-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update docker.io/bitnami/kafka:3.6.1 docker digest to 9f05290 #159
Open
renovate
wants to merge
1
commit into
master
Choose a base branch
from
renovate/docker.io-bitnami-kafka-3.6.1
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
🦙 MegaLinter status:
|
Descriptor | Linter | Files | Fixed | Errors | Elapsed time |
---|---|---|---|---|---|
✅ ACTION | actionlint | 6 | 0 | 0.12s | |
✅ BASH | bash-exec | 2 | 0 | 0.01s | |
✅ BASH | shellcheck | 2 | 0 | 0.13s | |
✅ BASH | shfmt | 2 | 0 | 0.01s | |
✅ DOCKERFILE | hadolint | 2 | 0 | 0.16s | |
✅ EDITORCONFIG | editorconfig-checker | 89 | 0 | 0.48s | |
✅ ENV | dotenv-linter | 1 | 0 | 0.01s | |
✅ JSON | jsonlint | 3 | 0 | 0.21s | |
✅ JSON | prettier | 3 | 0 | 0.49s | |
✅ JSON | v8r | 3 | 0 | 3.54s | |
markdownlint | 8 | 89 | 1.26s | ||
markdown-table-formatter | 8 | 1 | 0.42s | ||
✅ PYTHON | bandit | 7 | 0 | 2.02s | |
✅ PYTHON | black | 7 | 0 | 1.49s | |
✅ PYTHON | flake8 | 7 | 0 | 0.81s | |
✅ PYTHON | isort | 7 | 0 | 0.48s | |
✅ PYTHON | mypy | 7 | 0 | 3.66s | |
✅ PYTHON | pyright | 7 | 0 | 8.0s | |
✅ PYTHON | ruff | 7 | 0 | 0.03s | |
✅ REPOSITORY | checkov | yes | no | 24.36s | |
✅ REPOSITORY | dustilock | yes | no | 0.93s | |
✅ REPOSITORY | gitleaks | yes | no | 2.74s | |
✅ REPOSITORY | git_diff | yes | no | 0.06s | |
✅ REPOSITORY | grype | yes | no | 16.07s | |
✅ REPOSITORY | kics | yes | no | 43.82s | |
✅ REPOSITORY | secretlint | yes | no | 1.16s | |
✅ REPOSITORY | syft | yes | no | 2.65s | |
✅ REPOSITORY | trivy | yes | no | 13.46s | |
✅ REPOSITORY | trivy-sbom | yes | no | 0.16s | |
✅ REPOSITORY | trufflehog | yes | no | 5.03s | |
✅ XML | xmllint | 3 | 0 | 0.02s | |
✅ YAML | prettier | 28 | 0 | 1.21s | |
✅ YAML | v8r | 28 | 0 | 46.53s | |
✅ YAML | yamllint | 28 | 0 | 0.8s |
See detailed report in MegaLinter reports
You could have same capabilities but better runtime performances if you request a new MegaLinter flavor.
