UNCLASSIFIED - NO CUI

Skip to content

chore(findings): opensource/opennms/horizon

Summary

opensource/opennms/horizon has 6 new findings discovered during continuous monitoring.

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/opennms/horizon&tag=34.0.0&branch=master

EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.

KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.

id source severity package impact workaround epss_score kev
CVE-2025-48913 Twistlock CVE Low org.apache.cxf_cxf-core-3.6.6 0.00105 false
CVE-2025-8916 Twistlock CVE Medium org.bouncycastle_bcpkix-jdk15on-1.70.00.0 0.00042 false
CVE-2025-8941 Anchore CVE High pam-1.5.1-25.el9_6 N/A false
GHSA-prj3-ccx8-p6x4 Anchore CVE High netty-codec-http2-4.1.100.Final N/A N/A
GHSA-prj3-ccx8-p6x4 Anchore CVE High netty-codec-http2-4.1.100.Final N/A N/A
GHSA-4cx2-fc23-5wg6 Anchore CVE Medium bcpkix-jdk15on-1.70 N/A N/A

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/opennms/horizon&tag=34.0.0&branch=master

Novel Tidelift Findings (Experimental)

opensource/opennms/horizon has 150 novel Tidelift findings discovered during continuous monitoring.

NOTE: This table is for Iron Bank evaluation and testing purposes. No action required by vendors.

