Running with gitlab-runner 13.8.0 (775dd39d)  on dsop-shared-gitlab-runner-f887cbcbd-srgz6 E82_g8RG section_start:1627932381:resolve_secrets Resolving secrets section_end:1627932381:resolve_secrets section_start:1627932381:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner-ironbank-dsop WARNING: Pulling GitLab Runner helper image from Docker Hub. Helper image is migrating to registry.gitlab.com, for more information see https://docs.gitlab.com/runner/configuration/advanced-configuration.html#migrating-helper-image-to-registrygitlabcom Using Kubernetes executor with image registry1.dso.mil/ironbank/ironbank-pipelines/pipeline-runner:0.3 ... section_end:1627932382:prepare_executor section_start:1627932382:prepare_script Preparing environment Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-445-concurrent-0rzfcq to be running, status is Pending Waiting for pod gitlab-runner-ironbank-dsop/runner-e82g8rg-project-445-concurrent-0rzfcq to be running, status is Pending ContainersNotReady: "containers with unready status: [build helper istio-proxy]" ContainersNotReady: "containers with unready status: [build helper istio-proxy]" Running on runner-e82g8rg-project-445-concurrent-0rzfcq via dsop-shared-gitlab-runner-f887cbcbd-srgz6... section_end:1627932388:prepare_script section_start:1627932388:get_sources Getting source from Git repository $ until [ $(curl --fail --silent --output /dev/stderr --write-out "%{http_code}" localhost:15020/healthz/ready) -eq 200 ]; do echo Waiting for Sidecar; sleep 3 ; done ; echo Sidecar available; Sidecar available Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/dsop/parasoft/parasoft/dtp/.git/ Created fresh repository. Checking out 7da53213 as development... Skipping object checkout, Git LFS is not installed. Skipping Git submodules setup section_end:1627932388:get_sources section_start:1627932388:download_artifacts Downloading artifacts Downloading artifacts for anchore-scan (5329161)... Downloading artifacts from coordinator... ok  id=5329161 responseStatus=200 OK token=5Lh9MeN7 WARNING: ci-artifacts/scan-results/anchore/: lchown ci-artifacts/scan-results/anchore/: operation not permitted (suppressing repeats) Downloading artifacts for hardening-manifest (5329156)... Downloading artifacts from coordinator... ok  id=5329156 responseStatus=200 OK token=3EwFhV9Y WARNING: ci-artifacts/preflight/: lchown ci-artifacts/preflight/: operation not permitted (suppressing repeats) Downloading artifacts for load-scripts (5329153)... Downloading artifacts from coordinator... ok  id=5329153 responseStatus=200 OK token=crNy9yVc WARNING: ci-artifacts/[MASKED]/: lchown ci-artifacts/[MASKED]/: operation not permitted (suppressing repeats) Downloading artifacts for openscap-compliance (5329162)... Downloading artifacts from coordinator... ok  id=5329162 responseStatus=200 OK token=EWu-v8zy WARNING: ci-artifacts/scan-results/openscap/: lchown ci-artifacts/scan-results/openscap/: operation not permitted (suppressing repeats) Downloading artifacts for twistlock-scan (5329163)... Downloading artifacts from coordinator... ok  id=5329163 responseStatus=200 OK token=8HjL9oQs WARNING: ci-artifacts/scan-results/twistlock/: lchown ci-artifacts/scan-results/twistlock/: operation not permitted (suppressing repeats) Downloading artifacts for wl-compare-lint (5329157)... Downloading artifacts from coordinator... ok  id=5329157 responseStatus=200 OK token=UJ7oGWyX WARNING: ci-artifacts/lint/: lchown ci-artifacts/lint/: operation not permitted (suppressing repeats) section_end:1627932389:download_artifacts section_start:1627932389:step_script Executing "step_script" stage of the job script $ pip3 install jsonschema # collapsed multi-line command Requirement already satisfied: jsonschema in /usr/local/lib/python3.9/site-packages (3.2.0) Requirement already satisfied: six>=1.11.0 in /usr/local/lib/python3.9/site-packages (from jsonschema) (1.15.0) Requirement already satisfied: pyrsistent>=0.14.0 in /usr/local/lib/python3.9/site-packages (from jsonschema) (0.17.3) Requirement already satisfied: attrs>=17.4.0 in /usr/local/lib/python3.9/site-packages (from jsonschema) (21.2.0) Requirement already satisfied: setuptools in /usr/local/lib/python3.9/site-packages (from jsonschema) (56.1.0) WARNING: Running pip as root will break packages and permissions. You should install packages reliably by using venv: https://pip.pypa.io/warnings/venv WARNING: You are using pip version 21.1.1; however, version 21.2.2 is available. You should consider upgrading via the '/usr/local/bin/python3.9 -m pip install --upgrade pip' command. INFO: Log level set to info INFO: Number of whitelisted vulnerabilities: 118 INFO: Whitelisted vulnerabilities: {Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-minimal-langpack-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-33574', package='glibc-common-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22923', package='libcurl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='python3-hawkey-0.55.0-7.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27218', package='glib2-2.56.4-10.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-build-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-build-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_comp', cve_id='463a9a24225c26f7a5bf3f38908e5cb3', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22922', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-33574', package='glibc-minimal-langpack-2.28-151.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-14155', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-16135', package='libssh-0.9.4-2.