renovate
bot
changed the title
chore(deps): update docker.io/bitnami/kafka:3.6.1 docker digest to 5f0ed16
chore(deps): update docker.io/bitnami/kafka:3.6.1 docker digest to 35e2b50
Mar 22, 2024
renovate
bot
force-pushed
the
renovate/docker.io-bitnami-kafka-3.6.1
branch
5 times, most recently
from
March 27, 2024 15:34
8695137
to
4693e59
Compare
renovate
bot
changed the title
chore(deps): update docker.io/bitnami/kafka:3.6.1 docker digest to 35e2b50
chore(deps): update docker.io/bitnami/kafka:3.6.1 docker digest to 9f05290
Mar 31, 2024
renovate
bot
force-pushed
the
renovate/docker.io-bitnami-kafka-3.6.1
branch
from
March 31, 2024 19:46
4693e59
to
a123f6a
Compare
renovate
bot
force-pushed
the
renovate/docker.io-bitnami-kafka-3.6.1
branch
3 times, most recently
from
April 10, 2024 12:55
a08aafd
to
84bce18
Compare
renovate
bot
force-pushed
the
renovate/docker.io-bitnami-kafka-3.6.1
branch
5 times, most recently
from
May 7, 2024 12:35
a1e4998
to
6807a5b
Compare
renovate
bot
force-pushed
the
renovate/docker.io-bitnami-kafka-3.6.1
branch
from
May 28, 2024 17:34
6807a5b
to
48e56eb
Compare
renovate
bot
force-pushed
the
renovate/docker.io-bitnami-kafka-3.6.1
branch
from
June 24, 2024 15:18
48e56eb
to
14af320
Compare
renovate
bot
force-pushed
the
renovate/docker.io-bitnami-kafka-3.6.1
branch
2 times, most recently
from
July 10, 2024 09:47
cd99c39
to
2372750
Compare
renovate
bot
force-pushed
the
renovate/docker.io-bitnami-kafka-3.6.1
branch
from
July 18, 2024 19:16
2372750
to
073842f
Compare
renovate
bot
force-pushed
the
renovate/docker.io-bitnami-kafka-3.6.1
branch
2 times, most recently
from
July 31, 2024 08:38
d5dfbb1
to
49cc20f
Compare
renovate
bot
force-pushed
the
renovate/docker.io-bitnami-kafka-3.6.1
branch
from
August 8, 2024 11:06
49cc20f
to
c1dc32a
Compare
renovate
bot
force-pushed
the
renovate/docker.io-bitnami-kafka-3.6.1
branch
2 times, most recently
from
August 20, 2024 12:06
8d1d057
to
808f41d
Compare
renovate
bot
force-pushed
the
renovate/docker.io-bitnami-kafka-3.6.1
branch
from
September 8, 2024 18:08
808f41d
to
a4d4931
Compare
renovate
bot
force-pushed
the
renovate/docker.io-bitnami-kafka-3.6.1
branch
from
September 27, 2024 19:05
a4d4931
to
3bf0e3a
Compare
renovate
bot
force-pushed
the
renovate/docker.io-bitnami-kafka-3.6.1
branch
from
October 7, 2024 18:04
3bf0e3a
to
d19931d
Compare
renovate
bot
force-pushed
the
renovate/docker.io-bitnami-kafka-3.6.1
branch
2 times, most recently
from
October 8, 2024 09:49
aa3558a
to
66b17eb
Compare
renovate
bot
force-pushed
the
renovate/docker.io-bitnami-kafka-3.6.1
branch
2 times, most recently
from
November 19, 2024 20:19
f80f20c
to
5ee77dd
Compare
chgl
approved these changes
Nov 19, 2024
renovate
bot
force-pushed
the
renovate/docker.io-bitnami-kafka-3.6.1
branch
from
November 19, 2024 20:46
5ee77dd
to
1bf5d7f
Compare
renovate
bot
force-pushed
the
renovate/docker.io-bitnami-kafka-3.6.1
branch
from
November 19, 2024 20:47
1bf5d7f
to
615569f
Compare
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
libexpat1 |
CVE-2024-45491 | CRITICAL | 2.5.0-1 | 2.5.0-1+deb12u1 |
libexpat1 |
CVE-2024-45492 | CRITICAL | 2.5.0-1 | 2.5.0-1+deb12u1 |
libexpat1 |
CVE-2024-45490 | HIGH | 2.5.0-1 | 2.5.0-1+deb12u1 |
