chore(findings): ortussolutions/commandbox-adobe2018
Summary
ortussolutions/commandbox-adobe2018 has 641 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
GHSA-f256-j965-7f32 | Anchore CVE | Medium | netty-3.5.8.Final |
GHSA-xfv3-rrfm-f2rv | Anchore CVE | High | netty-3.5.8.Final |
GHSA-p2v9-g2qv-p635 | Anchore CVE | Medium | netty-3.5.8.Final |
GHSA-9vjp-v76f-g363 | Anchore CVE | High | netty-3.5.8.Final |
GHSA-wx5j-54mm-rqqq | Anchore CVE | Medium | netty-3.5.8.Final |
GHSA-cqqj-4p63-rrmm | Anchore CVE | Critical | netty-3.5.8.Final |
GHSA-grg4-wf29-r9vv | Anchore CVE | High | netty-3.5.8.Final |
GHSA-wm47-8v5p-wjpj | Anchore CVE | Medium | netty-3.5.8.Final |
GHSA-5mcr-gq6c-3hq2 | Anchore CVE | Medium | netty-3.5.8.Final |
GHSA-qw3f-w4pf-jh5f | Anchore CVE | Medium | tika-core-1.21 |
GHSA-hmr7-m48g-48f6 | Anchore CVE | Medium | jetty-http-9.4.35.v20201120 |
GHSA-3gh6-v5v9-6v9j | Anchore CVE | Low | jetty-servlets-9.4.12.v20180830 |
GHSA-3gh6-v5v9-6v9j | Anchore CVE | Low | jetty-servlets-9.4.35.v20201120 |
GHSA-hmr7-m48g-48f6 | Anchore CVE | Medium | jetty-http-9.4.12.v20180830 |
GHSA-pwh8-58vv-vw48 | Anchore CVE | Low | jetty-openid-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-security-9.4.12.v20180830 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-rewrite-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-servlet-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-security-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-nosql-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-webapp-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | start-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-xml-9.4.12.v20180830 |
CVE-2023-40167 | Anchore CVE | Medium | start-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-http-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-client-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-security-9.4.12.v20180830 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-server-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-spring-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-nosql-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-memcached-sessions-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-servlets-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-jndi-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-openjdk8-server-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-security-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-io-9.4.12.v20180830 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-util-ajax-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-hazelcast-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-hazelcast-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-continuation-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-servlet-9.4.12.v20180830 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-cdi-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-jmx-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-gcloud-session-manager-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-openjdk8-server-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-http-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-server-9.4.12.v20180830 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-xml-9.4.12.v20180830 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-util-ajax-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-util-ajax-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-servlets-9.4.12.v20180830 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-security-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-memcached-sessions-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-spring-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-servlets-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-spring-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-nosql-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-util-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-continuation-9.4.12.v20180830 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-conscrypt-server-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-webapp-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-unixsocket-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-openjdk8-server-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-io-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-deploy-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-continuation-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-servlet-9.4.12.v20180830 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-gcloud-session-manager-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-server-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-util-9.4.12.v20180830 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-client-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-monitor-9.3.8.v20160314 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-util-9.4.12.v20180830 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-xml-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-xml-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-plus-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-http-9.4.12.v20180830 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-proxy-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-openid-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-conscrypt-server-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-annotations-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-alpn-java-server-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-gcloud-session-manager-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-util-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-servlet-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-jmx-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-xml-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-annotations-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-cdi-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-rewrite-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-continuation-9.4.12.v20180830 