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-27218', package='glib2-2.56.4-10.el8_4', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-28153', package='glib2-2.56.4-10.el8_4', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-33574', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3426', package='platform-python-3.6.8-37.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='python3-rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22924', package='libcurl-7.61.1-18.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82368-2', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35942', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20232', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_comp', cve_id='3e5fad1c039f3ecfd1dcdc94d2f1f9a0', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='3456a263793066e9b5063ada6e47917d', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35939', package='rpm-build-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-36084', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-33560', package='libgcrypt-1.8.5-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3426', package='python3-libs-3.6.8-37.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20232', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-16135', package='libssh-config-0.9.4-2.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3421', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2019-20838', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3580', package='nettle-3.4.1-4.el8_3', package_path=None), Finding(scan_source='anchore_comp', cve_id='c2e44319ae5b3b040044d8ae116d1c2f', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82949-9', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82880-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35942', package='glibc-minimal-langpack-2.28-151.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='698044205a9c4a6d48b7937e66a6bf4f', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23841', package='openssl-libs-1.1.1g-15.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22925', package='libcurl-7.61.1-18.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-36085', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-36222', package='krb5-libs-1.18.2-8.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82474-8', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3572', package='python3-pip-wheel-9.0.3-19.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-80938-4', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22924', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82472-2', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35937', package='python3-rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-22898', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35939', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-36087', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82395-5', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-36084', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-22876', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-33560', package='libgcrypt-1.8.5-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-36086', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22922', package='libcurl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22923', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82959-8', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-36087', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35942', package='glibc-common-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-20838', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='320a97c6816565eedf3545833df99dd0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='python3-libdnf-0.55.0-7.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82360-9', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20266', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35938', package='python3-rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35937', package='rpm-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_comp', cve_id='abb121e9621abdd452f65844954cf1c1', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35939', package='python3-rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_comp', cve_id='34de21e516c0ca50a96e5386f163f8bf', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35937', package='rpm-build-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82168-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='libdnf-0.55.0-7.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22925', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-36085', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20231', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_comp', cve_id='e7573262736ef52353cde3bae2617782', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23840', package='openssl-libs-1.1.1g-15.el8_3', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82473-0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35938', package='rpm-build-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22898', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35938', package='rpm-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82267-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22898', package='libcurl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22876', package='libcurl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='639f6f1177735759703e928c14714a59', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35939', package='rpm-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28153', package='glib2-2.56.4-10.el8_4', package_path=None), Finding(scan_source='anchore_comp', cve_id='c4ad80832b361f81df2a31e5b6b09864', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82214-8', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82985-3', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3200', package='libsolv-0.7.16-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35937', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-16135', package='libssh-0.9.4-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='python3-rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82220-5', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='bcd159901fe47efddae5c095b4b0d7fd', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-80935-0', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20231', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-33574', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3200', package='libsolv-0.7.16-2.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82494-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-common-2.28-151.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-35942', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35938', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-83401-0', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='addbb93c22e9b0988b8b40392a4538cb', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82979-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-14155', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-36086', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3445', package='libdnf-0.55.0-7.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-24370', package='lua-libs-5.3.4-11.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22876', package='curl-7.61.1-18.el8', package_path=None)} INFO: Vulnerabilities found in scanning stage: 217 INFO: {Finding(scan_source='anchore_cve', cve_id='CVE-2015-5262', package='commons-httpclient-3.1', package_path='/usr/local/parasoft/dtp/tomcat/webapps/grs/WEB-INF/lib/commons-httpclient-3.1.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-33574', package='glibc-common-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-minimal-langpack-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22923', package='libcurl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='python3-hawkey-0.55.0-7.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27218', package='glib2-2.56.4-10.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-container-servlet-2.32.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-build-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22118', package='spring_framework-5.3.1', package_path='/usr/local/parasoft/dtp/lib/dc/spring-core.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-build-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/lib/dc/jersey-container-servlet.jar'), Finding(scan_source='anchore_comp', cve_id='463a9a24225c26f7a5bf3f38908e5cb3', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22922', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-33574', package='glibc-minimal-langpack-2.28-151.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-14155', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-28169', package='org.eclipse.jetty_jetty-io-9.4.38.v20210224', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-16135', package='libssh-0.9.4-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/lib/dc/jersey-common.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22118', package='spring_framework-5.3.1', package_path='/usr/local/parasoft/dtp/tomcat/webapps/grs/WEB-INF/lib/spring-core-5.3.1.jar'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-28153', package='glib2-2.56.4-10.el8_4', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-27218', package='glib2-2.56.4-10.el8_4', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-33574', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3426', package='platform-python-3.6.8-37.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-mvc-jsp-2.32.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-3.0.1', package_path='/usr/local/parasoft/dtp/plugins/builtin/com.parasoft.xtest.lic.client.jar:lib/licclientj.jar:jersey-proxy-client'), Finding(scan_source='anchore_cve', cve_id='GHSA-gwrp-pvrq-jmwv', package='commons-io-2.2', package_path='/usr/local/parasoft/dtp/plugins/builtin/org.apache.commons.io.jar:commons-io'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='python3-rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22924', package='libcurl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-c43q-5hpj-4crv', package='jersey-common-3.0.1', package_path='/usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/licclientj-1.0.0.202104051224-all.jar:jersey-common'), Finding(scan_source='anchore_cve', cve_id='CVE-2010-0684', package='activemq-1.1', package_path='/usr/local/parasoft/dtp/lib/dc/activemq-protobuf.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2011-4905', package='activemq-1.1', package_path='/usr/local/parasoft/dtp/lib/dc/activemq-protobuf.jar'), Finding(scan_source='oscap_comp', cve_id='CCE-82368-2', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-29425', package='commons-io_commons-io-2.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35942', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='VULNDB-58760', package='commons_vfs-1.0', package_path='/usr/local/parasoft/dtp/plugins/builtin/com.parasoft.xtest.common.jar:lib/commons-vfs.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-container-servlet-core-2.32.jar'), Finding(scan_source='anchore_cve', cve_id='VULNDB-58760', package='commons_vfs-1.0', package_path='/usr/local/parasoft/dtp/lib/dc/com.parasoft.xtest.common.jar:lib/commons-vfs.