libsqlite3-0 |
CVE-2023-7104 | HIGH | 3.40.1-2 | 3.40.1-2+deb12u1 |
libssl3 |
CVE-2024-5535 | MEDIUM | 3.0.14-1~deb12u2 | 3.0.15-1~deb12u1 |
libssl3 |
CVE-2024-9143 | LOW | 3.0.14-1~deb12u2 | 3.0.15-1~deb12u1 |
openssl |
CVE-2024-5535 | MEDIUM | 3.0.14-1~deb12u2 | 3.0.15-1~deb12u1 |
openssl |
CVE-2024-9143 | LOW | 3.0.14-1~deb12u2 | 3.0.15-1~deb12u1 |
No Misconfigurations found
Python
No Vulnerabilities found
No Misconfigurations found
Trivy image scan report
|
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
bsdutils |
CVE-2024-28085 | HIGH | 1:2.38.1-5+b1 | 2.38.1-5+deb12u1 |
libblkid1 |
CVE-2024-28085 | HIGH | 2.38.1-5+b1 | 2.38.1-5+deb12u1 |
libc-bin |
CVE-2024-2961 | HIGH | 2.36-9+deb12u4 | 2.36-9+deb12u6 |
libc-bin |
CVE-2024-33599 | HIGH | 2.36-9+deb12u4 | 2.36-9+deb12u7 |
libc-bin |
CVE-2024-33600 | MEDIUM | 2.36-9+deb12u4 | 2.36-9+deb12u7 |
libc-bin |
CVE-2024-33601 | MEDIUM | 2.36-9+deb12u4 | 2.36-9+deb12u7 |
libc-bin |
CVE-2024-33602 | MEDIUM | 2.36-9+deb12u4 | 2.36-9+deb12u7 |
libc6 |
CVE-2024-2961 | HIGH | 2.36-9+deb12u4 | 2.36-9+deb12u6 |
libc6 |
CVE-2024-33599 | HIGH | 2.36-9+deb12u4 | 2.36-9+deb12u7 |
libc6 |
CVE-2024-33600 | MEDIUM | 2.36-9+deb12u4 | 2.36-9+deb12u7 |
libc6 |
CVE-2024-33601 | MEDIUM | 2.36-9+deb12u4 | 2.36-9+deb12u7 |
libc6 |
CVE-2024-33602 | MEDIUM | 2.36-9+deb12u4 | 2.36-9+deb12u7 |
libgnutls30 |
CVE-2024-28834 | MEDIUM | 3.7.9-2+deb12u2 | 3.7.9-2+deb12u3 |
libgnutls30 |
CVE-2024-28835 | MEDIUM | 3.7.9-2+deb12u2 | 3.7.9-2+deb12u3 |
libgssapi-krb5-2 |
CVE-2024-37371 | CRITICAL | 1.20.1-2+deb12u1 | 1.20.1-2+deb12u2 |
libgssapi-krb5-2 |
CVE-2024-37370 | HIGH | 1.20.1-2+deb12u1 | 1.20.1-2+deb12u2 |
libk5crypto3 |
CVE-2024-37371 | CRITICAL | 1.20.1-2+deb12u1 | 1.20.1-2+deb12u2 |
libk5crypto3 |
CVE-2024-37370 | HIGH | 1.20.1-2+deb12u1 | 1.20.1-2+deb12u2 |
libkrb5-3 |
CVE-2024-37371 | CRITICAL | 1.20.1-2+deb12u1 | 1.20.1-2+deb12u2 |
libkrb5-3 |
CVE-2024-37370 | HIGH | 1.20.1-2+deb12u1 | 1.20.1-2+deb12u2 |
libkrb5support0 |
CVE-2024-37371 | CRITICAL | 1.20.1-2+deb12u1 | 1.20.1-2+deb12u2 |
libkrb5support0 |
CVE-2024-37370 | HIGH | 1.20.1-2+deb12u1 | 1.20.1-2+deb12u2 |
libmount1 |
CVE-2024-28085 | HIGH | 2.38.1-5+b1 | 2.38.1-5+deb12u1 |
libsmartcols1 |
CVE-2024-28085 | HIGH | 2.38.1-5+b1 | 2.38.1-5+deb12u1 |
libsqlite3-0 |
CVE-2023-7104 | HIGH | 3.40.1-2 | 3.40.1-2+deb12u1 |
libssl3 |
CVE-2023-5678 | MEDIUM | 3.0.11-1~deb12u2 | 3.0.13-1~deb12u1 |
libssl3 |
CVE-2023-6129 | MEDIUM | 3.0.11-1~deb12u2 | 3.0.13-1~deb12u1 |
libssl3 |
CVE-2023-6237 | MEDIUM | 3.0.11-1~deb12u2 | 3.0.13-1~deb12u1 |
libssl3 |
CVE-2024-0727 | MEDIUM | 3.0.11-1~deb12u2 | 3.0.13-1~deb12u1 |
libssl3 |
CVE-2024-4603 | MEDIUM | 3.0.11-1~deb12u2 | 3.0.14-1~deb12u1 |
libssl3 |
CVE-2024-4741 | MEDIUM | 3.0.11-1~deb12u2 | 3.0.14-1~deb12u1 |
libssl3 |
CVE-2024-5535 | MEDIUM | 3.0.11-1~deb12u2 | 3.0.15-1~deb12u1 |
libssl3 |
CVE-2024-6119 | MEDIUM | 3.0.11-1~deb12u2 | 3.0.14-1~deb12u2 |
libssl3 |
CVE-2024-2511 | LOW | 3.0.11-1~deb12u2 | 3.0.14-1~deb12u1 |
libssl3 |
CVE-2024-9143 | LOW | 3.0.11-1~deb12u2 | 3.0.15-1~deb12u1 |
libsystemd0 |
CVE-2023-50387 | HIGH | 252.22-1~deb12u1 | 252.23-1~deb12u1 |
libsystemd0 |