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-monitor-9.3.8.v20160314 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-servlet-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-deploy-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-proxy-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-conscrypt-server-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-deploy-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-continuation-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-quickstart-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-io-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-rewrite-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-util-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | start-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-plus-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-client-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-io-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-alpn-server-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-server-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-io-9.4.12.v20180830 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-jaspi-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-jndi-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-jaas-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-jmx-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-annotations-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-jaspi-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-proxy-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-plus-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-unixsocket-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-server-9.4.12.v20180830 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-openid-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-server-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-hazelcast-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-jaas-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-jndi-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-webapp-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-memcached-sessions-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-cdi-9.4.35.v20201120 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-quickstart-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-alpn-server-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-quickstart-9.4.35.v20201120 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-jaas-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-jaspi-9.4.35.v20201120 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-unixsocket-9.4.35.v20201120 |
GHSA-26vr-8j45-3r4w | Anchore CVE | High | jetty-server-9.4.12.v20180830 |
GHSA-26vr-8j45-3r4w | Anchore CVE | High | jetty-server-9.4.35.v20201120 |
CVE-2021-28165 | Anchore CVE | High | jetty-io-9.4.12.v20180830 |
CVE-2021-28165 | Anchore CVE | High | jetty-io-9.4.35.v20201120 |
GHSA-wgh7-54f2-x98r | Anchore CVE | High | http2-hpack-9.4.35.v20201120 |
GHSA-pcf2-gh6g-h5r2 | Anchore CVE | Medium | antisamy-1.5.13 |
CVE-2023-44487 | Anchore CVE | High | jetty-rewrite-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-continuation-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-alpn-openjdk8-server-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-jndi-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-hazelcast-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-http-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-http-9.4.12.v20180830 |
CVE-2023-44487 | Anchore CVE | High | jetty-webapp-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-alpn-java-server-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-security-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-util-9.4.12.v20180830 |
CVE-2023-44487 | Anchore CVE | High | jetty-servlets-9.4.12.v20180830 |
CVE-2023-44487 | Anchore CVE | High | start-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-jaas-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-client-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-cdi-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-io-9.4.12.v20180830 |
CVE-2023-44487 | Anchore CVE | High | jetty-continuation-9.4.12.v20180830 |
CVE-2023-44487 | Anchore CVE | High | jetty-server-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-setuid-java-1.0.4 |
CVE-2023-44487 | Anchore CVE | High | jetty-gcloud-session-manager-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-nosql-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-util-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-openid-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-monitor-9.3.8.v20160314 |
CVE-2023-44487 | Anchore CVE | High | jetty-servlets-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-security-9.4.12.v20180830 |
CVE-2023-44487 | Anchore CVE | High | jetty-alpn-conscrypt-server-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-memcached-sessions-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-util-ajax-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-servlet-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-quickstart-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-annotations-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-io-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-server-9.4.12.v20180830 |
CVE-2023-44487 | Anchore CVE | High | jetty-schemas-3.1.M0 |