id cvss score package impact workaround epss_score kev
CVE-2022-1471 9.8 org.yaml:snakeyaml-1.33 0.93849 false
CVE-2020-9548 9.8 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.67398 false
CVE-2020-11113 8.8 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.61746 false
CVE-2020-36179 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.61296 false
CVE-2019-12384 5.9 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.51675 false
CVE-2020-9547 9.8 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.49698 false
CVE-2020-10672 8.8 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.40070 false
CVE-2020-35728 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.39669 false
CVE-2020-10673 8.8 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.20473 false
CVE-2019-12814 5.9 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.19277 false
CVE-2019-12086 7.5 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.15745 false
CVE-2020-11112 8.8 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.11418 false
CVE-2019-14439 7.5 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.10318 false
CVE-2020-14195 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.09511 false
CVE-2020-14060 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.08718 false
CVE-2020-8840 9.8 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.08164 false
CVE-2019-14540 9.8 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.07984 false
CVE-2020-14062 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.07706 false
CVE-2020-36188 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.06980 false
CVE-2020-35491 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.06892 false
CVE-2020-10968 8.8 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.06632 false
CVE-2020-36181 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.06306 false
CVE-2020-14061 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.06150 false
CVE-2020-10650 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Requires existence of specific jars in users classpath only relevant for users of Apache Ignite. 0.05253 false
CVE-2020-36184 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.05061 false
CVE-2020-35490 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.04749 false
CVE-2020-24616 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.03783 false
CVE-2020-11620 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.02796 false
CVE-2020-36189 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.02635 false
CVE-2020-36183 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.02421 false
CVE-2019-20444 9.1 io.netty:netty-codec-http-4.1.22.Final 0.02402 false
CVE-2020-9546 9.8 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.02327 false
CVE-2020-36186 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.02210 false
CVE-2020-11111 8.8 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.02196 false
CVE-2020-36182 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.02121 false
CVE-2020-24750 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.02107 false
CVE-2020-11971 7.5 org.apache.camel:camel-core-2.21.5 0.02054 false
CVE-2020-36187 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.02039 false
CVE-2019-20330 9.8 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.01997 false
CVE-2020-36185 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.01957 false
CVE-2020-36180 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.01957 false
CVE-2019-0188 7.5 org.apache.camel:camel-core-2.21.5 0.01956 false
CVE-2020-11612 7.5 io.netty:netty-handler-4.1.22.Final This vulnerability can be easily triggered by sending a compressed data that can be deflated into very large number of bytes. A user can stop using ZlibDecoder or its subtypes in their application and replace them with a new handler implementation without the vulnerability, e.g. forking ZlibDecoder from the newer versions. 0.01846 false
CVE-2019-16943 9.8 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.01841 false
CVE-2020-11619 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.01826 false
CVE-2020-10969 8.8 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.01478 false
CVE-2019-14379 9.8 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.01455 false
CVE-2019-17267 9.8 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.01357 false
CVE-2019-17531 9.8 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.01190 false
CVE-2019-14892 9.8 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.00873 false
CVE-2019-16335 9.8 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.00740 false