CVE-2023-50868 | HIGH | 252.22-1~deb12u1 | 252.23-1~deb12u1 |
libudev1 |
CVE-2023-50387 | HIGH | 252.22-1~deb12u1 | 252.23-1~deb12u1 |
libudev1 |
CVE-2023-50868 | HIGH | 252.22-1~deb12u1 | 252.23-1~deb12u1 |
libuuid1 |
CVE-2024-28085 | HIGH | 2.38.1-5+b1 | 2.38.1-5+deb12u1 |
mount |
CVE-2024-28085 | HIGH | 2.38.1-5+b1 | 2.38.1-5+deb12u1 |
openssl |
CVE-2023-5678 | MEDIUM | 3.0.11-1~deb12u2 | 3.0.13-1~deb12u1 |
openssl |
CVE-2023-6129 | MEDIUM | 3.0.11-1~deb12u2 | 3.0.13-1~deb12u1 |
openssl |
CVE-2023-6237 | MEDIUM | 3.0.11-1~deb12u2 | 3.0.13-1~deb12u1 |
openssl |
CVE-2024-0727 | MEDIUM | 3.0.11-1~deb12u2 | 3.0.13-1~deb12u1 |
openssl |
CVE-2024-4603 | MEDIUM | 3.0.11-1~deb12u2 | 3.0.14-1~deb12u1 |
openssl |
CVE-2024-4741 | MEDIUM | 3.0.11-1~deb12u2 | 3.0.14-1~deb12u1 |
openssl |
CVE-2024-5535 | MEDIUM | 3.0.11-1~deb12u2 | 3.0.15-1~deb12u1 |
openssl |
CVE-2024-6119 | MEDIUM | 3.0.11-1~deb12u2 | 3.0.14-1~deb12u2 |
openssl |
CVE-2024-2511 | LOW | 3.0.11-1~deb12u2 | 3.0.14-1~deb12u1 |
openssl |
CVE-2024-9143 | LOW | 3.0.11-1~deb12u2 | 3.0.15-1~deb12u1 |
util-linux |
CVE-2024-28085 | HIGH | 2.38.1-5+b1 | 2.38.1-5+deb12u1 |
util-linux-extra |
CVE-2024-28085 | HIGH | 2.38.1-5+b1 | 2.38.1-5+deb12u1 |
No Misconfigurations found
Java
290 known vulnerabilities found (CRITICAL: 22 HIGH: 151 MEDIUM: 90 LOW: 27)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
ca.uhn.hapi.fhir:org.hl7.fhir.r4 |
CVE-2024-45294 | HIGH | 5.6.971 | 6.3.23 |
ca.uhn.hapi.fhir:org.hl7.fhir.r4 |
CVE-2024-45294 | HIGH | 5.6.971 | 6.3.23 |
ca.uhn.hapi.fhir:org.hl7.fhir.r4 |
CVE-2024-45294 | HIGH | 5.6.971 | 6.3.23 |
ca.uhn.hapi.fhir:org.hl7.fhir.r4 |
CVE-2024-51132 | HIGH | 5.6.971 | 6.4.0 |
ca.uhn.hapi.fhir:org.hl7.fhir.r4 |
CVE-2024-51132 | HIGH | 5.6.971 | 6.4.0 |
ca.uhn.hapi.fhir:org.hl7.fhir.r4 |
CVE-2024-51132 | HIGH | 5.6.971 | 6.4.0 |
ca.uhn.hapi.fhir:org.hl7.fhir.r4 |
CVE-2024-52007 | HIGH | 5.6.971 | 6.4.0 |
ca.uhn.hapi.fhir:org.hl7.fhir.r4 |
CVE-2024-52007 | HIGH | 5.6.971 | 6.4.0 |
ca.uhn.hapi.fhir:org.hl7.fhir.r4 |
CVE-2024-52007 | HIGH | 5.6.971 | 6.4.0 |
ca.uhn.hapi.fhir:org.hl7.fhir.utilities |
CVE-2024-45294 | HIGH | 5.6.971 | 6.3.23 |
ca.uhn.hapi.fhir:org.hl7.fhir.utilities |
CVE-2024-45294 | HIGH | 5.6.971 | 6.3.23 |
ca.uhn.hapi.fhir:org.hl7.fhir.utilities |
CVE-2024-45294 | HIGH | 5.6.971 | 6.3.23 |
ca.uhn.hapi.fhir:org.hl7.fhir.utilities |
CVE-2024-51132 | HIGH | 5.6.971 | 6.4.0 |
ca.uhn.hapi.fhir:org.hl7.fhir.utilities |
CVE-2024-51132 | HIGH | 5.6.971 | 6.4.0 |
ca.uhn.hapi.fhir:org.hl7.fhir.utilities |
CVE-2024-51132 | HIGH | 5.6.971 | 6.4.0 |
ca.uhn.hapi.fhir:org.hl7.fhir.utilities |
CVE-2024-52007 | HIGH | 5.6.971 | 6.4.0 |
ca.uhn.hapi.fhir:org.hl7.fhir.utilities |
CVE-2024-52007 | HIGH | 5.6.971 | 6.4.0 |
ca.uhn.hapi.fhir:org.hl7.fhir.utilities |
CVE-2024-52007 | HIGH | 5.6.971 | 6.4.0 |
ch.qos.logback:logback-classic |
CVE-2023-6378 | HIGH | 1.2.11 | 1.3.12, 1.4.12, 1.2.13 |
ch.qos.logback:logback-classic |
CVE-2023-6378 | HIGH | 1.2.11 | 1.3.12, 1.4.12, 1.2.13 |
ch.qos.logback:logback-core |
CVE-2023-6378 | HIGH | 1.2.11 | 1.3.12, 1.4.12, 1.2.13 |
ch.qos.logback:logback-core |
CVE-2023-6378 | HIGH | 1.2.11 | 1.3.12, 1.4.12, 1.2.13 |
