.7.2 |
CVE-2020-36184 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.4.0 |
CVE-2020-36184 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.6.7.2 |
CVE-2020-36183 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.4.0 |
CVE-2020-36183 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.6.7.2 |
CVE-2020-36182 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.4.0 |
CVE-2020-36182 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.6.7.2 |
CVE-2020-36181 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.6.7.2 |
CVE-2020-36181 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.4.0 |
CVE-2020-36180 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.6.7.2 |
CVE-2020-36180 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.4.0 |
CVE-2020-36179 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.4.0 |
CVE-2020-36179 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.6.7.2 |
CVE-2020-24750 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.6.7.2 |
CVE-2020-24750 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.4.0 |
CVE-2020-24616 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.6.7.2 |
CVE-2020-24616 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.4.0 |
CVE-2023-40167 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-http-9.3.28 |
CVE-2023-40167 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-http-9.4.27 |
CVE-2023-40167 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-http-9.4.31 |
CVE-2023-36479 | Twistlock CVE | Low | org.eclipse.jetty_jetty-servlets-9.4.27 |
CVE-2022-3916 | Twistlock CVE | Medium | org.keycloak_keycloak-core-6.0.1 |
CVE-2023-40167 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.3.28 |
CVE-2023-40167 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.31 |
CVE-2023-40167 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.27 |
CVE-2023-41900 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.31 |
CVE-2023-41900 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.27 |
CVE-2023-36479 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.31 |
CVE-2023-36479 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.27 |
CVE-2023-36479 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.3.28 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-webapp-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-continuation-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-servlets-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-java-client-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-webapp-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-continuation-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-io-9.4.31.v20200723 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-servlet-9.3.28.v20191105 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-client-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-jmx-9.3.28.v20191105 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-rewrite-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-webapp-9.4.31.v20200723 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-deploy-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-servlet-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-jmx-9.3.28.v20191105 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-webapp-9.4.31.v20200723 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-io-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-servlet-9.4.31.v20200723 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-util-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-servlets-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-servlet-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-servlet-9.4.31.v20200723 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-security-9.4.31.v20200723 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-security-9.3.28.v20191105 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-server-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-server-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-webapp-9.3.28.v20191105 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-http-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-continuation-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-jmx-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-client-9.4.27.v20200227 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-continuation-9.4.27.v20200227 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-util-9.4.27.v20200227 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-webapp-9.3.28.v20191105 |
