UNCLASSIFIED - NO CUI

chore(findings): atlassian/jira-data-center/9.12.19

Summary

atlassian/jira-data-center/9.12.19 has 289 new findings discovered during continuous monitoring.

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=atlassian/jira-data-center/9.12.19&tag=9.12.19&branch=master

id source severity package impact workaround
CVE-2006-2839 Anchore CVE Medium webwork-1.4-atlassian-31
CVE-2007-2379 Anchore CVE Medium jquery-2.2.4.7
CVE-2007-2379 Anchore CVE Medium jquery-2.2.4.13
CVE-2012-2928 Anchore CVE Medium jira-servicedesk-2.0.440
CVE-2012-2928 Anchore CVE Medium jira-advancedroadmaps-2.0.440
CVE-2012-2928 Anchore CVE Medium jira-core-2.0.440
CVE-2012-2928 Anchore CVE Medium jira-classic-software-2.0.440
CVE-2012-2928 Anchore CVE Medium jira-classic-core-2.0.440
CVE-2014-9390 Anchore CVE Critical org.eclipse.egit.github.core-6.1.0.202203080745-r
CVE-2015-9251 Anchore CVE Medium jquery-2.2.4.7
CVE-2015-9251 Anchore CVE Medium jquery-2.2.4.13
CVE-2016-1000027 Twistlock CVE Critical spring-web-5.3.39-atlassian-3
CVE-2017-16232 Anchore CVE Low libtiff-4.4.0-13.el9
CVE-2017-17973 Anchore CVE Medium libtiff-4.4.0-13.el9
CVE-2017-6519 Anchore CVE Low avahi-libs-0.8-21.el9
CVE-2017-6519 Twistlock CVE Low avahi-0.8-21.el9
CVE-2018-13419 Anchore CVE Low libsndfile-1.0.31-8.el9_5.2
CVE-2019-11358 Anchore CVE Medium jquery-2.2.4.13
CVE-2019-11358 Anchore CVE Medium jquery-2.2.4.7
CVE-2019-13990 Twistlock CVE Critical org.quartz-scheduler_quartz-1.8.7-atlassian-3
CVE-2020-11022 Anchore CVE Medium jquery-2.2.4.13
CVE-2020-11022 Anchore CVE Medium jquery-2.2.4.7
CVE-2020-11023 Anchore CVE Medium jquery-2.2.4.7
CVE-2020-11023 Anchore CVE Medium jquery-2.2.4.13
CVE-2020-13936 Twistlock CVE High org.apache.velocity_velocity-1.6.4-atlassian-25
CVE-2020-15250 Twistlock CVE Medium junit_junit-4.12
CVE-2020-18771 Twistlock CVE Low exiv2-0.27.5-2.el9
CVE-2020-18771 Anchore CVE Low exiv2-0.27.5-2.el9
CVE-2020-18771 Anchore CVE Low exiv2-libs-0.27.5-2.el9
CVE-2020-1950 Twistlock CVE Medium org.apache.tika_tika-core-1.23
CVE-2020-1950 Anchore CVE Medium tika-core-1.23
CVE-2020-1951 Twistlock CVE Medium org.apache.tika_tika-core-1.23
CVE-2020-1951 Anchore CVE Medium tika-core-1.23
CVE-2020-23922 Anchore CVE Low giflib-5.2.1-9.el9
CVE-2020-23922 Twistlock CVE Low giflib-5.2.1-9.el9
CVE-2021-25317 Anchore CVE Low cups-libs-1:2.3.3op2-31.el9_5
CVE-2021-25317 Twistlock CVE Low cups-2.3.3op2-31.el9_5
CVE-2021-28657 Anchore CVE Medium tika-core-1.23
CVE-2021-28657 Twistlock CVE Medium org.apache.tika_tika-core-1.23
CVE-2021-31535 Anchore CVE High libX11-1.7.0-9.el9