CVE-2023-44487 | Anchore CVE | High | jetty-alpn-server-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-proxy-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | netty-3.5.8.Final |
CVE-2023-44487 | Anchore CVE | High | jetty-unixsocket-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-jmx-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-xml-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-xml-9.4.12.v20180830 |
CVE-2023-44487 | Anchore CVE | High | jetty-spring-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-servlet-9.4.12.v20180830 |
CVE-2023-44487 | Anchore CVE | High | jetty-deploy-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-jaspi-9.4.35.v20201120 |
CVE-2023-44487 | Anchore CVE | High | jetty-plus-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-xml-9.4.12.v20180830 |
CVE-2023-36478 | Anchore CVE | High | jetty-io-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-jaspi-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-monitor-9.3.8.v20160314 |
CVE-2023-36478 | Anchore CVE | High | jetty-webapp-9.4.35.v20201120 |
CVE-2021-22570 | Twistlock CVE | High | com.google.protobuf_protobuf-java-2.4.1 |
CVE-2023-43643 | Twistlock CVE | Medium | org.owasp.antisamy_antisamy-1.5.13 |
CVE-2023-40743 | Twistlock CVE | Critical | axis-1.2.1 |
GHSA-7c2q-5qmr-v76q | Twistlock CVE | High | org.owasp.esapi_esapi-2.2.1.1 |
CVE-2023-36478 | Anchore CVE | High | jetty-jmx-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-jaas-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-alpn-java-server-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-hazelcast-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-servlet-9.4.12.v20180830 |
CVE-2023-36478 | Anchore CVE | High | jetty-server-9.4.12.v20180830 |
CVE-2023-36478 | Anchore CVE | High | jetty-servlets-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-proxy-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-nosql-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-util-9.4.12.v20180830 |
CVE-2023-36478 | Anchore CVE | High | jetty-openid-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-continuation-9.4.12.v20180830 |
CVE-2023-36478 | Anchore CVE | High | jetty-jndi-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-spring-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-util-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-cdi-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-io-9.4.12.v20180830 |
CVE-2023-36478 | Anchore CVE | High | jetty-security-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-memcached-sessions-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-annotations-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-security-9.4.12.v20180830 |
CVE-2023-36478 | Anchore CVE | High | start-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-xml-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-gcloud-session-manager-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-util-ajax-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-quickstart-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-rewrite-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-unixsocket-9.4.35.v20201120 |
GHSA-7c2q-5qmr-v76q | Anchore CVE | High | esapi-2.2.1.1 |
CVE-2023-36478 | Anchore CVE | High | jetty-http-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-alpn-conscrypt-server-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-servlet-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-plus-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-client-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-server-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-http-9.4.12.v20180830 |
CVE-2023-36478 | Anchore CVE | High | jetty-servlets-9.4.12.v20180830 |
CVE-2023-36478 | Anchore CVE | High | jetty-deploy-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-alpn-openjdk8-server-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-continuation-9.4.35.v20201120 |
CVE-2023-36478 | Anchore CVE | High | jetty-alpn-server-9.4.35.v20201120 |
GHSA-r68h-jhhj-9jvm | Anchore CVE | High | esapi-2.2.1.1 |
GHSA-5r5r-6hpj-8gg9 | Anchore CVE | High | jackson-databind-2.8.11.5 |
CVE-2022-46337 | Anchore CVE | Critical | derby-10.11.1000001.1616546 |
CVE-2023-46674 | Anchore CVE | High | elasticsearch-5.6.3 |
GHSA-mqvp-7rrg-9jxc | Anchore CVE | Medium | poi-scratchpad-3.17 |
GHSA-9jwc-q6j3-8g9g | Anchore CVE | Medium | poi-3.17 |
GHSA-mqvp-7rrg-9jxc | Anchore CVE | Medium | poi-scratchpad-3.12 |
CVE-2023-5236 | Anchore CVE | Medium | infinispan-embedded-query-9.4.35.v20201120 |
CVE-2023-5384 | Anchore CVE | Low | infinispan-remote-query-9.4.35.v20201120 |
CVE-2023-3629 | Anchore CVE | Medium | infinispan-remote-query-9.4.35.v20201120 |
CVE-2023-3628 | Anchore CVE | Medium | infinispan-remote-query-9.4.35.v20201120 |
CVE-2023-3628 | Anchore CVE | Medium | infinispan-embedded-query-9.4.35.v20201120 |
CVE-2023-5236 | Anchore CVE | Medium | infinispan-common-9.4.35.v20201120 |
CVE-2023-5236 | Anchore CVE | Medium | infinispan-remote-query-9.4.35.v20201120 |
CVE-2023-5384 | Anchore CVE | Low | infinispan-embedded-query-9.4.35.v20201120 |
CVE-2023-3628 | Anchore CVE | Medium | infinispan-common-9.4.35.v20201120 |
CVE-2023-3629 | Anchore CVE | Medium | infinispan-embedded-query-9.4.35.v20201120 |
CVE-2023-5384 | Anchore CVE | Low | infinispan-common-9.4.35.v20201120 |
CVE-2023-3629 | Anchore CVE | Medium | infinispan-common-9.4.35.v20201120 |
GHSA-2mrq-w8pv-5pvq | Anchore CVE | Medium | antisamy-1.5.13 |
GHSA-rggv-cv7r-mw98 | Anchore CVE | High | http2-common-9.4.35.v20201120 |
GHSA-jw7r-rxff-gv24 | Anchore CVE | Medium | apache-mime4j-core-0.8.2 |
GHSA-4g9r-vxhx-9pgx | Anchore CVE | High | commons-compress-1.19 |
GHSA-qppj-fm5r-hxr3 | Anchore CVE | Medium | http2-common-9.4.35.v20201120 |
GHSA-qppj-fm5r-hxr3 | Anchore CVE | Medium | http2-server-9.4.35.v20201120 |
GHSA-qmgx-j96g-4428 | Anchore CVE | Medium | cxf-core-3.0.16 |