CVE-2021-37137 7.5 io.netty:netty-codec-4.1.22.Final An attacker can easily trigger excessive memory usage of the vulnerable application by sending a Snappycompressed content thats deflated into a large amount of data. A vulnerable user can stop using Snappy and SnappyFramedDecoder, and then replace them with a custom implementation without the vulnerability, usually by forking them from a newer version of Netty. 0.00715 false
CVE-2019-14893 9.8 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.00698 false
CVE-2020-7238 7.5 io.netty:netty-codec-http-4.1.22.Final This vulnerability affects all HTTP1 clients and servers written on top of Netty, triggered by a malicious chunked HTTP1 requestresponse. 0.00685 false
CVE-2023-34462 6.5 io.netty:netty-handler-4.1.22.Final Its relatively easy to trigger DoS and make the server suffer from unnecessarily high memory usage by leveraging this vulnerability. You can fork the fixed SniHandler in newer Netty version instead of using the one provided by the old Netty version. Alternatively, you can simply disable SNI by removing SniHandler from your channel pipeline. 0.00563 false
CVE-2023-5072 7.5 org.json:json-20230227 0.00525 false
CVE-2024-21742 5.3 org.apache.james:apache-mime4j-core-0.7.2 0.00492 false
CVE-2025-27533 6.9 org.apache.activemq:activemq-client-5.15.16 0.00489 false
CVE-2025-27533 6.9 org.apache.activemq:activemq-openwire-legacy-5.15.16 0.00489 false
CVE-2020-36518 7.5 com.fasterxml.jackson.core:jackson-databind-2.9.10.8 It is difficult to estimate how commonly untyped deserialization is used but it is not the most common usage style more commonly used target types are POJOs typed or JsonNode JSON tree. 0.00477 false
CVE-2020-36518 7.5 com.fasterxml.jackson.core:jackson-databind-2.11.0 It is difficult to estimate how commonly untyped deserialization is used but it is not the most common usage style more commonly used target types are POJOs typed or JsonNode JSON tree. 0.00477 false
CVE-2020-36518 7.5 com.fasterxml.jackson.core:jackson-databind-2.9.8 It is difficult to estimate how commonly untyped deserialization is used but it is not the most common usage style more commonly used target types are POJOs typed or JsonNode JSON tree. 0.00477 false
CVE-2021-20190 8.1 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.00469 false
CVE-2023-43643 6.1 org.owasp.antisamy:antisamy-1.7.3 0.00463 false
CVE-2019-16942 9.8 com.fasterxml.jackson.core:jackson-databind-2.9.8 Applicability relies on explicit usage of specific style of Polymorphic Deserialization as explained above it DOES NOT AFFECT Jackson usage with DEFAULT SETTINGS. 0.00438 false
CVE-2019-20445 9.1 io.netty:netty-codec-http-4.1.22.Final This vulnerability affects all HTTP1 clients and servers written on top of Netty, triggered by a malicious HTTP1 requestresponse that contains repeating ContentLength or TransferEncoding headers. 0.00434 false
CVE-2019-20445 9.1 io.netty:netty-handler-4.1.22.Final 0.00434 false
CVE-2023-3635 7.5 com.squareup.okio:okio-1.14.0 0.00335 false
CVE-2025-48924 6.5 commons-lang:commons-lang-2.6 0.00309 false
CVE-2025-48924 6.5 org.apache.commons:commons-lang3-3.13.0 An application or library would need to not only use the API or one of its call sites but also allow for very long inputs for a class name. Alternatively, if the app or library accepts input from the user or a configuration file, the app stack may be vulnerable. 0.00309 false
CVE-2025-48924 6.5 org.apache.commons:commons-lang3-3.16.0 An application or library would need to not only use the API or one of its call sites but also allow for very long inputs for a class name. Alternatively, if the app or library accepts input from the user or a configuration file, the app stack may be vulnerable. 0.00309 false
CVE-2025-48924 6.5 org.apache.commons:commons-lang3-3.12.0 An application or library would need to not only use the API or one of its call sites but also allow for very long inputs for a class name. Alternatively, if the app or library accepts input from the user or a configuration file, the app stack may be vulnerable. 0.00309 false
CVE-2018-20200 5.9 com.squareup.okhttp3:okhttp-3.10.0 0.00305 false
CVE-2023-33201 5.3 org.bouncycastle:bcprov-ext-jdk15on-1.70 0.00289 false
CVE-2023-33201 5.3 org.bouncycastle:bcpkix-jdk15on-1.70 0.00289 false
CVE-2023-33201 5.3 org.bouncycastle:bcprov-jdk15on-1.70 0.00289 false
CVE-2022-24823 5.5 io.netty:netty-common-4.1.22.Final This vulnerability affects users only when an attacker gained the access to a local system user AND the Nettybased application didnt configure the file upload directory properly. When creating a DefaultHttpDataFactory, call setBaseDir so that the uploaded filed are stored into the directory with secure permission. If you didnt specify a DefaultHttpDataFactory explicitly when instantiating HttpPostRequestDecoder or its subtypes, you need to create a new DefaultHttpDataFactory whose baseDir is set with the secure directory first and specify it when instantiating them. 0.00285 false