CVE-2021-31535 Anchore CVE High libX11-xcb-1.7.0-9.el9
CVE-2021-31535 Twistlock CVE Medium libX11-1.7.0-9.el9
CVE-2021-31535 Anchore CVE High libX11-common-1.7.0-9.el9
CVE-2021-32815 Twistlock CVE Low exiv2-0.27.5-2.el9
CVE-2021-32815 Anchore CVE Low exiv2-0.27.5-2.el9
CVE-2021-32815 Anchore CVE Low exiv2-libs-0.27.5-2.el9
CVE-2021-33813 Anchore CVE High jdom-1.0.0
CVE-2021-34334 Anchore CVE Low exiv2-libs-0.27.5-2.el9
CVE-2021-34334 Twistlock CVE Low exiv2-0.27.5-2.el9
CVE-2021-34334 Anchore CVE Low exiv2-0.27.5-2.el9
CVE-2021-34335 Anchore CVE Low exiv2-libs-0.27.5-2.el9
CVE-2021-34335 Twistlock CVE Low exiv2-0.27.5-2.el9
CVE-2021-34335 Anchore CVE Low exiv2-0.27.5-2.el9
CVE-2021-37615 Anchore CVE Low exiv2-0.27.5-2.el9
CVE-2021-37615 Twistlock CVE Low exiv2-0.27.5-2.el9
CVE-2021-37615 Anchore CVE Low exiv2-libs-0.27.5-2.el9
CVE-2021-37616 Anchore CVE Low exiv2-0.27.5-2.el9
CVE-2021-37616 Twistlock CVE Low exiv2-0.27.5-2.el9
CVE-2021-37616 Anchore CVE Low exiv2-libs-0.27.5-2.el9
CVE-2021-37620 Anchore CVE Low exiv2-0.27.5-2.el9
CVE-2021-37620 Twistlock CVE Low exiv2-0.27.5-2.el9
CVE-2021-37620 Anchore CVE Low exiv2-libs-0.27.5-2.el9
CVE-2021-37621 Anchore CVE Low exiv2-0.27.5-2.el9
CVE-2021-37621 Twistlock CVE Low exiv2-0.27.5-2.el9
CVE-2021-37621 Anchore CVE Low exiv2-libs-0.27.5-2.el9
CVE-2021-37622 Twistlock CVE Low exiv2-0.27.5-2.el9
CVE-2021-37622 Anchore CVE Low exiv2-0.27.5-2.el9
CVE-2021-37622 Anchore CVE Low exiv2-libs-0.27.5-2.el9
CVE-2021-37623 Twistlock CVE Low exiv2-0.27.5-2.el9
CVE-2021-37623 Anchore CVE Low exiv2-0.27.5-2.el9
CVE-2021-37623 Anchore CVE Low exiv2-libs-0.27.5-2.el9
CVE-2021-3782 Anchore CVE Medium libwayland-egl-1.21.0-1.el9
CVE-2021-3782 Twistlock CVE Medium wayland-1.21.0-1.el9
CVE-2021-3782 Anchore CVE Medium libwayland-client-1.21.0-1.el9
CVE-2021-3782 Anchore CVE Medium libwayland-cursor-1.21.0-1.el9
CVE-2021-3782 Anchore CVE Medium libwayland-server-1.21.0-1.el9
CVE-2021-3997 Anchore CVE Medium systemd-udev-252-46.el9_5.3
CVE-2022-1056 Twistlock CVE Low libtiff-4.4.0-13.el9
CVE-2022-1056 Anchore CVE Low libtiff-4.4.0-13.el9
CVE-2022-25169 Twistlock CVE Medium org.apache.tika_tika-core-1.23
CVE-2022-25169 Anchore CVE Medium tika-core-1.23
CVE-2022-25647 Twistlock CVE High com.google.code.gson_gson-2.2.2-atlassian-1
CVE-2022-27943 Anchore CVE Low libatomic-11.5.0-5.el9_5
CVE-2022-30126 Twistlock CVE Medium org.apache.tika_tika-core-1.23
CVE-2022-30126 Anchore CVE Medium tika-core-1.23
CVE-2022-30294 Anchore CVE Low webkit2gtk3-jsc-2.46.6-2.el9_5