GHSA-2363-cqg2-863c | Anchore CVE | High | jdom-1.1.1 |
CVE-2022-2048 | Anchore CVE | High | jetty-http-8.1.15.v20140411 |
CVE-2021-28163 | Anchore CVE | Low | jetty-start-9.4.35.v20201120 |
CVE-2021-27905 | Anchore CVE | Critical | solr-core-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:42 |
GHSA-5ww9-j83m-q7qx | Anchore CVE | High | jackson-databind-2.3.3 |
CVE-2023-44487 | Anchore CVE | High | jetty-io-8.1.15.v20140411 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-continuation-8.1.15.v20140411 |
CVE-2021-34428 | Anchore CVE | Low | jetty-servlet-8.1.15.v20140411 |
GHSA-2cqf-6xv9-f22w | Anchore CVE | High | elasticsearch-5.6.3 |
GHSA-q5r4-cfpx-h6fh | Anchore CVE | Medium | ant-1.6.0 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-http-8.1.15.v20140411 |
GHSA-cggj-fvv3-cqwv | Anchore CVE | Critical | jackson-databind-2.3.3 |
GHSA-mph4-vhrx-mv67 | Anchore CVE | Medium | jackson-databind-2.3.3 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-start-9.4.35.v20201120 |
CVE-2017-7656 | Anchore CVE | High | jetty-http-8.1.15.v20140411 |
CVE-2017-9735 | Anchore CVE | High | jetty-servlet-8.1.15.v20140411 |
GHSA-8w26-6f25-cm9x | Anchore CVE | High | jackson-databind-2.3.3 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-http-8.1.15.v20140411 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-start-9.4.35.v20201120 |
GHSA-5949-rw7g-wx7w | Anchore CVE | High | jackson-databind-2.3.3 |
CVE-2020-27216 | Anchore CVE | High | jetty-io-8.1.15.v20140411 |
GHSA-r3gr-cxrf-hg25 | Anchore CVE | High | jackson-databind-2.3.3 |
GHSA-ww97-9w65-2crx | Anchore CVE | Medium | solr-core-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:42 |
GHSA-cf6r-3wgc-h863 | Anchore CVE | High | jackson-databind-2.3.3 |
GHSA-xhcq-fv7x-grr2 | Anchore CVE | Critical | solr-core-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:42 |
CVE-2021-28165 | Anchore CVE | High | jetty-http-8.1.15.v20140411 |
GHSA-673j-qm5f-xpv8 | Anchore CVE | Medium | postgresql-42.2.14 |
CVE-2023-44487 | Anchore CVE | High | jetty-start-9.4.35.v20201120 |
GHSA-fmmc-742q-jg75 | Anchore CVE | Critical | jackson-databind-2.3.3 |
CVE-2023-36478 | Anchore CVE | High | jetty-start-9.4.35.v20201120 |
GHSA-v585-23hc-c647 | Anchore CVE | High | jackson-databind-2.3.3 |
GHSA-jgcr-fg3g-qvw8 | Anchore CVE | High | solr-core-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:42 |
GHSA-62ww-4p3p-7fhj | Anchore CVE | Medium | elasticsearch-5.6.3 |
GHSA-wrvw-hg22-4m67 | Anchore CVE | High | protobuf-java-2.4.1 |
CVE-2018-11802 | Anchore CVE | Medium | solr-solrj-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:50 |
GHSA-6fpp-rgj9-8rwc | Anchore CVE | Critical | jackson-databind-2.3.3 |
GHSA-fqwf-pjwf-7vqv | Anchore CVE | High | jackson-databind-2.3.3 |
GHSA-f3j5-rmmp-3fc5 | Anchore CVE | Critical | jackson-databind-2.3.3 |
GHSA-vgg8-72f2-qm23 | Anchore CVE | Critical | jetty-server-8.1.15.v20140411 |
GHSA-77rm-9x9h-xj3g | Anchore CVE | High | protobuf-java-2.4.1 |
GHSA-9gph-22xh-8x98 | Anchore CVE | High | jackson-databind-2.3.3 |
CVE-2021-29943 | Anchore CVE | Critical | solr-solrj-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:50 |
CVE-2022-2047 | Anchore CVE | Low | jetty-servlet-8.1.15.v20140411 |
GHSA-w3f4-3q6j-rh82 | Anchore CVE | High | jackson-databind-2.3.3 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-servlet-8.1.15.v20140411 |
GHSA-hr2c-p8rh-238h | Anchore CVE | High | axis-1.2.1 2243 June 14 2005 |
GHSA-fg2v-w576-w4v3 | Anchore CVE | High | json-smart-1.3.1 |
CVE-2022-2048 | Anchore CVE | High | jetty-server-8.1.15.v20140411 |
GHSA-8c4j-34r4-xr8g | Anchore CVE | High | jackson-databind-2.3.3 |
GHSA-h4h5-3hr4-j3g2 | Anchore CVE | Medium | protobuf-java-2.4.1 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-servlet-8.1.15.v20140411 |
GHSA-84q7-p226-4x5w | Anchore CVE | High | jetty-server-8.1.15.v20140411 |
CVE-2017-7658 | Anchore CVE | Critical | jetty-servlet-8.1.15.v20140411 |
GHSA-r9fv-qpm9-rj4g | Anchore CVE | High | elasticsearch-5.6.3 |
CVE-2021-34428 | Anchore CVE | Low | jetty-io-8.1.15.v20140411 |
CVE-2020-27216 | Anchore CVE | High | jetty-http-8.1.15.v20140411 |
GHSA-vfqx-33qm-g869 | Anchore CVE | High | jackson-databind-2.3.3 |
GHSA-j346-h5wc-rw2m | Anchore CVE | Medium | solr-core-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:42 |
CVE-2023-44487 | Anchore CVE | High | solr-solrj-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:50 |
CVE-2005-4849 | Anchore CVE | Medium | derbyrun- |
CVE-2023-26048 | Anchore CVE | Medium | jetty-io-8.1.15.v20140411 |
GHSA-rpr3-cw39-3pxh | Anchore CVE | High | jackson-databind-2.3.3 |
CVE-2017-9735 | Anchore CVE | High | jetty-io-8.1.15.v20140411 |
GHSA-wfcc-pff6-rgc5 | Anchore CVE | High | jetty-server-8.1.15.v20140411 |
GHSA-gvpg-vgmx-xg6w | Anchore CVE | Medium | nimbus-jose-jwt-8.2.1 |
CVE-2017-7658 | Anchore CVE | Critical | jetty-io-8.1.15.v20140411 |
GHSA-cqgv-256r-m9r8 | Anchore CVE | Medium | elasticsearch-5.6.3 |
GHSA-fj32-6v7m-57pg | Anchore CVE | High | elasticsearch-5.6.3 |
CVE-2009-4269 | Anchore CVE | Low | derbynet- |
GHSA-4gg5-vx3j-xwc7 | Anchore CVE | High | protobuf-java-2.4.1 |
CVE-2023-44487 | Anchore CVE | High | jetty-continuation-8.1.15.v20140411 |
GHSA-m6cp-vxjx-65j6 | Anchore CVE | Low | jetty-server-8.1.15.v20140411 |
GHSA-h3cw-g4mq-c5x2 | Anchore CVE | High | jackson-databind-2.3.3 |
CVE-2022-2048 | Anchore CVE | High | jetty-servlet-8.1.15.v20140411 |
GHSA-96jq-75wh-2658 | Anchore CVE | Medium | axis-1.2.1 2243 June 14 2005 |
CVE-2020-27216 | Anchore CVE | High | jetty-servlet-8.1.15.v20140411 |
GHSA-493p-pfq6-5258 | Anchore CVE | High | json-smart-1.3.1 |
GHSA-cj7v-27pg-wf7q | Anchore CVE | Low | jetty-http-8.1.15.v20140411 |
CVE-2023-44487 | Anchore CVE | High | jetty-server-8.1.15.v20140411 |
GHSA-387v-84cv-9qmc | Anchore CVE | High | solr-core-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:42 |