com.amazonaws:aws-java-sdk-s3 |
CVE-2022-31159 | HIGH | 1.11.1026 | 1.12.261 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 | HIGH | 2.11.4 | 2.13.2.1, 2.12.6.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 | HIGH | 2.11.4 | 2.12.6, 2.13.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.11.4 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.11.4 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 | HIGH | 2.13.0 | 2.13.2.1, 2.12.6.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 | HIGH | 2.13.0 | 2.13.2.1, 2.12.6.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 | HIGH | 2.13.0 | 2.13.2.1, 2.12.6.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 | HIGH | 2.13.0 | 2.12.6, 2.13.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 | HIGH | 2.13.0 | 2.12.6, 2.13.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 | HIGH | 2.13.0 | 2.12.6, 2.13.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.13.0 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.13.0 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.13.0 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.13.0 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.13.0 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.13.0 | 2.12.7.1, 2.13.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.13.4 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 | CRITICAL | 2.6.7.4 | 2.9.4, 2.8.11, 2.7.9.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 | CRITICAL | 2.6.7.4 | 2.7.9.4, 2.8.11.2, 2.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 | CRITICAL | 2.6.7.4 | 2.9.7, 2.8.11.3, 2.7.9.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 | CRITICAL | 2.6.7.4 | 2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 | CRITICAL | 2.6.7.4 | 2.9.9.2, 2.8.11.4, 2.7.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 | CRITICAL | 2.6.7.4 | 2.9.10, 2.8.11.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 | CRITICAL | 2.6.7.4 | 2.9.10.4, 2.8.11.6, 2.7.9.7 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 | CRITICAL | 2.6.7.4 | 2.9.10.4, 2.8.11.6, 2.7.9.7 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 | HIGH | 2.6.7.4 | 2.7.9.4, 2.8.11.2, 2.9.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 | HIGH | 2.6.7.4 | 2.8.11.1, 2.9.4, 2.7.9.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 | HIGH | 2.6.7.4 | 2.9.10.4 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 | HIGH | 2.6.7.4 | 2.9.10.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 | HIGH | 2.6.7.4 | 2.6.7.5, 2.9.10.6 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 | HIGH | 2.6.7.4 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 | HIGH | 2.6.7.4 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 | HIGH | 2.6.7.4 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 | HIGH | 2.6.7.4 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 | HIGH | 2.6.7.4 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 | HIGH | 2.6.7.4 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 | HIGH | 2.6.7.4 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 | HIGH | 2.6.7.4 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 | HIGH | 2.6.7.4 