CVE-2022-42003 7.5 com.fasterxml.jackson.core:jackson-databind-2.9.10.8 Attacker will need to have high confidence that the feature is enabled and be familiar with the object structure of the Java class target it is not possible to generate general JSON document since target type varies by system. 0.00278 false
CVE-2022-42003 7.5 com.fasterxml.jackson.core:jackson-databind-2.11.0 Attacker will need to have high confidence that the feature is enabled and be familiar with the object structure of the Java class target it is not possible to generate general JSON document since target type varies by system. 0.00278 false
CVE-2022-42003 7.5 com.fasterxml.jackson.core:jackson-databind-2.9.8 Attacker will need to have high confidence that the feature is enabled and be familiar with the object structure of the Java class target it is not possible to generate general JSON document since target type varies by system. 0.00278 false
CVE-2024-23076 org.jfree:jfreechart-1.0.19 0.00271 false
CVE-2024-23076 org.jfree:jfreechart-1.5.4 0.00271 false
CVE-2021-37136 7.5 io.netty:netty-codec-4.1.22.Final An attacker can easily trigger excessive memory usage of the vulnerable application by sending a bzip2compressed content thats deflated into a large amount of data. A vulnerable user can stop using Bzip2Decoder and replace it with a custom decoder implementation without the vulnerability. 0.00229 false
CVE-2022-42004 7.5 com.fasterxml.jackson.core:jackson-databind-2.9.10.8 Attacker will need to have high confidence that the feature is enabled and be familiar with the object structure of the Java class target it is not possible to generate general JSON document since target type varies by system. 0.00219 false
CVE-2022-42004 7.5 com.fasterxml.jackson.core:jackson-databind-2.11.0 Attacker will need to have high confidence that the feature is enabled and be familiar with the object structure of the Java class target it is not possible to generate general JSON document since target type varies by system. 0.00219 false
CVE-2022-42004 7.5 com.fasterxml.jackson.core:jackson-databind-2.9.8 Attacker will need to have high confidence that the feature is enabled and be familiar with the object structure of the Java class target it is not possible to generate general JSON document since target type varies by system. 0.00219 false
CVE-2023-1932 6.1 org.hibernate:hibernate-validator-4.3.2.Final 0.00215 false
CVE-2024-47554 4.3 commons-io:commons-io-2.11.0 Either an application is using the class org.apache.commons.io.input.XmlStreamReader or it is not if the class is in use then attackers can craft malicious input to make the application vulnerable if that application accepts input to XmlStreamReader from the world at large. If an application can be relatively certain that its XmlStreamReader input can be trusted, the risk could be lowered from a vulnerability to a bug. An application could mitigate this vulnerability by validating the input given to the class. 0.00213 false
CVE-2024-47554 4.3 commons-io:commons-io-2.8.0 Either an application is using the class org.apache.commons.io.input.XmlStreamReader or it is not if the class is in use then attackers can craft malicious input to make the application vulnerable if that application accepts input to XmlStreamReader from the world at large. If an application can be relatively certain that its XmlStreamReader input can be trusted, the risk could be lowered from a vulnerability to a bug. An application could mitigate this vulnerability by validating the input given to the class. 0.00213 false
CVE-2024-47554 4.3 commons-io:commons-io-2.13.0 Either an application is using the class org.apache.commons.io.input.XmlStreamReader or it is not if the class is in use then attackers can craft malicious input to make the application vulnerable if that application accepts input to XmlStreamReader from the world at large. If an application can be relatively certain that its XmlStreamReader input can be trusted, the risk could be lowered from a vulnerability to a bug. An application could mitigate this vulnerability by validating the input given to the class. 0.00213 false
CVE-2024-23077 org.jfree:jfreechart-1.0.19 0.00186 false
CVE-2024-23077 org.jfree:jfreechart-1.5.4 0.00186 false
CVE-2024-23080 joda-time:joda-time-2.12.5 0.00185 false
CVE-2024-7254 8.7 com.google.protobuf:protobuf-java-3.25.3 0.00171 false
CVE-2021-37533 6.5 commons-net:commons-net-3.8.0 A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. 0.00162 false
CVE-2021-28168 6.2 org.glassfish.jersey.core:jersey-common-2.22.2 Reliance on default file permissions makes all users vulnerable. This issue can be mitigated by manually setting the java.io.tmpdir system property when launching the JVM. 0.00158 false
CVE-2021-28168 6.2 org.glassfish.jersey.core:jersey-common-2.4.1 Reliance on default file permissions makes all users vulnerable. This issue can be mitigated by manually setting the java.io.tmpdir system property when launching the JVM. 0.00158 false
CVE-2025-24970 7.5 io.netty:netty-handler-4.1.100.Final This is a critical vulnerability that can crash your application very easily, just by sending a crafted packet. Upgrade or workaround is highly recommended. First option Disable native TLS support by removing the nettytcnative dependency or explicitly telling Netty not to use native TLS support. This may degrade your applications TLS performance.Second option Change the code fromSslContext context ...SslHandler handler context.newHandler....toSslContext context ...SSLEngine engine context.newEngine....SslHandler handler new SslHandlerengine, .... 0.00156 false
CVE-2024-23635 6.1 org.owasp.antisamy:antisamy-1.7.3 0.00156 false
CVE-2024-29857 7.5 org.bouncycastle:bcprov-jdk15on-1.70 0.00155 false
CVE-2025-5878 7.3 org.owasp.esapi:esapi-2.5.2.0 0.00152 false
CVE-2024-6763 3.7 org.eclipse.jetty:jetty-http-9.4.57.v20241219 If using the Jetty internal HttpURI as part of Jetty server and Jetty client you are not vulnerable.If using HttpURI in your application directly, then you are vulnerable if you use the results of HttpURI to apply filtering based on the given URI. 0.00140 false
CVE-2021-43797 6.5 io.netty:netty-codec-http-4.1.22.Final This vulnerability affects all HTTP1 clients and servers written on top of Netty, triggered by a malicious HTTP1 requestresponse whose header names contains a control character. 0.00139 false
CVE-2025-46392 2.7 commons-configuration:commons-configuration-1.10 0.00117 false
CVE-2022-0839 9.8 org.liquibase:liquibase-core-3.6.3 0.00115 false
CVE-2025-25193 5.5 io.netty:netty-common-4.1.22.Final This vulnerability can be triggered only when an attacker already has the write access to the filesystem. In addition, an attacker must create the offending file in the filesystem before the application is started. Therefore, Id say the risk is fairly low. 0.00113 false
CVE-2025-25193 5.5 io.netty:netty-common-4.1.100.Final This vulnerability can be triggered only when an attacker already has the write access to the filesystem. In addition, an attacker must create the offending file in the filesystem before the application is started. Therefore, Id say the risk is fairly low. 0.00113 false
CVE-2024-30172 7.5 org.bouncycastle:bcprov-jdk15on-1.70 0.00104 false
CVE-2021-46877 7.5 com.fasterxml.jackson.core:jackson-databind-2.11.0 JsonNodes are rarely serializeddeserialized using JDK serialization. 0.00097 false
CVE-2022-40160 6.5 commons-jxpath:commons-jxpath-1.3 0.00089 false
CVE-2022-40159 6.5 commons-jxpath:commons-jxpath-1.3 0.00089 false
CVE-2024-22949 org.jfree:jfreechart-1.0.19 0.00083 false
CVE-2024-22949 org.jfree:jfreechart-1.5.4 0.00083 false
CVE-2023-52070 org.jfree:jfreechart-1.0.19 0.00079 false
CVE-2023-52070 org.jfree:jfreechart-1.5.4 0.00079 false
CVE-2022-41854 6.5 org.yaml:snakeyaml-1.33 0.00076 false
CVE-2025-52999 8.7 com.fasterxml.jackson.core:jackson-core-2.14.1 Vulnerability exposed for many reading cases but not all but depends on databinding level calls, definitions if Java target classes used less likely to be applicable for tree model JsonNode always applicable. 0.00069 false
CVE-2025-52999 8.7 com.fasterxml.jackson.core:jackson-core-2.13.5 Vulnerability exposed for many reading cases but not all but depends on databinding level calls, definitions if Java target classes used less likely to be applicable for tree model JsonNode always applicable. 0.00069 false
CVE-2025-52999 8.7 com.fasterxml.jackson.core:jackson-core-2.9.8 Vulnerability exposed for many reading cases but not all but depends on databinding level calls, definitions if Java target classes used less likely to be applicable for tree model JsonNode always applicable. 0.00069 false
CVE-2025-52999 8.7 com.fasterxml.jackson.core:jackson-core-2.9.10 Vulnerability exposed for many reading cases but not all but depends on databinding level calls, definitions if Java target classes used less likely to be applicable for tree model JsonNode always applicable. 0.00069 false
CVE-2025-52999 8.7 com.fasterxml.jackson.core:jackson-core-2.11.0 Vulnerability exposed for many reading cases but not all but depends on databinding level calls, definitions if Java target classes used less likely to be applicable for tree model JsonNode always applicable. 0.00069 false