GHSA-7vx9-xjhr-rw6h | Anchore CVE | Medium | jetty-server-8.1.15.v20140411 |
GHSA-rgv9-q543-rqg4 | Anchore CVE | High | jackson-databind-2.3.3 |
CVE-2021-34428 | Anchore CVE | Low | jetty-start-9.4.35.v20201120 |
CVE-2020-13941 | Anchore CVE | High | solr-core-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:42 |
CVE-2023-44487 | Anchore CVE | High | jetty-util-8.1.15.v20140411 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-http-8.1.15.v20140411 |
GHSA-cmfg-87vq-g5g4 | Anchore CVE | Medium | jackson-databind-2.3.3 |
CVE-2017-7656 | Anchore CVE | High | jetty-servlet-8.1.15.v20140411 |
GHSA-57j2-w4cx-62h2 | Anchore CVE | High | jackson-databind-2.3.3 |
GHSA-mjpc-qx7h-r8c9 | Anchore CVE | Medium | elasticsearch-5.6.3 |
GHSA-r695-7vr9-jgc2 | Anchore CVE | High | jackson-databind-2.3.3 |
CVE-2022-2048 | Anchore CVE | High | jetty-io-8.1.15.v20140411 |
CVE-2022-42003 | Anchore CVE | High | jackson-databind-2.3.3 |
CVE-2022-2047 | Anchore CVE | Low | jetty-server-8.1.15.v20140411 |
GHSA-qr7j-h6gg-jmgc | Anchore CVE | Critical | jackson-databind-2.3.3 |
CVE-2017-3164 | Anchore CVE | High | solr-solrj-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:50 |
CVE-2023-44487 | Anchore CVE | High | solr-core-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:42 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-start-9.4.35.v20201120 |
GHSA-r38f-c4h4-hqq2 | Anchore CVE | High | postgresql-42.2.14 |
GHSA-m6x4-97wx-4q27 | Anchore CVE | High | jackson-databind-2.3.3 |
GHSA-9m6f-7xcq-8vf8 | Anchore CVE | High | jackson-databind-2.3.3 |
CVE-2019-0192 | Anchore CVE | Critical | solr-solrj-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:50 |
GHSA-r68h-jhhj-9jvm | Twistlock CVE | High | org.owasp.esapi_esapi-2.2.1.1 |
CVE-2023-51441 | Twistlock CVE | High | axis-1.2.1 |
CVE-2018-3824 | Twistlock CVE | Medium | elasticsearch-5.6.3 |
CVE-2024-23635 | Twistlock CVE | Medium | org.owasp.antisamy_antisamy-1.5.13 |
CVE-2024-1597 | Twistlock CVE | Critical | org.postgresql_postgresql-42.2.14 |
CVE-2024-21742 | Twistlock CVE | Medium | org.apache.james_apache-mime4j-core-0.8.2 |
CVE-2017-7658 | Twistlock CVE | Critical | org.eclipse.jetty_jetty-server-8.1.15.v20140411 |
CVE-2017-7657 | Twistlock CVE | Critical | org.eclipse.jetty_jetty-server-8.1.15.v20140411 |
CVE-2019-20445 | Twistlock CVE | Medium | io.netty_netty-3.5.8.Final |
CVE-2019-20444 | Twistlock CVE | Critical | io.netty_netty-3.5.8.Final |
CVE-2024-22201 | Twistlock CVE | High | org.eclipse.jetty.http2_http2-common-9.4.35.v20201120 |
CVE-2023-36478 | Twistlock CVE | High | org.eclipse.jetty.http2_http2-hpack-9.4.35.v20201120 |
CVE-2022-2048 | Twistlock CVE | High | org.eclipse.jetty.http2_http2-server-9.4.35.v20201120 |
CVE-2021-37137 | Twistlock CVE | High | io.netty_netty-3.5.8.Final |
CVE-2021-37136 | Twistlock CVE | High | io.netty_netty-3.5.8.Final |
CVE-2021-28165 | Twistlock CVE | High | org.eclipse.jetty_jetty-server-8.1.15.v20140411 |
CVE-2021-28165 | Twistlock CVE | High | org.eclipse.jetty_jetty-server-9.4.12.v20180830 |
CVE-2021-28165 | Twistlock CVE | High | org.eclipse.jetty_jetty-server-9.4.35.v20201120 |
CVE-2017-9735 | Twistlock CVE | High | org.eclipse.jetty_jetty-server-8.1.15.v20140411 |
CVE-2017-7656 | Twistlock CVE | High | org.eclipse.jetty_jetty-server-8.1.15.v20140411 |
CVE-2015-2156 | Twistlock CVE | High | io.netty_netty-3.5.8.Final |
CVE-2015-2080 | Twistlock CVE | High | org.eclipse.jetty_jetty-server-8.1.15.v20140411 |
CVE-2022-23437 | Twistlock CVE | Medium | xerces_xercesImpl-2.12.0 |
CVE-2021-43797 | Twistlock CVE | Medium | io.netty_netty-3.5.8.Final |
CVE-2019-10241 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-8.1.15.v20140411 |
CVE-2019-10241 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.12.v20180830 |
CVE-2021-21409 | Twistlock CVE | Medium | io.netty_netty-3.5.8.Final |
CVE-2021-21295 | Twistlock CVE | Medium | io.netty_netty-3.5.8.Final |
CVE-2021-21290 | Twistlock CVE | Medium | io.netty_netty-3.5.8.Final |
CVE-2023-40167 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-http-9.4.35.v20201120 |
CVE-2023-40167 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-http-9.4.12.v20180830 |
CVE-2023-26048 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-8.1.15.v20140411 |
CVE-2023-26048 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.12.v20180830 |
CVE-2023-26048 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.35.v20201120 |
CVE-2021-28169 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-servlets-9.4.35.v20201120 |
CVE-2021-28169 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-servlets-9.4.12.v20180830 |
CVE-2020-27223 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.12.v20180830 |
CVE-2020-27223 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.35.v20201120 |
CVE-2020-14338 | Twistlock CVE | Medium | xerces_xercesImpl-2.12.0 |
CVE-2019-10247 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-8.1.15.v20140411 |
CVE-2019-10247 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.12.v20180830 |
CVE-2019-10246 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.12.v20180830 |
CVE-2020-27218 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-server-9.4.12.v20180830 |
GHSA-58qw-p7qm-5rvh | Twistlock CVE | Low | org.eclipse.jetty_jetty-xml-9.4.12.v20180830 |
GHSA-58qw-p7qm-5rvh | Twistlock CVE | Low | org.eclipse.jetty_jetty-xml-9.4.35.v20201120 |
CVE-2020-9488 | Twistlock CVE | Low | org.apache.logging.log4j_log4j-1.2-api-2 |
CVE-2023-41900 | Twistlock CVE | Low | org.eclipse.jetty_jetty-openid-9.4.35.v20201120 |
CVE-2023-36479 | Twistlock CVE | Low | org.eclipse.jetty_jetty-servlets-9.4.35.v20201120 |
CVE-2023-36479 | Twistlock CVE | Low | org.eclipse.jetty_jetty-servlets-9.4.12.v20180830 |
CVE-2021-34428 | Twistlock CVE | Low | org.eclipse.jetty_jetty-server-9.4.12.v20180830 |
