chore(findings): opensource/eclipse/jetty
Summary
opensource/eclipse/jetty has 259 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
GHSA-58qw-p7qm-5rvh | Anchore CVE | Low | jetty-xml-10.0.15 |
GHSA-pwh8-58vv-vw48 | Anchore CVE | Low | jetty-openid-10.0.15 |
GHSA-3gh6-v5v9-6v9j | Anchore CVE | Low | jetty-servlets-10.0.15 |
GHSA-hmr7-m48g-48f6 | Anchore CVE | Medium | jetty-http-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-unixsocket-server-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-java-server-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-util-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-webapp-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-unixsocket-server-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-http-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-client-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-server-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-conscrypt-server-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-conscrypt-server-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-security-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-client-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | start-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-jmx-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-cdi-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-jaas-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-conscrypt-server-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-webapp-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-client-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-jaspi-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-jmx-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-keystore-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-slf4j-impl-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-server-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-servlets-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-jaspi-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-java-client-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-io-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-openid-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-keystore-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-plus-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-http-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-servlets-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-xml-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-server-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-gcloud-session-manager-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | start-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-security-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-deploy-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-java-server-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-quickstart-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-unixsocket-common-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-nosql-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-quickstart-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-client-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-client-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-jmx-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-keystore-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-memcached-sessions-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-rewrite-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-servlet-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-quickstart-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-unixsocket-common-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-deploy-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-jndi-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-memcached-sessions-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-server-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-java-client-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-java-client-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-proxy-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-util-ajax-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-proxy-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-io-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-util-ajax-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-deploy-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-xml-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-jaas-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-cdi-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-xml-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-util-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-nosql-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-plus-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-annotations-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-proxy-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | start-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-gcloud-session-manager-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-unixsocket-common-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-server-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-server-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-memcached-sessions-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-jaas-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-annotations-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-io-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-util-ajax-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-java-server-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-hazelcast-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-jndi-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-openid-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-unixdomain-server-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-security-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-slf4j-impl-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-jaspi-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-webapp-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-util-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-servlet-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-hazelcast-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-rewrite-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-unixdomain-server-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-jndi-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-servlet-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-gcloud-session-manager-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-slf4j-impl-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-plus-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-rewrite-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-nosql-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-client-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-unixdomain-server-10.0.15 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-annotations-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-unixsocket-server-10.0.15 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-hazelcast-10.0.15 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-cdi-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-rewrite-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-openid-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-alpn-java-client-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-keystore-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-cdi-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-webapp-10.0.15 |
GHSA-wgh7-54f2-x98r | Anchore CVE | High | http2-hpack-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | start-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-util-ajax-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-client-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-xml-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-deploy-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-quickstart-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-unixdomain-server-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-memcached-sessions-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-proxy-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-setuid-java-1.0.4 |