CVE-2022-30973 Twistlock CVE Medium org.apache.tika_tika-core-1.23
CVE-2022-33879 Anchore CVE Low tika-core-1.23
CVE-2022-33879 Twistlock CVE Low org.apache.tika_tika-core-1.23
CVE-2022-3554 Anchore CVE Medium libX11-xcb-1.7.0-9.el9
CVE-2022-3554 Anchore CVE Medium libX11-1.7.0-9.el9
CVE-2022-3554 Anchore CVE Medium libX11-common-1.7.0-9.el9
CVE-2022-3555 Anchore CVE Low libX11-xcb-1.7.0-9.el9
CVE-2022-3555 Anchore CVE Low libX11-common-1.7.0-9.el9
CVE-2022-3555 Anchore CVE Low libX11-1.7.0-9.el9
CVE-2022-36033 Twistlock CVE Medium org.jsoup_jsoup-1.14.2
CVE-2022-37050 Anchore CVE Medium poppler-21.01.0-21.el9
CVE-2022-37050 Anchore CVE Medium poppler-glib-21.01.0-21.el9
CVE-2022-37050 Twistlock CVE Medium poppler-21.01.0-21.el9
CVE-2022-37051 Anchore CVE Medium poppler-21.01.0-21.el9
CVE-2022-37051 Twistlock CVE Medium poppler-21.01.0-21.el9
CVE-2022-37051 Anchore CVE Medium poppler-glib-21.01.0-21.el9
CVE-2022-37052 Twistlock CVE Medium poppler-21.01.0-21.el9
CVE-2022-37052 Anchore CVE Medium poppler-glib-21.01.0-21.el9
CVE-2022-37052 Anchore CVE Medium poppler-21.01.0-21.el9
CVE-2022-3857 Anchore CVE Low java-17-openjdk-headless-1:17.0.14.0.7-2.el9
CVE-2022-3857 Anchore CVE Low libpng-2:1.6.37-12.el9
CVE-2022-3857 Anchore CVE Low java-17-openjdk-1:17.0.14.0.7-2.el9
CVE-2022-40149 Twistlock CVE Medium org.codehaus.jettison_jettison-1.1
CVE-2022-40150 Twistlock CVE High org.codehaus.jettison_jettison-1.1
CVE-2022-45685 Twistlock CVE High org.codehaus.jettison_jettison-1.1
CVE-2022-45693 Twistlock CVE High org.codehaus.jettison_jettison-1.1
CVE-2023-0833 Twistlock CVE Medium com.squareup.okhttp3_okhttp-3.14.9
CVE-2023-0833 Anchore CVE Medium okhttp-3.14.9
CVE-2023-1436 Twistlock CVE High org.codehaus.jettison_jettison-1.1
CVE-2023-1916 Twistlock CVE Low libtiff-4.4.0-13.el9
CVE-2023-1916 Anchore CVE Low libtiff-4.4.0-13.el9
CVE-2023-2004 Anchore CVE Low java-17-openjdk-headless-1:17.0.14.0.7-2.el9
CVE-2023-2004 Anchore CVE Low java-17-openjdk-1:17.0.14.0.7-2.el9
CVE-2023-2004 Anchore CVE Low freetype-2.10.4-10.el9_5
CVE-2023-22521 Anchore CVE High crowd-db-config-password-cipher-encryptors-5.0.11
CVE-2023-22521 Anchore CVE High crowd-rest-application-management-5.0.11
CVE-2023-22521 Anchore CVE High crowd-query-language-5.0.11
CVE-2023-25433 Twistlock CVE Medium libtiff-4.4.0-13.el9
CVE-2023-25433 Anchore CVE Medium libtiff-4.4.0-13.el9
CVE-2023-25434 Anchore CVE Medium libtiff-4.4.0-13.el9
CVE-2023-25434 Twistlock CVE Medium libtiff-4.4.0-13.el9
CVE-2023-25435 Twistlock CVE Medium libtiff-4.4.0-13.el9
CVE-2023-25435 Anchore CVE Medium libtiff-4.4.0-13.el9