CVE-2021-34428 | Twistlock CVE | Low | org.eclipse.jetty_jetty-server-9.4.35.v20201120 |
CVE-2021-34428 | Twistlock CVE | Low | org.eclipse.jetty_jetty-server-8.1.15.v20140411 |
CVE-2022-2047 | Twistlock CVE | Low | org.eclipse.jetty_jetty-http-8.1.15.v20140411 |
CVE-2022-2047 | Twistlock CVE | Low | org.eclipse.jetty_jetty-http-9.4.12.v20180830 |
CVE-2022-2047 | Twistlock CVE | Low | org.eclipse.jetty_jetty-http-9.4.35.v20201120 |
CVE-2021-28163 | Twistlock CVE | Low | org.eclipse.jetty_jetty-deploy-9.4.35.v20201120 |
CVE-2023-26049 | Twistlock CVE | Low | org.eclipse.jetty_jetty-server-8.1.15.v20140411 |
CVE-2023-26049 | Twistlock CVE | Low | org.eclipse.jetty_jetty-server-9.4.35.v20201120 |
CVE-2023-26049 | Twistlock CVE | Low | org.eclipse.jetty_jetty-server-9.4.12.v20180830 |
CVE-2023-44487 | Twistlock CVE | Medium | org.eclipse.jetty.http2_http2-common-9.4.35.v20201120 |
CVE-2023-44487 | Twistlock CVE | Medium | org.eclipse.jetty.http2_http2-server-9.4.35.v20201120 |
CVE-2024-28752 | Twistlock CVE | Medium | org.apache.cxf_cxf-core-3.0.16 |
CVE-2023-52428 | Twistlock CVE | Medium | com.nimbusds_nimbus-jose-jwt-8.2.1 |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-15.0 |
GHSA-85cw-hj65-qqv9 | Anchore CVE | Critical | jackson-databind-2.3.3 |
CVE-2017-7658 | Anchore CVE | Critical | jetty-http-8.1.15.v20140411 |
GHSA-ghgj-3xqr-6jfm | Anchore CVE | High | jetty-server-8.1.15.v20140411 |
GHSA-mx7p-6679-8g3q | Anchore CVE | Critical | jackson-databind-2.3.3 |
CVE-2022-2048 | Anchore CVE | High | jetty-start-9.4.35.v20201120 |
CVE-2021-28165 | Anchore CVE | High | jetty-start-9.4.35.v20201120 |
GHSA-qxxx-2pp7-5hmx | Anchore CVE | Critical | jackson-databind-2.3.3 |
GHSA-3393-hvrj-w7v3 | Anchore CVE | Medium | elasticsearch-5.6.3 |
GHSA-v528-7hrm-frqp | Anchore CVE | Medium | json-smart-1.3.1 |
GHSA-r53v-vm87-f72c | Anchore CVE | Medium | axis-1.2.1 2243 June 14 2005 |
CVE-2017-3163 | Anchore CVE | High | solr-solrj-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:50 |
CVE-2017-9735 | Anchore CVE | High | jetty-http-8.1.15.v20140411 |
GHSA-4w82-r329-3q67 | Anchore CVE | Critical | jackson-databind-2.3.3 |
GHSA-3gm7-v7vw-866c | Anchore CVE | High | solr-core-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:42 |
GHSA-h9gj-rqrw-x4fq | Anchore CVE | High | axis-1.2.1 2243 June 14 2005 |
GHSA-j8jw-g6fq-mp7h | Anchore CVE | High | hibernate-core-5.2.11-SNAPSHOT |
GHSA-26vr-8j45-3r4w | Anchore CVE | High | jetty-server-8.1.15.v20140411 |
GHSA-rfx6-vp9g-rh7v | Anchore CVE | Critical | jackson-databind-2.3.3 |
GHSA-gwp4-hfv6-p7hw | Anchore CVE | High | jackson-databind-2.3.3 |
GHSA-6x9x-8qw9-9pp6 | Anchore CVE | Critical | jetty-server-8.1.15.v20140411 |
GHSA-p43x-xfjf-5jhr | Anchore CVE | Critical | jackson-databind-2.3.3 |
GHSA-3pph-2595-cgfh | Anchore CVE | High | solr-core-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:42 |
GHSA-v7wg-cpwc-24m4 | Anchore CVE | High | postgresql-42.2.14 |
GHSA-4p6w-m9wc-c9c9 | Anchore CVE | Medium | ant-1.6.0 |
CVE-2021-34428 | Anchore CVE | Low | jetty-http-8.1.15.v20140411 |
GHSA-cjjf-94ff-43w7 | Anchore CVE | High | jackson-databind-2.3.3 |
GHSA-rc2w-r4jq-7pfx | Anchore CVE | High | xalan-2.7.1 |
CVE-2015-8797 | Anchore CVE | Medium | solr-solrj-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:50 |
GHSA-v6gf-x8fp-532v | Anchore CVE | Medium | solr-core-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:42 |
CVE-2022-2047 | Anchore CVE | Low | jetty-start-9.4.35.v20201120 |
GHSA-645p-88qh-w398 | Anchore CVE | Critical | jackson-databind-2.3.3 |
GHSA-h592-38cm-4ggp | Anchore CVE | Critical | jackson-databind-2.3.3 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-servlet-8.1.15.v20140411 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-15.0 |
CVE-2019-17558 | Anchore CVE | High | solr-solrj-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:50 |
GHSA-vrh8-27q8-fr8f | Anchore CVE | High | solr-core-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:42 |
GHSA-4gq5-ch57-c2mg | Anchore CVE | Critical | jackson-databind-2.3.3 |
GHSA-5r5r-6hpj-8gg9 | Anchore CVE | High | jackson-databind-2.3.3 |
CVE-2018-1308 | Anchore CVE | High | solr-solrj-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:50 |
GHSA-g5ww-5jh7-63cx | Anchore CVE | High | protobuf-java-2.4.1 |
GHSA-9339-86wc-4qgf | Anchore CVE | High | xalan-2.7.1 |
GHSA-gww7-p5w4-wrfv | Anchore CVE | Critical | jackson-databind-2.3.3 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-start-9.4.35.v20201120 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-security-8.1.15.v20140411 |
GHSA-p26g-97m4-6q7c | Anchore CVE | Low | jetty-server-8.1.15.v20140411 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-util-8.1.15.v20140411 |
CVE-2021-28165 | Anchore CVE | High | jetty-servlet-8.1.15.v20140411 |
CVE-2005-4849 | Anchore CVE | Medium | derbynet- |
CVE-2009-4269 | Anchore CVE | Low | derbyrun- |
GHSA-cvm9-fjm9-3572 | Anchore CVE | High | jackson-databind-2.3.3 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.3.3 |
GHSA-rmqp-9w4c-gc7w | Anchore CVE | Critical | axis-1.2.1 2243 June 14 2005 |
CVE-2019-0193 | Anchore CVE | High | solr-solrj-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:50 |
GHSA-mvr2-9pj6-7w5j | Anchore CVE | Medium | guava-15.0 |
GHSA-562r-vg33-8x8h | Anchore CVE | Medium | postgresql-42.2.14 |
GHSA-jqm6-m3j3-8gg9 | Anchore CVE | Medium | elasticsearch-5.6.3 |
GHSA-g9fw-9x87-rmrj | Anchore CVE | Low | elasticsearch-5.6.3 |
GHSA-24rp-q3w6-vc56 | Anchore CVE | Critical | postgresql-42.2.14 |
GHSA-hr65-qq6p-87r4 | Anchore CVE | Medium | elasticsearch-5.6.3 |
CVE-2023-44487 | Anchore CVE | High | jetty-http-8.1.15.v20140411 |
GHSA-f9xh-2qgp-cq57 | Anchore CVE | High | jackson-databind-2.3.3 |
CVE-2021-28165 | Anchore CVE | High | jetty-io-8.1.15.v20140411 |