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 | HIGH | 2.6.7.4 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 | HIGH | 2.6.7.4 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 | HIGH | 2.6.7.4 | 2.9.10.8 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 | HIGH | 2.6.7.4 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 | HIGH | 2.6.7.4 | 2.9.10.8, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 | HIGH | 2.6.7.4 | 2.13.2.1, 2.12.6.1 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 | HIGH | 2.6.7.4 | 2.9.10.7, 2.6.7.5 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 | HIGH | 2.6.7.4 | 2.12.7.1, 2.13.4.2 |
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 | HIGH | 2.6.7.4 | 2.12.7.1, 2.13.4 |
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 | MEDIUM | 5.3.0 | 6.4.0, 5.4.0 |
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 | MEDIUM | 5.3.0 | 6.4.0, 5.4.0 |
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 | MEDIUM | 5.3.0 | 6.4.0, 5.4.0 |
com.google.code.gson:gson |
CVE-2022-25647 | HIGH | 2.2.4 | 2.8.9 |
com.google.code.gson:gson |
CVE-2022-25647 | HIGH | 2.8.6 | 2.8.9 |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2018-10237 | MEDIUM | 14.0.1 | 24.1.1-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 14.0.1 | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 30.1.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 31.0.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 31.0.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2023-2976 | MEDIUM | 31.0.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 31.0.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 31.0.1-jre | 32.0.0-android |
com.google.guava:guava |
CVE-2020-8908 | LOW | 31.0.1-jre | 32.0.0-android |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 2.5.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 2.5.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 2.5.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 2.5.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2024-7254 | HIGH | 2.5.0 | 3.25.5, 4.27.5, 4.28.2 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 2.5.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.3.0 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.3.0 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.3.0 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2024-7254 | HIGH | 3.3.0 | 3.25.5, 4.27.5, 4.28.2 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.3.0 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22569 | HIGH | 3.7.1 | 3.16.1, 3.18.2, 3.19.2 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2021-22570 | HIGH | 3.7.1 | 3.15.0 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3509 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2022-3510 | HIGH | 3.7.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 |
com.google.protobuf:protobuf-java |
CVE-2024-7254 | HIGH | 3.7.1 | 3.25.5, 4.27.5, 4.28.2 |
com.google.protobuf:protobuf-java |
CVE-2024-7254 | HIGH | 3.7.1 | 3.25.5, 4.27.5, 4.28.2 |
com.google.protobuf:protobuf-java |
CVE-2024-7254 | HIGH | 3.7.1 | 3.25.5, 4.27.5, 4.28.2 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.google.protobuf:protobuf-java |