CVE-2023-44487 | Anchore CVE | High | jetty-alpn-client-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-jaspi-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-gcloud-session-manager-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-util-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-jndi-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-server-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-servlet-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-jaas-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-alpn-java-server-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-unixsocket-server-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-plus-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-jmx-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-servlets-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-security-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-io-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-alpn-server-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-hazelcast-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-http-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-nosql-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-unixsocket-common-10.0.15 |
GHSA-wgh7-54f2-x98r | Anchore CVE | High | http3-qpack-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-annotations-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-alpn-conscrypt-server-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | jetty-slf4j-impl-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-quickstart-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-plus-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-annotations-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-memcached-sessions-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-alpn-java-client-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-xml-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-webapp-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-jaas-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-alpn-java-server-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-client-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-alpn-server-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-gcloud-session-manager-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-jmx-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-cdi-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-rewrite-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-server-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-security-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-openid-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-util-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-unixsocket-server-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-keystore-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-hazelcast-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-alpn-client-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-alpn-conscrypt-server-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-util-ajax-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-nosql-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-servlets-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-jndi-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-http-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-servlet-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-jaspi-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-slf4j-impl-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-proxy-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-unixdomain-server-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-deploy-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | start-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-unixsocket-common-10.0.15 |
CVE-2023-36478 | Anchore CVE | High | jetty-io-10.0.15 |
CVE-2023-5384 | Anchore CVE | Low | infinispan-remote-query-10.0.15 |
CVE-2023-5236 | Anchore CVE | Medium | infinispan-remote-query-10.0.15 |
CVE-2023-5236 | Anchore CVE | Medium | infinispan-embedded-query-10.0.15 |
CVE-2023-5236 | Anchore CVE | Medium | infinispan-common-10.0.15 |
CVE-2023-5384 | Anchore CVE | Low | infinispan-common-10.0.15 |
CCE-80809-7 | OSCAP Compliance | Medium | |
CVE-2023-5384 | Anchore CVE | Low | infinispan-embedded-query-10.0.15 |
CVE-2023-3628 | Anchore CVE | Medium | infinispan-common-10.0.15 |
CVE-2023-3629 | Anchore CVE | Medium | infinispan-embedded-query-10.0.15 |
CVE-2023-3629 | Anchore CVE | Medium | infinispan-common-10.0.15 |
CVE-2023-3628 | Anchore CVE | Medium | infinispan-remote-query-10.0.15 |
CVE-2023-3629 | Anchore CVE | Medium | infinispan-remote-query-10.0.15 |
CVE-2023-3628 | Anchore CVE | Medium | infinispan-embedded-query-10.0.15 |
GHSA-rggv-cv7r-mw98 | Anchore CVE | High | http3-common-10.0.15 |
GHSA-rggv-cv7r-mw98 | Anchore CVE | High | http2-common-10.0.15 |
GHSA-qppj-fm5r-hxr3 | Anchore CVE | Medium | http2-common-10.0.15 |
GHSA-qppj-fm5r-hxr3 | Anchore CVE | Medium | http2-server-10.0.15 |
CVE-2023-44487 | Anchore CVE | High | websocket-api-1.1.2 |
CVE-2017-7657 | Anchore CVE | Critical | websocket-api-1.1.2 |
CVE-2021-28169 | Anchore CVE | Medium | websocket-api-1.1.2 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-start-10.0.15 |
CVE-2017-7658 | Anchore CVE | Critical | servlet-api-4.0.6 |
CVE-2023-44487 | Anchore CVE | High | jetty-start-10.0.15 |
CVE-2022-2048 | Anchore CVE | High | servlet-api-4.0.6 |
CVE-2023-26048 | Anchore CVE | Medium | websocket-api-1.1.2 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-start-10.0.15 |
CVE-2017-7658 | Anchore CVE | Critical | websocket-api-1.1.2 |
CVE-2022-2047 | Anchore CVE | Low | websocket-api-1.1.2 |
CVE-2021-34428 | Anchore CVE | Low | websocket-api-1.1.2 |
CVE-2021-34428 | Anchore CVE | Low | servlet-api-4.0.6 |
CVE-2020-27216 | Anchore CVE | High | servlet-api-4.0.6 |
CVE-2009-5046 | Anchore CVE | Medium | websocket-api-1.1.2 |
CVE-2023-26049 | Anchore CVE | Medium | servlet-api-4.0.6 |
CVE-2022-2048 | Anchore CVE | High | websocket-api-1.1.2 |
CVE-2017-7656 | Anchore CVE | High | servlet-api-4.0.6 |
CVE-2020-27216 | Anchore CVE | High | websocket-api-1.1.2 |
CVE-2017-7656 | Anchore CVE | High | websocket-api-1.1.2 |
CVE-2017-7657 | Anchore CVE | Critical | servlet-api-4.0.6 |
CVE-2017-9735 | Anchore CVE | High | websocket-api-1.1.2 |
CVE-2017-9735 | Anchore CVE | High | servlet-api-4.0.6 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-start-10.0.15 |
CVE-2023-26049 | Anchore CVE | Medium | websocket-api-1.1.2 |
CVE-2021-28169 | Anchore CVE | Medium | servlet-api-4.0.6 |
CVE-2023-44487 | Anchore CVE | High | servlet-api-4.0.6 |
CVE-2023-26048 | Anchore CVE | Medium | servlet-api-4.0.6 |
CVE-2022-2047 | Anchore CVE | Low | servlet-api-4.0.6 |
CVE-2009-5046 | Anchore CVE | Medium | servlet-api-4.0.6 |
CVE-2023-36478 | Anchore CVE | High | jetty-start-10.0.15 |
CVE-2009-5045 | Anchore CVE | High | websocket-api-1.1.2 |
CVE-2009-5045 | Anchore CVE | High | servlet-api-4.0.6 |
CVE-2024-22201 | Twistlock CVE | High | org.eclipse.jetty.http2_http2-common-10.0.15 |
CVE-2024-22201 | Twistlock CVE | High | org.eclipse.jetty.http3_http3-common-10.0.15 |
CVE-2023-36478 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-10.0.15 |
CVE-2023-36478 | Twistlock CVE | High | org.eclipse.jetty.http2_http2-hpack-10.0.15 |
CVE-2023-36478 | Twistlock CVE | High | org.eclipse.jetty.http3_http3-qpack-10.0.15 |
CVE-2023-40167 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-http-10.0.15 |
CVE-2023-40167 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-10.0.15 |
CVE-2023-41900 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-10.0.15 |
CVE-2023-36479 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-10.0.15 |
GHSA-58qw-p7qm-5rvh | Twistlock CVE | Low | org.eclipse.jetty_jetty-xml-10.0.15 |
CVE-2023-41900 | Twistlock CVE | Low | org.eclipse.jetty_jetty-openid-10.0.15 |
CVE-2023-36479 | Twistlock CVE | Low | org.eclipse.jetty_jetty-servlets-10.0.15 |
CVE-2023-44487 | Twistlock CVE | Medium | org.eclipse.jetty.http2_http2-server-10.0.15 |
CVE-2023-44487 | Twistlock CVE | Medium | org.eclipse.jetty.http2_http2-common-10.0.15 |
CVE-2023-44487 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-10.0.15 |
VAT: https://vat.dso.mil/vat/image?imageName=opensource/eclipse/jetty&tag=10.0.15&branch=master
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/eclipse/jetty&tag=10.0.15&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the ~"Hardening::Verification" label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.