CVE-2017-7657 | Anchore CVE | Critical | jetty-io-8.1.15.v20140411 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-io-8.1.15.v20140411 |
GHSA-q93h-jc49-78gg | Anchore CVE | Critical | jackson-databind-2.3.3 |
CVE-2021-27905 | Anchore CVE | Critical | solr-solrj-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:50 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-server-8.1.15.v20140411 |
CVE-2021-29943 | Anchore CVE | Critical | solr-core-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:42 |
CVE-2023-44487 | Anchore CVE | High | jetty-security-8.1.15.v20140411 |
CVE-2017-7657 | Anchore CVE | Critical | jetty-http-8.1.15.v20140411 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-io-8.1.15.v20140411 |
CVE-2020-27216 | Anchore CVE | High | jetty-server-8.1.15.v20140411 |
CVE-2023-44487 | Anchore CVE | High | jetty-servlet-8.1.15.v20140411 |
GHSA-gjmw-vf9h-g25v | Anchore CVE | Critical | jackson-databind-2.3.3 |
GHSA-qw69-rqj8-6qw8 | Anchore CVE | Medium | jetty-server-8.1.15.v20140411 |
CVE-2020-13941 | Anchore CVE | High | solr-solrj-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:50 |
CVE-2021-29262 | Anchore CVE | High | solr-solrj-5.2.1-SNAPSHOT ${svnversion} - Administrator -2015-06-25 13:53:50 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-start-9.4.35.v20201120 |
CVE-2020-27223 | Anchore CVE | Medium | jetty-start-9.4.35.v20201120 |
GHSA-h822-r4r5-v8jg | Anchore CVE | Critical | jackson-databind-2.3.3 |
GHSA-c8hm-7hpq-7jhg | Anchore CVE | Critical | jackson-databind-2.3.3 |
GHSA-c77j-p484-h84m | Anchore CVE | Medium | elasticsearch-5.6.3 |
GHSA-wh8g-3j2c-rqj5 | Anchore CVE | High | jackson-databind-2.3.3 |
GHSA-qjw2-hr98-qgfh | Anchore CVE | High | jackson-databind-2.3.3 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-continuation-8.1.15.v20140411 |
CVE-2022-2047 | Anchore CVE | Low | jetty-io-8.1.15.v20140411 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-util-8.1.15.v20140411 |
GHSA-xc67-hjx6-cgg6 | Anchore CVE | Medium | jetty-server-8.1.15.v20140411 |
CVE-2017-7657 | Anchore CVE | Critical | jetty-servlet-8.1.15.v20140411 |
GHSA-727h-hrw8-jg8q | Anchore CVE | Low | postgresql-42.2.14 |
GHSA-55w9-c3g2-4rrh | Anchore CVE | Medium | axis-1.2.1 2243 June 14 2005 |
CVE-2017-7656 | Anchore CVE | High | jetty-io-8.1.15.v20140411 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-security-8.1.15.v20140411 |
CVE-2021-28169 | Anchore CVE | Medium | jetty-start-9.4.35.v20201120 |
GHSA-89qr-369f-5m5x | Anchore CVE | High | jackson-databind-2.3.3 |
CVE-2021-44548 | Twistlock CVE | Critical | org.apache.solr_solr-core-5.2.1-SNAPSHOT |
CVE-2021-27905 | Twistlock CVE | Critical | org.apache.solr_solr-core-5.2.1-SNAPSHOT |
CVE-2020-9548 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2020-9547 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2020-8840 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2019-20330 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2019-17531 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2019-17267 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2019-16943 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2019-16942 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2019-16335 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2019-14892 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2019-14540 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2019-14379 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2019-0192 | Twistlock CVE | Critical | org.apache.solr_solr-core-5.2.1-SNAPSHOT |
CVE-2018-14719 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2018-14718 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2018-11307 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2017-7658 | Twistlock CVE | Critical | org.eclipse.jetty_jetty-io-8.1.15.v20140411 |
CVE-2017-7657 | Twistlock CVE | Critical | org.eclipse.jetty_jetty-io-8.1.15.v20140411 |
CVE-2017-15095 | Twistlock CVE | Critical | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2021-29943 | Twistlock CVE | Critical | org.apache.solr_solr-core-5.2.1-SNAPSHOT |
CVE-2020-13941 | Twistlock CVE | High | org.apache.solr_solr-core-5.2.1-SNAPSHOT |
CVE-2020-10673 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2021-20190 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2021-20190 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.8.11.5 |
CVE-2020-36189 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.8.11.5 |
CVE-2020-36189 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2020-36188 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2020-36188 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.8.11.5 |
CVE-2020-36187 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2020-36187 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.8.11.5 |
CVE-2020-36186 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2020-36186 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.8.11.5 |
CVE-2020-36185 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.8.11.5 |
CVE-2020-36185 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2020-36184 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2020-36184 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.8.11.5 |
CVE-2020-36183 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.8.11.5 |
CVE-2020-36183 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2020-36182 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2020-36182 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.8.11.5 |
CVE-2020-36181 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2020-36181 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.8.11.5 |
CVE-2020-36180 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2020-36180 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.8.11.5 |
CVE-2020-36179 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.8.11.5 |