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/lib/dc/jersey-client.jar'), Finding(scan_source='anchore_cve', cve_id='GHSA-v528-7hrm-frqp', package='json-smart-2.3', package_path='/usr/local/parasoft/dtp/tomcat/webapps/tcm/WEB-INF/lib/json-smart-2.3.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/lib/dc/oauth2-client.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2010-1244', package='activemq-1.1', package_path='/usr/local/parasoft/dtp/lib/dc/activemq-protobuf.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2011-4905', package='activemq-1.1', package_path='/usr/local/parasoft/dtp/tomcat/webapps/grs/WEB-INF/lib/activemq-protobuf-1.1.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-mvc-2.32.jar'), Finding(scan_source='anchore_comp', cve_id='3e5fad1c039f3ecfd1dcdc94d2f1f9a0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-media-jaxb-2.32.jar'), Finding(scan_source='anchore_comp', cve_id='3456a263793066e9b5063ada6e47917d', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35939', package='rpm-build-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-36084', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-33560', package='libgcrypt-1.8.5-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2010-1244', package='activemq-1.1', package_path='/usr/local/parasoft/dtp/tomcat/webapps/grs/WEB-INF/lib/activemq-protobuf-1.1.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3426', package='python3-libs-3.6.8-37.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20232', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-16135', package='libssh-config-0.9.4-2.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3421', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-gwcr-j4wh-j3cq', package='jetty-servlets-9.4.38.v20210224', package_path='/usr/local/parasoft/dtp/lib/dc/jetty-servlets.jar'), Finding(scan_source='twistlock_cve', cve_id='CVE-2019-20838', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3580', package='nettle-3.4.1-4.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-c43q-5hpj-4crv', package='jersey-common-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-common-2.32.jar'), Finding(scan_source='anchore_cve', cve_id='GHSA-v528-7hrm-frqp', package='json-smart-2.3', package_path='/usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/json-smart-2.3.jar'), Finding(scan_source='anchore_comp', cve_id='c2e44319ae5b3b040044d8ae116d1c2f', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82949-9', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82880-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35942', package='glibc-minimal-langpack-2.28-151.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='698044205a9c4a6d48b7937e66a6bf4f', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-3.0.1', package_path='/usr/local/parasoft/dtp/plugins/builtin/com.parasoft.xtest.lic.client.jar:lib/licclientj.jar:jersey-common'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-mvc-2.32.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23841', package='openssl-libs-1.1.1g-15.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-v528-7hrm-frqp', package='json-smart-2.3', package_path='/usr/local/parasoft/dtp/lib/dc/json-smart.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/lib/dc/jersey-entity-filtering.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22925', package='libcurl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22118', package='spring_framework-5.3.1', package_path='/usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/spring-core-5.3.1.jar'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-36085', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-36222', package='krb5-libs-1.18.2-8.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28164', package='jetty-9.4.38.v20210224', package_path='/usr/local/parasoft/dtp/lib/dc/jetty-servlet.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22118', package='spring_framework-5.3.1', package_path='/usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/spring-core-5.3.1.jar'), Finding(scan_source='oscap_comp', cve_id='CCE-82474-8', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3572', package='python3-pip-wheel-9.0.3-19.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-v528-7hrm-frqp', package='json-smart-2.3', package_path='/usr/local/parasoft/dtp/tomcat/webapps/grs/WEB-INF/lib/json-smart-2.3.jar'), Finding(scan_source='oscap_comp', cve_id='CCE-80938-4', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22924', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-v528-7hrm-frqp', package='json-smart-2.3', package_path='/usr/local/parasoft/dtp/tomcat/webapps/pst/WEB-INF/lib/json-smart-2.3.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-common-2.32.jar'), Finding(scan_source='anchore_cve', cve_id='GHSA-v528-7hrm-frqp', package='json-smart-2.3', package_path='/usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/json-smart-2.3.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-client-2.32.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28164', package='jetty-9.4.38.v20210224', package_path='/usr/local/parasoft/dtp/lib/dc/jetty-servlets.jar'), Finding(scan_source='oscap_comp', cve_id='CCE-82472-2', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35937', package='python3-rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-22898', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-13956', package='commons-httpclient-3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/lib/dc/jersey-container-servlet-core.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/lib/dc/jersey-server.