GHSA-m6mm-q862-j366 | Anchore CVE | High | keycloak-common-6.0.1 |
GHSA-m6mm-q862-j366 | Anchore CVE | High | keycloak-common-6.0.1 |
GHSA-m6mm-q862-j366 | Anchore CVE | High | keycloak-core-6.0.1 |
GHSA-55g7-9cwv-5qfv | Anchore CVE | High | snappy-java-1.0.5 |
GHSA-55g7-9cwv-5qfv | Anchore CVE | High | snappy-java-1.0.5 |
GHSA-m6mm-q862-j366 | Anchore CVE | High | keycloak-core-6.0.1 |
CVE-2021-28165 | Anchore CVE | High | jetty-io-9.4.31.v20200723 |
CVE-2021-28165 | Anchore CVE | High | jetty-io-9.3.28.v20191105 |
CVE-2023-43642 | Anchore CVE | High | snappy-java-1.1.8.1 |
CVE-2021-28165 | Anchore CVE | High | jetty-io-9.4.31.v20200723 |
GHSA-26vr-8j45-3r4w | Anchore CVE | High | jetty-server-9.4.31.v20200723 |
CVE-2021-28165 | Anchore CVE | High | jetty-io-9.4.27.v20200227 |
GHSA-26vr-8j45-3r4w | Anchore CVE | High | jetty-server-9.4.31.v20200723 |
CVE-2021-28165 | Anchore CVE | High | jetty-io-9.4.27.v20200227 |
GHSA-26vr-8j45-3r4w | Anchore CVE | High | jetty-server-9.3.28.v20191105 |
CVE-2023-43642 | Anchore CVE | High | snappy-java-1.1.8.1 |
GHSA-26vr-8j45-3r4w | Anchore CVE | High | jetty-server-9.4.27.v20200227 |
CVE-2021-28165 | Anchore CVE | High | jetty-io-9.4.27.v20200227 |
GHSA-rhrv-645h-fjfh | Anchore CVE | High | avro-1.7.7 |
GHSA-rhrv-645h-fjfh | Anchore CVE | High | avro-1.7.7 |
GHSA-rhrv-645h-fjfh | Anchore CVE | High | avro-1.7.7 |
GHSA-rhrv-645h-fjfh | Anchore CVE | High | avro-1.7.7 |
CVE-2023-0833 | Anchore CVE | Medium | okhttp-2.7.5 |
CVE-2023-0833 | Anchore CVE | Medium | okhttp-2.7.5 |
CVE-2023-0833 | Anchore CVE | Medium | okhttp-2.7.5 |
GHSA-57m8-f3v5-hm5m | Anchore CVE | Medium | netty-handler-4.1.45.Final |
GHSA-7286-pgfv-vxvh | Anchore CVE | Medium | zookeeper-3.5.7 |
GHSA-7286-pgfv-vxvh | Anchore CVE | Medium | zookeeper-3.5.7 |
GHSA-7286-pgfv-vxvh | Anchore CVE | Medium | zookeeper-3.5.7 |
GHSA-wgh7-54f2-x98r | Anchore CVE | High | http2-hpack-9.4.27.v20200227 |
GHSA-wgh7-54f2-x98r | Anchore CVE | High | jetty-http-9.3.28.v20191105 |
GHSA-wgh7-54f2-x98r | Anchore CVE | High | http2-hpack-9.4.27.v20200227 |
GHSA-wgh7-54f2-x98r | Anchore CVE | High | http2-hpack-9.4.27.v20200227 |
GHSA-wgh7-54f2-x98r | Anchore CVE | High | http2-hpack-9.4.27.v20200227 |
GHSA-57m8-f3v5-hm5m | Anchore CVE | Medium | netty-handler-4.1.78.Final |
GHSA-wgh7-54f2-x98r | Anchore CVE | High | jetty-http-9.4.27.v20200227 |
GHSA-57m8-f3v5-hm5m | Anchore CVE | Medium | netty-handler-4.1.78.Final |
GHSA-57m8-f3v5-hm5m | Anchore CVE | Medium | netty-handler-4.1.45.Final |
GHSA-wgh7-54f2-x98r | Anchore CVE | High | jetty-http-9.4.27.v20200227 |
GHSA-57m8-f3v5-hm5m | Anchore CVE | Medium | netty-handler-4.1.17.Final |
GHSA-wgh7-54f2-x98r | Anchore CVE | High | jetty-http-9.4.31.v20200723 |
GHSA-57m8-f3v5-hm5m | Anchore CVE | Medium | netty-handler-4.1.45.Final |
CVE-2023-43804 | Anchore CVE | Medium | platform-python-pip-9.0.3-22.el8 |
GHSA-wgh7-54f2-x98r | Anchore CVE | High | jetty-http-9.4.27.v20200227 |
GHSA-wgh7-54f2-x98r | Anchore CVE | High | jetty-http-9.4.31.v20200723 |
GHSA-xpw8-rcwv-8f8p | Anchore CVE | Medium | netty-codec-http2-4.1.78.Final |
GHSA-57m8-f3v5-hm5m | Anchore CVE | Medium | netty-handler-4.1.47.Final |
GHSA-xpw8-rcwv-8f8p | Anchore CVE | Medium | netty-codec-http2-4.1.78.Final |
GHSA-7286-pgfv-vxvh | Anchore CVE | Medium | zookeeper-3.5.7 |
GHSA-7286-pgfv-vxvh | Anchore CVE | Medium | zookeeper-3.5.7 |
GHSA-57m8-f3v5-hm5m | Anchore CVE | Medium | netty-handler-4.1.17.Final |