CVE-2020-8908 3.3 com.google.guava:guava-30.1-jre 0.00067 false
CVE-2020-8908 3.3 com.google.guava:guava-31.1-jre 0.00067 false
CVE-2020-8908 3.3 com.google.guava:guava-30.1.1-jre 0.00067 false
CVE-2023-33202 5.5 org.bouncycastle:bcprov-ext-jdk15on-1.70 0.00059 false
CVE-2023-33202 5.5 org.bouncycastle:bcprov-jdk15on-1.70 0.00059 false
CVE-2024-29025 5.3 io.netty:netty-codec-http-4.1.100.Final HttpPostRequestDecoder is vulnerable to this issue regardless of whether it is used as intended or not. If HttpPostRequestDecoder is NOT used for handling file uploads, a user could limit the length of an HTTP POST request body to a small value, which will effectively reduce the theoretically possible maximum number of form fields a request body can contain. However, this workaround might not be feasible if a user needs to handle file uploads, which may not be possible to limit the request both length. 0.00048 false
CVE-2024-29025 5.3 io.netty:netty-codec-http-4.1.22.Final HttpPostRequestDecoder is vulnerable to this issue regardless of whether it is used as intended or not. If HttpPostRequestDecoder is NOT used for handling file uploads, a user could limit the length of an HTTP POST request body to a small value, which will effectively reduce the theoretically possible maximum number of form fields a request body can contain. However, this workaround might not be feasible if a user needs to handle file uploads, which may not be possible to limit the request both length. 0.00048 false
CVE-2025-48976 8.7 commons-fileupload:commons-fileupload-1.5 If your application uses multipart headers and unless you set boundaries or accept the default partHeaderSizeMax 512 bytes with 2.0.0M4 or 1.6.0, an application might be vulnerable. 0.00045 false
CVE-2024-30171 5.9 org.bouncycastle:bcprov-jdk15on-1.70 0.00045 false
CVE-2025-25247 6.1 org.apache.felix:org.apache.felix.webconsole-4.8.10 0.00044 false
CVE-2023-2976 7.1 com.google.guava:guava-30.1-jre 0.00042 false
CVE-2023-2976 7.1 com.google.guava:guava-31.1-jre 0.00042 false
CVE-2023-2976 7.1 com.google.guava:guava-30.1.1-jre 0.00042 false
CVE-2023-0833 5.5 com.squareup.okhttp3:okhttp-3.10.0 0.00036 false
CVE-2023-0833 5.5 com.squareup.okhttp3:okhttp-3.14.0 0.00036 false
CVE-2024-57699 7.5 net.minidev:json-smart-2.5.0 0.00032 false
CVE-2024-23944 5.3 org.apache.zookeeper:zookeeper-3.7.2 0.00028 false
CVE-2024-47535 5.5 io.netty:netty-common-4.1.22.Final An attacker must acquire the privilege to override the content of system files such as etcresolv.conf and procsys. Given such powerful superuserlevel privilege, I would imagine the attacker will not waste their time to trigger OOME using this vulnerability. 0.00027 false
CVE-2024-47535 5.5 io.netty:netty-common-4.1.100.Final An attacker must acquire the privilege to override the content of system files such as etcresolv.conf and procsys. Given such powerful superuserlevel privilege, I would imagine the attacker will not waste their time to trigger OOME using this vulnerability. 0.00027 false
CVE-2023-35116 4.7 com.fasterxml.jackson.core:jackson-databind-2.13.5 0.00015 false
CVE-2023-35116 4.7 com.fasterxml.jackson.core:jackson-databind-2.9.10.8 0.00015 false
CVE-2023-35116 4.7 com.fasterxml.jackson.core:jackson-databind-2.14.1 0.00015 false
CVE-2023-35116 4.7 com.fasterxml.jackson.core:jackson-databind-2.11.0 0.00015 false
CVE-2023-35116 4.7 com.fasterxml.jackson.core:jackson-databind-2.9.8 0.00015 false
CVE-2020-36843 4.3 net.i2p.crypto:eddsa-0.3.0 0.00013 false
CVE-2020-25649 7.5 com.fasterxml.jackson.core:jackson-databind-2.9.8 As per applicability description affected usage would seem very rare it would only occur in cases where JSON content contains embedded XML values for a property AND that content is mapped to a DOM Element or Document value. 0.00011 false
CVE-2025-49128 4.0 com.fasterxml.jackson.core:jackson-core-2.9.8 Vulnerability as described rather difficult to exploit even under best of conditions. Included in description 0.00006 false
CVE-2025-49128 4.0 com.fasterxml.jackson.core:jackson-core-2.9.10 Vulnerability as described rather difficult to exploit even under best of conditions. Included in description 0.00006 false
CVE-2025-49128 4.0 com.fasterxml.jackson.core:jackson-core-2.11.0 Vulnerability as described rather difficult to exploit even under best of conditions. Included in description 0.00006 false

Tasks

Contributor:

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Verification label will be removed and the issue will be sent back to Open. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by Aaron Warner
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information