CVE-2023-3164 Twistlock CVE Medium libtiff-4.4.0-13.el9
CVE-2023-3164 Anchore CVE Medium libtiff-4.4.0-13.el9
CVE-2023-33201 Twistlock CVE Medium org.bouncycastle_bcprov-jdk15on-1.70.0
CVE-2023-33201 Twistlock CVE Medium org.bouncycastle_bcprov-jdk15on-1.69.0
CVE-2023-33202 Twistlock CVE Medium org.bouncycastle_bcprov-jdk15on-1.69.0
CVE-2023-35116 Anchore CVE Medium jackson-databind-2.15.4
CVE-2023-35116 Anchore CVE Medium jackson-databind-2.15.2
CVE-2023-35116 Anchore CVE Medium jackson-databind-2.15.3
CVE-2023-35116 Anchore CVE Medium jackson-databind-2.14.1
CVE-2023-35116 Anchore CVE Medium jackson-databind-2.15.4
CVE-2023-35116 Anchore CVE Medium jackson-databind-2.15.3
CVE-2023-35116 Anchore CVE Medium jackson-databind-2.15.3
CVE-2023-35116 Anchore CVE Medium jackson-databind-2.12.7.1
CVE-2023-35116 Anchore CVE Medium jackson-databind-2.15.3
CVE-2023-3635 Twistlock CVE Medium com.squareup.okio_okio-1.17.2
CVE-2023-39327 Twistlock CVE Low openjpeg2-2.4.0-7.el9
CVE-2023-39327 Anchore CVE Low openjpeg2-2.4.0-7.el9
CVE-2023-39328 Anchore CVE Medium openjpeg2-2.4.0-7.el9
CVE-2023-39328 Twistlock CVE Medium openjpeg2-2.4.0-7.el9
CVE-2023-39329 Anchore CVE Medium openjpeg2-2.4.0-7.el9
CVE-2023-39329 Twistlock CVE Medium openjpeg2-2.4.0-7.el9
CVE-2023-39742 Twistlock CVE Low giflib-5.2.1-9.el9
CVE-2023-39742 Anchore CVE Low giflib-5.2.1-9.el9
CVE-2023-40403 Twistlock CVE Medium libxslt-1.1.34-9.el9_5.1
CVE-2023-40403 Anchore CVE Medium libxslt-1.1.34-9.el9_5.1
CVE-2023-43643 Twistlock CVE Medium org.owasp.antisamy_antisamy-1.6.8-atlassian-11
CVE-2023-4504 Twistlock CVE Medium cups-2.3.3op2-31.el9_5
CVE-2023-4504 Anchore CVE Medium cups-libs-1:2.3.3op2-31.el9_5
CVE-2023-48161 Twistlock CVE Medium giflib-5.2.1-9.el9
CVE-2023-48161 Anchore CVE Medium giflib-5.2.1-9.el9
CVE-2023-52355 Twistlock CVE Medium libtiff-4.4.0-13.el9
CVE-2023-52355 Anchore CVE Medium libtiff-4.4.0-13.el9
CVE-2023-52356 Twistlock CVE Medium libtiff-4.4.0-13.el9
CVE-2023-52356 Anchore CVE Medium libtiff-4.4.0-13.el9
CVE-2023-6277 Anchore CVE Medium libtiff-4.4.0-13.el9
CVE-2023-6277 Twistlock CVE Medium libtiff-4.4.0-13.el9
CVE-2024-0444 Anchore CVE Medium gstreamer1-1.22.1-2.el9
CVE-2024-0444 Twistlock CVE Medium gstreamer1-1.22.1-2.el9
CVE-2024-21685 Anchore CVE Medium jira-ical-feed-1.8.6
CVE-2024-21685 Anchore CVE Medium jira-advancedroadmaps-2.0.440
CVE-2024-21685 Anchore CVE Medium jira-core-2.0.440
CVE-2024-21685 Anchore CVE Medium jira-mobile-rest-4.2.0
CVE-2024-21685 Anchore CVE Medium jira-email-processor-api-5.12.19-REL-0001
CVE-2024-21685 Anchore CVE Medium jira-classic-software-2.0.440