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35939', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-36087', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-3.0.1', package_path='/usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/licclientj-1.0.0.202104051224-all.jar:jersey-hk2'), Finding(scan_source='oscap_comp', cve_id='CCE-82395-5', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-36084', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-33560', package='libgcrypt-1.8.5-4.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-22876', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22118', package='spring_framework-5.3.1', package_path='/usr/local/parasoft/dtp/tomcat/webapps/pst/WEB-INF/lib/spring-core-5.3.1.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-36086', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='VULNDB-243848', package='commons-httpclient-3.1', package_path='/usr/local/parasoft/dtp/tomcat/webapps/grs/WEB-INF/lib/commons-httpclient-3.1.jar'), Finding(scan_source='anchore_cve', cve_id='GHSA-26vr-8j45-3r4w', package='jetty-io-9.4.38.v20210224', package_path='/usr/local/parasoft/dtp/lib/dc/jetty-io.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2012-6127', package='commons-httpclient-3.1', package_path='/usr/local/parasoft/dtp/tomcat/webapps/grs/WEB-INF/lib/commons-httpclient-3.1.jar'), Finding(scan_source='anchore_cve', cve_id='VULNDB-58760', package='commons_vfs-1.0', package_path='/usr/local/parasoft/dtp/tomcat/lib/com.parasoft.xtest.common.jar:lib/commons-vfs.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28164', package='jetty-9.4.38.v20210224', package_path='/usr/local/parasoft/dtp/lib/dc/jetty-continuation.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28164', package='jetty-9.4.38.v20210224', package_path='/usr/local/parasoft/dtp/lib/dc/jetty-http.jar'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-28163', package='org.eclipse.jetty_jetty-io-9.4.38.v20210224', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22922', package='libcurl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22923', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82959-8', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-36087', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35942', package='glibc-common-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-20838', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='320a97c6816565eedf3545833df99dd0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='python3-libdnf-0.55.0-7.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-33037', package='apache tomcat-9.0.45', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-media-jaxb-2.32.jar'), Finding(scan_source='oscap_comp', cve_id='CCE-82360-9', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20266', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2011-0739', package='mail-1.5.0', package_path='/usr/local/parasoft/dtp/plugins/builtin/javax.mail.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/lib/dc/jersey-media-json-jackson.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28164', package='jetty-9.4.38.v20210224', package_path='/usr/local/parasoft/dtp/lib/dc/jetty-util-ajax.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35938', package='python3-rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35937', package='rpm-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='VULNDB-87160', package='commons-httpclient-3.1', package_path='/usr/local/parasoft/dtp/tomcat/webapps/grs/WEB-INF/lib/commons-httpclient-3.1.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-media-multipart-2.32.jar'), Finding(scan_source='anchore_comp', cve_id='abb121e9621abdd452f65844954cf1c1', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-container-servlet-core-2.32.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/lib/dc/jersey-media-jaxb.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35939', package='python3-rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35937', package='rpm-build-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-spring5-2.32.jar'), Finding(scan_source='anchore_comp', cve_id='34de21e516c0ca50a96e5386f163f8bf', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82168-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28164', package='jetty-9.4.38.v20210224', package_path='/usr/local/parasoft/dtp/lib/dc/jetty-io.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='libdnf-0.55.0-7.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22925', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-36085', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-bean-validation-2.32.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28164', package='jetty-9.4.38.v20210224', package_path='/usr/local/parasoft/dtp/lib/dc/jetty-server.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-29425', package='commons_io-2.2', package_path='/usr/local/parasoft/dtp/plugins/builtin/org.apache.commons.io.jar:commons-io'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20231', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_comp', cve_id='e7573262736ef52353cde3bae2617782', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-c43q-5hpj-4crv', package='jersey-common-2.32', package_path='/usr/local/parasoft/dtp/lib/dc/jersey-common.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23840', package='openssl-libs-1.1.1g-15.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-3.0.1', package_path='/usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/licclientj-1.0.0.202104051224-all.jar:jersey-proxy-client'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/lib/dc/jersey-hk2.