CVE-2020-36179 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2020-24750 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.8.11.5 |
CVE-2020-24750 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2020-24616 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2020-24616 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.8.11.5 |
CVE-2018-5968 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2023-46674 | Twistlock CVE | High | elasticsearch-5.6.3 |
CVE-2023-44487 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-9.4.35.v20201120 |
CVE-2023-44487 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-9.4.12.v20180830 |
CVE-2023-44487 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-8.1.15.v20140411 |
CVE-2023-44487 | Twistlock CVE | High | org.apache.solr_solr-core-5.2.1-SNAPSHOT |
CVE-2023-36478 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-9.4.35.v20201120 |
CVE-2023-36478 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-9.4.12.v20180830 |
CVE-2023-31418 | Twistlock CVE | High | elasticsearch-5.6.3 |
CVE-2022-2048 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-8.1.15.v20140411 |
CVE-2022-2048 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-9.4.12.v20180830 |
CVE-2022-2048 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-9.4.35.v20201120 |
CVE-2021-29262 | Twistlock CVE | High | org.apache.solr_solr-core-5.2.1-SNAPSHOT |
CVE-2021-28165 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-8.1.15.v20140411 |
CVE-2021-28165 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-9.4.12.v20180830 |
CVE-2021-28165 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-9.4.35.v20201120 |
CVE-2019-17558 | Twistlock CVE | High | org.apache.solr_solr-core-5.2.1-SNAPSHOT |
CVE-2019-14439 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2019-12086 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2018-1308 | Twistlock CVE | High | org.apache.solr_solr-core-5.2.1-SNAPSHOT |
CVE-2018-12022 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2017-9735 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-8.1.15.v20140411 |
CVE-2017-7656 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-8.1.15.v20140411 |
CVE-2017-3164 | Twistlock CVE | High | org.apache.solr_solr-core-5.2.1-SNAPSHOT |
CVE-2017-3163 | Twistlock CVE | High | org.apache.solr_solr-core-5.2.1-SNAPSHOT |
CVE-2020-25638 | Twistlock CVE | High | org.hibernate_hibernate-core-5.2.11-SNAPSHOT |
CVE-2019-0193 | Twistlock CVE | High | org.apache.solr_solr-core-5.2.1-SNAPSHOT |
CVE-2020-27216 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-9.4.12.v20180830 |
CVE-2020-27216 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-8.1.15.v20140411 |
CVE-2019-14900 | Twistlock CVE | Medium | org.hibernate_hibernate-core-5.2.11-SNAPSHOT |
CVE-2019-10241 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.12.v20180830 |
CVE-2015-8797 | Twistlock CVE | Medium | org.apache.solr_solr-core-5.2.1-SNAPSHOT |
CVE-2015-8796 | Twistlock CVE | Medium | org.apache.solr_solr-core-5.2.1-SNAPSHOT |
CVE-2019-12814 | Twistlock CVE | Medium | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2019-12384 | Twistlock CVE | Medium | com.fasterxml.jackson.core_jackson-databind-2.3.3 |
CVE-2024-25710 | Twistlock CVE | Medium | org.apache.commons_commons-compress-1.19 |
CVE-2023-40167 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.35.v20201120 |
CVE-2023-40167 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.12.v20180830 |
CVE-2023-26049 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.35.v20201120 |
CVE-2023-26049 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-8.1.15.v20140411 |
CVE-2023-26049 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.12.v20180830 |
CVE-2023-26048 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.35.v20201120 |
CVE-2023-26048 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-8.1.15.v20140411 |
CVE-2023-26048 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.12.v20180830 |
CVE-2021-28169 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.35.v20201120 |
CVE-2021-28169 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-8.1.15.v20140411 |
CVE-2021-28169 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.12.v20180830 |
CVE-2020-27223 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.12.v20180830 |
CVE-2020-27223 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.35.v20201120 |
CVE-2019-10247 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-8.1.15.v20140411 |
CVE-2019-10247 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.12.v20180830 |
CVE-2020-27218 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.12.v20180830 |
CVE-2023-41900 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.35.v20201120 |
CVE-2023-36479 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.12.v20180830 |
CVE-2023-36479 | Twistlock CVE | Medium | org.eclipse.jetty_jetty-io-9.4.35.v20201120 |
CVE-2018-11802 | Twistlock CVE | Medium | org.apache.solr_solr-core-5.2.1-SNAPSHOT |
CVE-2021-34428 | Twistlock CVE | Low | org.eclipse.jetty_jetty-io-9.4.12.v20180830 |
CVE-2021-34428 | Twistlock CVE | Low | org.eclipse.jetty_jetty-io-8.1.15.v20140411 |
CVE-2021-34428 | Twistlock CVE | Low | org.eclipse.jetty_jetty-io-9.4.35.v20201120 |
CVE-2022-2047 | Twistlock CVE | Low | org.eclipse.jetty_jetty-io-9.4.12.v20180830 |
CVE-2022-2047 | Twistlock CVE | Low | org.eclipse.jetty_jetty-io-9.4.35.v20201120 |
CVE-2022-2047 | Twistlock CVE | Low | org.eclipse.jetty_jetty-io-8.1.15.v20140411 |
CVE-2021-28163 | Twistlock CVE | Low | org.eclipse.jetty_jetty-io-9.4.35.v20201120 |
VAT: https://vat.dso.mil/vat/image?imageName=ortussolutions/commandbox-adobe2018&tag=1.2.1&branch=master
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=ortussolutions/commandbox-adobe2018&tag=1.2.1&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.