CVE-2024-21685 Anchore CVE Medium jira-servicedesk-2.0.440
CVE-2024-21685 Anchore CVE Medium jira-cross-compatibility-lib-bridge-factory-0.52
CVE-2024-21685 Anchore CVE Medium jira-projects-api-8.1.18
CVE-2024-21685 Anchore CVE Medium jira-email-processor-core-5.12.19-REL-0001
CVE-2024-21685 Anchore CVE Medium jira-classic-core-2.0.440
CVE-2024-21685 Anchore CVE Medium jira-cross-compatibility-lib-bridge-63-0.52
CVE-2024-21685 Anchore CVE Medium jira-cross-compatibility-lib-bridge-api-0.52
CVE-2024-21685 Anchore CVE Medium jira-cross-compatibility-lib-bridge-70-0.52
CVE-2024-21703 Anchore CVE Medium confluence-compat-lib-1.3.1
CVE-2024-23635 Twistlock CVE Medium org.owasp.antisamy_antisamy-1.6.8-atlassian-11
CVE-2024-25710 Twistlock CVE Medium org.apache.commons_commons-compress-1.24.0
CVE-2024-26308 Twistlock CVE Medium org.apache.commons_commons-compress-1.24.0
CVE-2024-29857 Twistlock CVE Medium org.bouncycastle_bcprov-jdk15on-1.70.0
CVE-2024-29857 Twistlock CVE Medium org.bouncycastle_bcprov-jdk15on-1.69.0
CVE-2024-30171 Twistlock CVE Medium org.bouncycastle_bcprov-jdk15on-1.70.0
CVE-2024-30171 Twistlock CVE Medium org.bouncycastle_bcprov-jdk15on-1.69.0
CVE-2024-38820 Anchore CVE Low spring-core-5.3.39-atlassian-3
CVE-2024-38820 Twistlock CVE Medium spring-core-5.3.39-atlassian-3
CVE-2024-38820 Twistlock CVE Medium spring-web-5.3.39-atlassian-3
CVE-2024-38820 Twistlock CVE Medium spring-context-5.3.39-atlassian-3
CVE-2024-38827 Twistlock CVE Medium spring-security-core-5.7.13
CVE-2024-38829 Twistlock CVE Medium spring-ldap-core-2.4.0
CVE-2024-40094 Twistlock CVE High graphql-java-18.7.0
CVE-2024-44192 Anchore CVE High webkit2gtk3-jsc-2.46.6-2.el9_5
CVE-2024-44192 Twistlock CVE High webkit2gtk3-2.46.6-2.el9_5
CVE-2024-4453 Anchore CVE Medium gstreamer1-1.22.1-2.el9
CVE-2024-4453 Twistlock CVE Medium gstreamer1-1.22.1-2.el9
CVE-2024-47535 Twistlock CVE Medium io.netty_netty-common-4.1.108.Final
CVE-2024-47541 Anchore CVE Medium gstreamer1-plugins-base-1.22.1-3.el9_5
CVE-2024-47541 Twistlock CVE Medium gstreamer1-plugins-base-1.22.1-3.el9_5
CVE-2024-47542 Twistlock CVE Medium gstreamer1-plugins-base-1.22.1-3.el9_5
CVE-2024-47542 Anchore CVE Medium gstreamer1-plugins-base-1.22.1-3.el9_5
CVE-2024-47554 Twistlock CVE High commons-io_commons-io-2.8.0
CVE-2024-47600 Twistlock CVE Medium gstreamer1-plugins-base-1.22.1-3.el9_5
CVE-2024-47600 Anchore CVE Medium gstreamer1-plugins-base-1.22.1-3.el9_5
CVE-2024-47835 Anchore CVE Medium gstreamer1-plugins-base-1.22.1-3.el9_5
CVE-2024-47835 Twistlock CVE Medium gstreamer1-plugins-base-1.22.1-3.el9_5