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-server-2.32.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-container-servlet-2.32.jar'), Finding(scan_source='oscap_comp', cve_id='CCE-82473-0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22876', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35938', package='rpm-build-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22898', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-common-2.32.jar'), Finding(scan_source='anchore_cve', cve_id='GHSA-c43q-5hpj-4crv', package='jersey-common-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-common-2.32.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35938', package='rpm-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82267-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22898', package='libcurl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22876', package='libcurl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='639f6f1177735759703e928c14714a59', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35939', package='rpm-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-hk2-2.32.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28153', package='glib2-2.56.4-10.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-3.0.1', package_path='/usr/local/parasoft/dtp/plugins/builtin/com.parasoft.xtest.lic.client.jar:lib/licclientj.jar:jersey-client'), Finding(scan_source='anchore_comp', cve_id='c4ad80832b361f81df2a31e5b6b09864', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82214-8', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-3.0.1', package_path='/usr/local/parasoft/dtp/plugins/builtin/com.parasoft.xtest.lic.client.jar:lib/licclientj.jar:jersey-hk2'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-34428', package='org.eclipse.jetty_jetty-io-9.4.38.v20210224', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2011-5034', package='geronimo-1.1.1', package_path='/usr/local/parasoft/dtp/lib/dc/geronimo-jms_1.1_spec.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/lib/dc/jersey-spring5.jar'), Finding(scan_source='anchore_cve', cve_id='GHSA-m6cp-vxjx-65j6', package='jetty-server-9.4.38.v20210224', package_path='/usr/local/parasoft/dtp/lib/dc/jetty-server.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-client-2.32.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28164', package='jetty-9.4.38.v20210224', package_path='/usr/local/parasoft/dtp/lib/dc/jetty-security.jar'), Finding(scan_source='oscap_comp', cve_id='CCE-82985-3', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3200', package='libsolv-0.7.16-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-spring5-2.32.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-3.0.1', package_path='/usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/licclientj-1.0.0.202104051224-all.jar:jersey-common'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35937', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-16135', package='libssh-0.9.4-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='python3-rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82220-5', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-30640', package='apache tomcat-9.0.45', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-hk2-2.32.jar'), Finding(scan_source='anchore_comp', cve_id='bcd159901fe47efddae5c095b4b0d7fd', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-80935-0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2011-5034', package='geronimo-1.1.1', package_path='/usr/local/parasoft/dtp/tomcat/webapps/grs/WEB-INF/lib/geronimo-jms_1.1_spec-1.1.1.jar'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20231', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-server-2.32.jar'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-34429', package='org.eclipse.jetty_jetty-io-9.4.38.v20210224', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28164', package='jetty-9.4.38.v20210224', package_path='/usr/local/parasoft/dtp/lib/dc/jetty-util.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-mvc-jsp-2.32.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-33574', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3200', package='libsolv-0.7.16-2.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82494-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-2.32', package_path='/usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-bean-validation-2.32.jar'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-35942', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-common-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35938', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-83401-0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2010-0684', package='activemq-1.1', package_path='/usr/local/parasoft/dtp/tomcat/webapps/grs/WEB-INF/lib/activemq-protobuf-1.1.jar'), Finding(scan_source='oscap_comp', cve_id='CCE-82979-6', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='addbb93c22e9b0988b8b40392a4538cb', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-14155', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-c43q-5hpj-4crv', package='jersey-common-3.0.1', package_path='/usr/local/parasoft/dtp/plugins/builtin/com.parasoft.xtest.lic.client.jar:lib/licclientj.jar:jersey-common'), Finding(scan_source='anchore_cve', cve_id='CVE-2017-15806', package='mail-1.6.2', package_path='/usr/local/parasoft/dtp/tomcat/lib/javax.mail.jar'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-36086', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28168', package='jersey-3.0.1', package_path='/usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/licclientj-1.0.0.202104051224-all.jar:jersey-client'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22118', package='spring_framework-5.3.1', package_path='/usr/local/parasoft/dtp/tomcat/webapps/tcm/WEB-INF/lib/spring-core-5.3.1.jar'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3445', package='libdnf-0.55.0-7.