CVE-2022-3171 | MEDIUM | 3.7.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | HIGH | 9.8.1 | 9.37.2 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | HIGH | 9.8.1 | 9.37.2 |
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 | HIGH | 9.8.1 | 9.37.2 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.14.0 | 3.4.0, 1.17.6 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.6.0 | 3.4.0, 1.17.6 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.6.0 | 3.4.0, 1.17.6 |
com.squareup.okio:okio |
CVE-2023-3635 | MEDIUM | 1.6.0 | 3.4.0, 1.17.6 |
com.squareup.okio:okio-jvm |
CVE-2023-3635 | MEDIUM | 3.2.0 | 3.4.0 |
com.squareup.okio:okio-jvm |
CVE-2023-3635 | MEDIUM | 3.2.0 | 3.4.0 |
commons-io:commons-io |
CVE-2024-47554 | HIGH | 2.11.0 | 2.14.0 |
commons-io:commons-io |
CVE-2024-47554 | HIGH | 2.11.0 | 2.14.0 |
commons-io:commons-io |
CVE-2024-47554 | HIGH | 2.11.0 | 2.14.0 |
commons-io:commons-io |
CVE-2024-47554 | HIGH | 2.11.0 | 2.14.0 |
commons-io:commons-io |
CVE-2024-47554 | HIGH | 2.8.0 | 2.14.0 |
commons-io:commons-io |
CVE-2024-47554 | HIGH | 2.8.0 | 2.14.0 |
commons-io:commons-io |
CVE-2024-47554 | HIGH | 2.8.0 | 2.14.0 |
commons-net:commons-net |
CVE-2021-37533 | MEDIUM | 3.6 | 3.9.0 |
commons-net:commons-net |
CVE-2021-37533 | MEDIUM | 3.6 | 3.9.0 |
commons-net:commons-net |
CVE-2021-37533 | MEDIUM | 3.6 | 3.9.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
dnsjava:dnsjava |
CVE-2024-25638 | HIGH | 2.1.7 | 3.6.0 |
io.airlift:aircompressor |
CVE-2024-36114 | HIGH | 0.21 | 0.27 |
io.netty:netty |
CVE-2019-20444 | CRITICAL | 3.7.0.Final | 4.0.0 |
io.netty:netty |
CVE-2019-20444 | CRITICAL | 3.7.0.Final | 4.0.0 |
io.netty:netty |
CVE-2015-2156 | HIGH | 3.7.0.Final | 3.10.3.Final, 3.9.8.Final |
io.netty:netty |
CVE-2015-2156 | HIGH | 3.7.0.Final | 3.10.3.Final, 3.9.8.Final |
io.netty:netty |
CVE-2021-37136 | HIGH | 3.7.0.Final | 4.0.0 |
io.netty:netty |
CVE-2021-37136 | HIGH | 3.7.0.Final | 4.0.0 |
io.netty:netty |
CVE-2021-37137 | HIGH | 3.7.0.Final | 4.0.0 |
io.netty:netty |
CVE-2021-37137 | HIGH | 3.7.0.Final | 4.0.0 |
io.netty:netty |
CVE-2014-0193 | MEDIUM | 3.7.0.Final | 3.6.9.Final, 3.7.1.Final, 3.8.2.Final, 3.9.1.Final, 4.0.19.Final |
io.netty:netty |
CVE-2014-0193 | MEDIUM | 3.7.0.Final | 3.6.9.Final, 3.7.1.Final, 3.8.2.Final, 3.9.1.Final, 4.0.19.Final |
io.netty:netty |
CVE-2019-20445 | MEDIUM | 3.7.0.Final | 4.0.0 |
io.netty:netty |
CVE-2019-20445 | MEDIUM | 3.7.0.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21290 | MEDIUM | 3.7.0.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21290 | MEDIUM | 3.7.0.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21295 | MEDIUM | 3.7.0.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21295 | MEDIUM | 3.7.0.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21409 | MEDIUM | 3.7.0.Final | 4.0.0 |
io.netty:netty |
CVE-2021-21409 | MEDIUM | 3.7.0.Final | 4.0.0 |
io.netty:netty |
CVE-2021-43797 | MEDIUM | 3.7.0.Final | 4.0.0 |
io.netty:netty |
CVE-2021-43797 | MEDIUM | 3.7.0.Final | 4.0.0 |
io.netty:netty-codec |
CVE-2021-37136 | HIGH | 4.1.61.Final | 4.1.68.Final |