GHSA-7286-pgfv-vxvh | Anchore CVE | Medium | zookeeper-3.5.7 |
GHSA-57m8-f3v5-hm5m | Anchore CVE | Medium | netty-handler-4.1.45.Final |
GHSA-7286-pgfv-vxvh | Anchore CVE | Medium | zookeeper-3.5.7 |
GHSA-7286-pgfv-vxvh | Anchore CVE | Medium | zookeeper-3.5.7 |
GHSA-wgh7-54f2-x98r | Anchore CVE | High | http2-hpack-9.4.27.v20200227 |
CVE-2023-43804 | Anchore CVE | Medium | python3-pip-9.0.3-22.el8 |
GHSA-57m8-f3v5-hm5m | Anchore CVE | Medium | netty-handler-4.1.47.Final |
CVE-2022-40433 | Anchore CVE | Medium | java-1.8.0-openjdk-headless-1:1.8.0.392.b08-4.el8 |
CVE-2022-40433 | Anchore CVE | Medium | java-1.8.0-openjdk-devel-1:1.8.0.392.b08-4.el8 |
CVE-2022-40433 | Anchore CVE | Medium | java-1.8.0-openjdk-1:1.8.0.392.b08-4.el8 |
CVE-2020-1714 | Twistlock CVE | High | org.keycloak_keycloak-common-6.0.1 |
CVE-2023-43642 | Twistlock CVE | High | org.xerial.snappy_snappy-java-1.0.5 |
CVE-2023-43642 | Twistlock CVE | High | org.xerial.snappy_snappy-java-1.1.8.1 |
CVE-2021-28165 | Twistlock CVE | High | org.eclipse.jetty_jetty-server-9.4.31 |
CVE-2021-28165 | Twistlock CVE | High | org.eclipse.jetty_jetty-server-9.3.28 |
CVE-2021-28165 | Twistlock CVE | High | org.eclipse.jetty_jetty-server-9.4.27 |
CVE-2020-13956 | Twistlock CVE | Medium | org.apache.httpcomponents_httpclient-4.5.5 |
CVE-2021-29425 | Twistlock CVE | Medium | commons-io_commons-io-2.6 |
CVE-2023-39410 | Twistlock CVE | High | org.apache.avro_avro-1.7.7 |
CVE-2023-36478 | Twistlock CVE | High | org.eclipse.jetty.http2_http2-hpack-9.4.27 |
CVE-2023-4586 | Twistlock CVE | High | io.netty_netty-all-4.1.48 |
CVE-2023-4586 | Twistlock CVE | High | io.netty_netty-codec-4.1.17 |
CVE-2023-4586 | Twistlock CVE | High | io.netty_netty-all-4.1.78 |
CVE-2023-4586 | Twistlock CVE | High | io.netty_netty-codec-4.1.47 |
CVE-2023-4586 | Twistlock CVE | High | io.netty_netty-codec-4.1.78 |
CVE-2023-4586 | Twistlock CVE | High | io.netty_netty-codec-4.1.45 |
GHSA-xpw8-rcwv-8f8p | Twistlock CVE | Medium | io.netty_netty-codec-http2-4.1.78 |
CVE-2023-4586 | Twistlock CVE | Medium | io.netty_netty-handler-4.1.47 |
CVE-2023-4586 | Twistlock CVE | Medium | io.netty_netty-handler-4.1.45 |
CVE-2023-4586 | Twistlock CVE | Medium | io.netty_netty-handler-4.1.78 |
CVE-2023-4586 | Twistlock CVE | Medium | io.netty_netty-handler-4.1.17 |
CVE-2023-44981 | Twistlock CVE | Critical | org.apache.zookeeper_zookeeper-3.5.7 |
CVE-2018-25091 | Twistlock CVE | Medium | python3-pip-9.0.3-22.el8 |
CVE-2018-25091 | Twistlock CVE | Medium | platform-python-pip-9.0.3-22.el8 |
CVE-2023-44487 | Twistlock CVE | High | io.netty_netty-all-4.1.48 |
CVE-2023-44487 | Twistlock CVE | High | io.netty_netty-all-4.1.78 |
CVE-2023-44487 | Twistlock CVE | High | io.netty_netty-codec-4.1.78 |
CVE-2023-44487 | Twistlock CVE | High | io.netty_netty-codec-4.1.47 |
CVE-2023-44487 | Twistlock CVE | High | io.netty_netty-codec-4.1.45 |
CVE-2023-44487 | Twistlock CVE | High | io.netty_netty-all-4.0.23 |
CVE-2023-44487 | Twistlock CVE | High | io.netty_netty-3.10.6 |
CVE-2023-44487 | Twistlock CVE | High | io.netty_netty-codec-4.1.17 |
CVE-2022-3857 | Twistlock CVE | Low | java-1.8.0-openjdk-headless-1.8.0.392.b08-4.el8 |
CVE-2022-3857 | Twistlock CVE | Low | java-1.8.0-openjdk-1.8.0.392.b08-4.el8 |
CVE-2022-3857 | Twistlock CVE | Low | java-1.8.0-openjdk-devel-1.8.0.392.b08-4.el8 |
VAT: https://vat.dso.mil/vat/image?imageName=opensource/apache/atlas&tag=2.3.0&branch=master
More information can be found in the failed pipeline located here: https://repo1.dso.mil/dsop/opensource/apache/atlas/-/jobs/19102188
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the ~"Hardening::Approval" label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications -
Send approval request to Authorizing Official -
Close issue after approval from Authorizing Official
Note: If the above approval process is rejected for any reason, the
Approval
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theApproval
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.