CVE-2024-50613 Anchore CVE Medium libsndfile-1.0.31-8.el9_5.2
CVE-2024-50613 Twistlock CVE Medium libsndfile-1.0.31-8.el9_5.2
CVE-2024-52615 Twistlock CVE Medium avahi-0.8-21.el9
CVE-2024-52615 Anchore CVE Medium avahi-libs-0.8-21.el9
CVE-2024-52616 Anchore CVE Medium avahi-libs-0.8-21.el9
CVE-2024-52616 Twistlock CVE Medium avahi-0.8-21.el9
CVE-2024-54467 Anchore CVE Medium webkit2gtk3-jsc-2.46.6-2.el9_5
CVE-2024-54467 Twistlock CVE Medium webkit2gtk3-2.46.6-2.el9_5
CVE-2024-55549 Twistlock CVE High libxslt-1.1.34-9.el9_5.1
CVE-2024-55549 Anchore CVE High libxslt-1.1.34-9.el9_5.1
CVE-2024-56378 Twistlock CVE Medium poppler-21.01.0-21.el9
CVE-2024-56378 Anchore CVE Medium poppler-21.01.0-21.el9
CVE-2024-56378 Anchore CVE Medium poppler-glib-21.01.0-21.el9
CVE-2024-56431 Twistlock CVE Low libtheora-1.1.1-31.el9
CVE-2024-56431 Anchore CVE Low libtheora-1:1.1.1-31.el9
CVE-2024-56826 Twistlock CVE Medium openjpeg2-2.4.0-7.el9
CVE-2024-56826 Anchore CVE Medium openjpeg2-2.4.0-7.el9
CVE-2024-56827 Twistlock CVE Medium openjpeg2-2.4.0-7.el9
CVE-2024-56827 Anchore CVE Medium openjpeg2-2.4.0-7.el9
CVE-2024-57699 Twistlock CVE High net.minidev_json-smart-2.5.0
CVE-2025-22228 Twistlock CVE High spring-security-crypto-5.7.13
CVE-2025-24970 Twistlock CVE High io.netty_netty-handler-4.1.108.Final
CVE-2025-25193 Twistlock CVE Medium io.netty_netty-common-4.1.108.Final
CVE-2025-2720 Anchore CVE Low libgsf-1.14.47-5.el9
CVE-2025-2723 Anchore CVE Medium libgsf-1.14.47-5.el9
CVE-2025-2723 Twistlock CVE Medium libgsf-1.14.47-5.el9
CVE-2025-2724 Twistlock CVE Low libgsf-1.14.47-5.el9
CVE-2025-2724 Anchore CVE Low libgsf-1.14.47-5.el9
CVE-2025-27363 Anchore CVE High freetype-2.10.4-10.el9_5
CVE-2025-27363 Anchore CVE High java-17-openjdk-headless-1:17.0.14.0.7-2.el9
CVE-2025-27363 Anchore CVE High java-17-openjdk-1:17.0.14.0.7-2.el9
CVE-2025-27516 Anchore CVE High python3-jinja2-2.11.3-8.el9_5
GHSA-22wj-vf5f-wrvj Anchore CVE High h2-2.1.214
GHSA-2363-cqg2-863c Anchore CVE High jdom-1.0
GHSA-269g-pwp5-87pp Anchore CVE Medium junit-4.12
GHSA-2mrq-w8pv-5pvq Anchore CVE Medium antisamy-1.6.8-atlassian-11
GHSA-2mrq-w8pv-5pvq Anchore CVE Medium antisamy-1.6.8-atlassian-11
GHSA-3832-9276-x7gf Anchore CVE Medium commons-httpclient-3.1-jenkins-3
GHSA-389x-839f-4rhx Anchore CVE Medium netty-common-4.1.108.Final
GHSA-389x-839f-4rhx Anchore CVE Medium netty-common-4.1.108.Final
GHSA-4265-ccf5-phj5 Anchore CVE Medium commons-compress-1.24.0
GHSA-4g8c-wm8x-jfhw Anchore CVE High netty-handler-4.1.108.Final
GHSA-4g8c-wm8x-jfhw Anchore CVE High netty-handler-4.1.108.Final