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2017-15806', package='mail-1.6.2', package_path='/usr/local/parasoft/dtp/lib/dc/javax.mail.jar'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-24370', package='lua-libs-5.3.4-11.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20232', package='gnutls-3.6.14-8.el8_3', package_path=None)} ERROR: NON-WHITELISTED VULNERABILITIES FOUND ERROR: Number of non-whitelisted vulnerabilities: 99 ERROR: The following vulnerabilities are not whitelisted: ERROR: scan_source cve_id package package_path ERROR: anchore_cve CVE-2010-0684 activemq-1.1 /usr/local/parasoft/dtp/lib/dc/activemq-protobuf.jar ERROR: anchore_cve CVE-2010-0684 activemq-1.1 /usr/local/parasoft/dtp/tomcat/webapps/grs/WEB-INF/lib/activemq-protobuf-1.1.jar ERROR: anchore_cve CVE-2010-1244 activemq-1.1 /usr/local/parasoft/dtp/lib/dc/activemq-protobuf.jar ERROR: anchore_cve CVE-2010-1244 activemq-1.1 /usr/local/parasoft/dtp/tomcat/webapps/grs/WEB-INF/lib/activemq-protobuf-1.1.jar ERROR: anchore_cve CVE-2011-4905 activemq-1.1 /usr/local/parasoft/dtp/lib/dc/activemq-protobuf.jar ERROR: anchore_cve CVE-2011-4905 activemq-1.1 /usr/local/parasoft/dtp/tomcat/webapps/grs/WEB-INF/lib/activemq-protobuf-1.1.jar ERROR: anchore_cve CVE-2012-6127 commons-httpclient-3.1 /usr/local/parasoft/dtp/tomcat/webapps/grs/WEB-INF/lib/commons-httpclient-3.1.jar ERROR: anchore_cve CVE-2015-5262 commons-httpclient-3.1 /usr/local/parasoft/dtp/tomcat/webapps/grs/WEB-INF/lib/commons-httpclient-3.1.jar ERROR: anchore_cve VULNDB-243848 commons-httpclient-3.1 /usr/local/parasoft/dtp/tomcat/webapps/grs/WEB-INF/lib/commons-httpclient-3.1.jar ERROR: anchore_cve VULNDB-87160 commons-httpclient-3.1 /usr/local/parasoft/dtp/tomcat/webapps/grs/WEB-INF/lib/commons-httpclient-3.1.jar ERROR: anchore_cve GHSA-gwrp-pvrq-jmwv commons-io-2.2 /usr/local/parasoft/dtp/plugins/builtin/org.apache.commons.io.jar:commons-io ERROR: anchore_cve CVE-2021-29425 commons_io-2.2 /usr/local/parasoft/dtp/plugins/builtin/org.apache.commons.io.jar:commons-io ERROR: anchore_cve VULNDB-58760 commons_vfs-1.0 /usr/local/parasoft/dtp/plugins/builtin/com.parasoft.xtest.common.jar:lib/commons-vfs.jar ERROR: anchore_cve VULNDB-58760 commons_vfs-1.0 /usr/local/parasoft/dtp/lib/dc/com.parasoft.xtest.common.jar:lib/commons-vfs.jar ERROR: anchore_cve VULNDB-58760 commons_vfs-1.0 /usr/local/parasoft/dtp/tomcat/lib/com.parasoft.xtest.common.jar:lib/commons-vfs.jar ERROR: anchore_cve CVE-2011-5034 geronimo-1.1.1 /usr/local/parasoft/dtp/lib/dc/geronimo-jms_1.1_spec.jar ERROR: anchore_cve CVE-2011-5034 geronimo-1.1.1 /usr/local/parasoft/dtp/tomcat/webapps/grs/WEB-INF/lib/geronimo-jms_1.1_spec-1.1.1.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-container-servlet-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/lib/dc/jersey-container-servlet.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/lib/dc/jersey-common.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-mvc-jsp-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-container-servlet-core-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/lib/dc/jersey-client.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/lib/dc/oauth2-client.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-mvc-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-media-jaxb-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-mvc-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/lib/dc/jersey-entity-filtering.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-common-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-client-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/lib/dc/jersey-container-servlet-core.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/lib/dc/jersey-server.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-media-jaxb-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/lib/dc/jersey-media-json-jackson.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-media-multipart-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-container-servlet-core-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/lib/dc/jersey-media-jaxb.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-spring5-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-bean-validation-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-server-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/lib/dc/jersey-hk2.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-container-servlet-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-common-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-hk2-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/lib/dc/jersey-spring5.