GHSA-4g9r-vxhx-9pgx Anchore CVE Medium commons-compress-1.24.0
GHSA-4gc7-5j7h-4qph Anchore CVE Medium spring-context-5.3.39-atlassian-3
GHSA-56h3-78gp-v83r Anchore CVE Medium jettison-1.1
GHSA-59j4-wjwp-mw9m Anchore CVE High velocity-1.6.4-atlassian-25
GHSA-78wr-2p64-hpwj Anchore CVE High commons-io-2.8.0
GHSA-78wr-2p64-hpwj Anchore CVE High commons-io-2.8.0
GHSA-7rf3-mqpx-h7xg Anchore CVE High jettison-1.1
GHSA-8xfc-gm6g-vgpv Anchore CVE Medium bcprov-jdk15on-1.70
GHSA-8xfc-gm6g-vgpv Anchore CVE Medium bcprov-jdk15on-1.69
GHSA-9qcf-c26r-x5rf Anchore CVE Critical quartz-1.8.7-atlassian-3
GHSA-fh63-4r66-jc7v Anchore CVE Medium velocity-tools-1.3
GHSA-gp7f-rwcx-9369 Anchore CVE Medium jsoup-1.14.2
GHSA-grr4-wv38-f68w Anchore CVE High jettison-1.1
GHSA-h9mq-f6q5-6c8m Anchore CVE High graphql-java-18.7
GHSA-hr8g-6v94-x4m9 Anchore CVE Medium bcprov-jdk15on-1.69
GHSA-hr8g-6v94-x4m9 Anchore CVE Medium bcprov-jdk15on-1.70
GHSA-mg83-c7gq-rv5c Anchore CVE High spring-security-crypto-5.7.13
GHSA-pcf2-gh6g-h5r2 Anchore CVE Medium antisamy-1.6.8-atlassian-11
GHSA-pcf2-gh6g-h5r2 Anchore CVE Medium antisamy-1.6.8-atlassian-11
GHSA-pq2g-wx69-c263 Anchore CVE High json-smart-2.5.0
GHSA-pq2g-wx69-c263 Anchore CVE High json-smart-2.5.0
GHSA-pq2g-wx69-c263 Anchore CVE High json-smart-2.5.0
GHSA-q3v6-hm2v-pw99 Anchore CVE Medium spring-security-core-5.7.13
GHSA-q6g2-g7f3-rr83 Anchore CVE High jettison-1.1
GHSA-qw3f-w4pf-jh5f Anchore CVE Medium tika-core-1.23
GHSA-rcjj-h6gh-jf3r Anchore CVE Medium groovy-all-2.4.15
GHSA-v435-xc8x-wvr9 Anchore CVE Medium bcprov-jdk15on-1.70
GHSA-v435-xc8x-wvr9 Anchore CVE Medium bcprov-jdk15on-1.69
GHSA-w33c-445m-f8w7 Anchore CVE Medium okio-1.17.2
GHSA-wjxj-5m7g-mg7q Anchore CVE Medium bcprov-jdk15on-1.69
GHSA-x27m-9w8j-5vcw Anchore CVE High jettison-1.1
GHSA-xq3w-v528-46rv Anchore CVE Medium netty-common-4.1.108.Final
GHSA-xq3w-v528-46rv Anchore CVE Medium netty-common-4.1.108.Final
PRISMA-2021-0055 Twistlock CVE Low commons-codec_commons-codec-1.11
PRISMA-2021-0081 Twistlock CVE High org.apache.lucene_lucene-core-7.3.1
PRISMA-2023-0067 Twistlock CVE High com.fasterxml.jackson.core_jackson-core-2.14.1

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=atlassian/jira-data-center/9.12.19&tag=9.12.19&branch=master

Tasks

Contributor:

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Verification label will be removed and the issue will be sent back to Open. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by Ghost User
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information