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-client-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-spring5-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-hk2-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-server-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-mvc-jsp-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-2.32 /usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-bean-validation-2.32.jar ERROR: anchore_cve CVE-2021-28168 jersey-3.0.1 /usr/local/parasoft/dtp/plugins/builtin/com.parasoft.xtest.lic.client.jar:lib/licclientj.jar:jersey-proxy-client ERROR: anchore_cve CVE-2021-28168 jersey-3.0.1 /usr/local/parasoft/dtp/plugins/builtin/com.parasoft.xtest.lic.client.jar:lib/licclientj.jar:jersey-common ERROR: anchore_cve CVE-2021-28168 jersey-3.0.1 /usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/licclientj-1.0.0.202104051224-all.jar:jersey-hk2 ERROR: anchore_cve CVE-2021-28168 jersey-3.0.1 /usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/licclientj-1.0.0.202104051224-all.jar:jersey-proxy-client ERROR: anchore_cve CVE-2021-28168 jersey-3.0.1 /usr/local/parasoft/dtp/plugins/builtin/com.parasoft.xtest.lic.client.jar:lib/licclientj.jar:jersey-client ERROR: anchore_cve CVE-2021-28168 jersey-3.0.1 /usr/local/parasoft/dtp/plugins/builtin/com.parasoft.xtest.lic.client.jar:lib/licclientj.jar:jersey-hk2 ERROR: anchore_cve CVE-2021-28168 jersey-3.0.1 /usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/licclientj-1.0.0.202104051224-all.jar:jersey-common ERROR: anchore_cve CVE-2021-28168 jersey-3.0.1 /usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/licclientj-1.0.0.202104051224-all.jar:jersey-client ERROR: anchore_cve GHSA-c43q-5hpj-4crv jersey-common-2.32 /usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/jersey-common-2.32.jar ERROR: anchore_cve GHSA-c43q-5hpj-4crv jersey-common-2.32 /usr/local/parasoft/dtp/lib/dc/jersey-common.jar ERROR: anchore_cve GHSA-c43q-5hpj-4crv jersey-common-2.32 /usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/jersey-common-2.32.jar ERROR: anchore_cve GHSA-c43q-5hpj-4crv jersey-common-3.0.1 /usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/licclientj-1.0.0.202104051224-all.jar:jersey-common ERROR: anchore_cve GHSA-c43q-5hpj-4crv jersey-common-3.0.1 /usr/local/parasoft/dtp/plugins/builtin/com.parasoft.xtest.lic.client.jar:lib/licclientj.jar:jersey-common ERROR: anchore_cve CVE-2021-28164 jetty-9.4.38.v20210224 /usr/local/parasoft/dtp/lib/dc/jetty-servlet.jar ERROR: anchore_cve CVE-2021-28164 jetty-9.4.38.v20210224 /usr/local/parasoft/dtp/lib/dc/jetty-servlets.jar ERROR: anchore_cve CVE-2021-28164 jetty-9.4.38.v20210224 /usr/local/parasoft/dtp/lib/dc/jetty-continuation.jar ERROR: anchore_cve CVE-2021-28164 jetty-9.4.38.v20210224 /usr/local/parasoft/dtp/lib/dc/jetty-http.jar ERROR: anchore_cve CVE-2021-28164 jetty-9.4.38.v20210224 /usr/local/parasoft/dtp/lib/dc/jetty-util-ajax.jar ERROR: anchore_cve CVE-2021-28164 jetty-9.4.38.v20210224 /usr/local/parasoft/dtp/lib/dc/jetty-io.jar ERROR: anchore_cve CVE-2021-28164 jetty-9.4.38.v20210224 /usr/local/parasoft/dtp/lib/dc/jetty-server.jar ERROR: anchore_cve CVE-2021-28164 jetty-9.4.38.v20210224 /usr/local/parasoft/dtp/lib/dc/jetty-security.jar ERROR: anchore_cve CVE-2021-28164 jetty-9.4.38.v20210224 /usr/local/parasoft/dtp/lib/dc/jetty-util.jar ERROR: anchore_cve GHSA-26vr-8j45-3r4w jetty-io-9.4.38.v20210224 /usr/local/parasoft/dtp/lib/dc/jetty-io.jar ERROR: anchore_cve GHSA-m6cp-vxjx-65j6 jetty-server-9.4.38.v20210224 /usr/local/parasoft/dtp/lib/dc/jetty-server.jar ERROR: anchore_cve GHSA-gwcr-j4wh-j3cq jetty-servlets-9.4.38.v20210224 /usr/local/parasoft/dtp/lib/dc/jetty-servlets.jar ERROR: anchore_cve GHSA-v528-7hrm-frqp json-smart-2.3 /usr/local/parasoft/dtp/tomcat/webapps/tcm/WEB-INF/lib/json-smart-2.3.jar ERROR: anchore_cve GHSA-v528-7hrm-frqp json-smart-2.3 /usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/json-smart-2.3.jar ERROR: anchore_cve GHSA-v528-7hrm-frqp json-smart-2.3 /usr/local/parasoft/dtp/lib/dc/json-smart.jar ERROR: anchore_cve GHSA-v528-7hrm-frqp json-smart-2.3 /usr/local/parasoft/dtp/tomcat/webapps/pst/WEB-INF/lib/json-smart-2.3.jar ERROR: anchore_cve GHSA-v528-7hrm-frqp json-smart-2.3 /usr/local/parasoft/dtp/tomcat/webapps/grs/WEB-INF/lib/json-smart-2.3.jar ERROR: anchore_cve GHSA-v528-7hrm-frqp json-smart-2.3 /usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/json-smart-2.3.jar ERROR: anchore_cve CVE-2011-0739 mail-1.5.0 /usr/local/parasoft/dtp/plugins/builtin/javax.mail.jar ERROR: anchore_cve CVE-2017-15806 mail-1.6.2 /usr/local/parasoft/dtp/tomcat/lib/javax.mail.jar ERROR: anchore_cve CVE-2017-15806 mail-1.6.2 /usr/local/parasoft/dtp/lib/dc/javax.mail.jar ERROR: anchore_cve CVE-2021-22118 spring_framework-5.3.1 /usr/local/parasoft/dtp/lib/dc/spring-core.jar ERROR: anchore_cve CVE-2021-22118 spring_framework-5.3.1 /usr/local/parasoft/dtp/tomcat/webapps/grs/WEB-INF/lib/spring-core-5.3.1.jar ERROR: anchore_cve CVE-2021-22118 spring_framework-5.3.1 /usr/local/parasoft/dtp/tomcat/webapps/pstsec.war:WEB-INF/lib/spring-core-5.3.1.jar ERROR: anchore_cve CVE-2021-22118 spring_framework-5.3.1 /usr/local/parasoft/dtp/tomcat/webapps/licenseserver/WEB-INF/lib/spring-core-5.3.1.jar ERROR: anchore_cve CVE-2021-22118 spring_framework-5.3.1 /usr/local/parasoft/dtp/tomcat/webapps/pst/WEB-INF/lib/spring-core-5.3.1.jar ERROR: anchore_cve CVE-2021-22118 spring_framework-5.3.1 /usr/local/parasoft/dtp/tomcat/webapps/tcm/WEB-INF/lib/spring-core-5.3.1.jar ERROR: twistlock_cve CVE-2021-30640 apache tomcat-9.0.45 None ERROR: twistlock_cve CVE-2021-33037 apache tomcat-9.0.45 None ERROR: twistlock_cve CVE-2020-13956 commons-httpclient-3.1 None ERROR: twistlock_cve CVE-2021-29425 commons-io_commons-io-2.2 None ERROR: twistlock_cve CVE-2021-28163 org.eclipse.jetty_jetty-io-9.4.38.v20210224 None ERROR: twistlock_cve CVE-2021-28169 org.eclipse.jetty_jetty-io-9.4.38.v20210224 None ERROR: twistlock_cve CVE-2021-34428 org.eclipse.jetty_jetty-io-9.4.38.v20210224 None ERROR: twistlock_cve CVE-2021-34429 org.eclipse.jetty_jetty-io-9.4.38.v20210224 None section_end:1627932394:step_script section_start:1627932394:cleanup_file_variables Cleaning up file based variables section_end:1627932394:cleanup_file_variables ERROR: Job failed: command terminated with exit code 1