io.netty:netty-codec |
CVE-2021-37137 | HIGH | 4.1.61.Final | 4.1.68.Final |
io.netty:netty-codec-http |
CVE-2021-43797 | MEDIUM | 4.1.61.Final | 4.1.71.Final |
io.netty:netty-codec-http |
CVE-2022-24823 | MEDIUM | 4.1.61.Final | 4.1.77.Final |
io.netty:netty-codec-http |
CVE-2024-29025 | MEDIUM | 4.1.61.Final | 4.1.108.Final |
io.netty:netty-common |
CVE-2024-47535 | HIGH | 4.1.61.Final | 4.1.115 |
io.netty:netty-common |
CVE-2024-47535 | HIGH | 4.1.74.Final | 4.1.115 |
io.netty:netty-common |
CVE-2024-47535 | HIGH | 4.1.74.Final | 4.1.115 |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.61.Final | 4.1.94.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.74.Final | 4.1.94.Final |
io.netty:netty-handler |
CVE-2023-34462 | MEDIUM | 4.1.74.Final | 4.1.94.Final |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2021-31684 | HIGH | 1.3.2 | 1.3.3, 2.4.4 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
net.minidev:json-smart |
CVE-2023-1370 | HIGH | 1.3.2 | 2.4.9 |
org.apache.avro:avro |
CVE-2024-47561 | CRITICAL | 1.11.0 | 1.11.4 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.11.0 | 1.11.3 |
org.apache.avro:avro |
CVE-2024-47561 | CRITICAL | 1.7.7 | 1.11.4 |
org.apache.avro:avro |
CVE-2024-47561 | CRITICAL | 1.7.7 | 1.11.4 |
org.apache.avro:avro |
CVE-2024-47561 | CRITICAL | 1.7.7 | 1.11.4 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.avro:avro |
CVE-2023-39410 | HIGH | 1.7.7 | 1.11.3 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-25710 | HIGH | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | MEDIUM | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | MEDIUM | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | MEDIUM | 1.21 | 1.26.0 |
org.apache.commons:commons-compress |
CVE-2024-26308 | MEDIUM | 1.21 | 1.26.0 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29131 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.commons:commons-configuration2 |
CVE-2024-29133 | MEDIUM | 2.1.1 | 2.10.1 |
org.apache.derby:derby |
CVE-2022-46337 | CRITICAL | 10.14.2.0 | 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0 |
org.apache.hadoop:hadoop-common |
CVE-2022-25168 | CRITICAL | 3.3.2 | 2.10.2, 3.2.4, 3.3.3 |
org.apache.hadoop:hadoop-common |
CVE-2022-25168 | CRITICAL | 3.3.2 | 2.10.2, 3.2.4, 3.3.3 |
org.apache.hadoop:hadoop-common |
CVE-2022-25168 | CRITICAL | 3.3.2 | 2.10.2, 3.2.4, 3.3.3 |
org.apache.hadoop:hadoop-common |
CVE-2024-23454 | LOW | 3.3.2 | 3.4.0 |
org.apache.hadoop:hadoop-common |
CVE-2024-23454 | LOW | 3.3.2 | 3.4.0 |
org.apache.hadoop:hadoop-common |
CVE-2024-23454 | LOW | 3.3.2 | 3.4.0 |
org.apache.ivy:ivy |
CVE-2022-46751 | HIGH | 2.5.1 | 2.5.2 |
org.apache.mesos:mesos |
CVE-2018-1330 | HIGH | 1.4.3 | 1.6.0 |
org.apache.thrift:libthrift |
CVE-2019-0205 | HIGH | 0.12.0 | 0.13.0 |
org.apache.thrift:libthrift |
CVE-2020-13949 | HIGH | 0.12.0 | 0.14.0 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.4.8 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.4.8 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2017-5637 | HIGH | 3.4.8 | 3.4.10, 3.5.3 |
org.apache.zookeeper:zookeeper |
CVE-2017-5637 | HIGH | 3.4.8 | 3.4.10, 3.5.3 |
org.apache.zookeeper:zookeeper |
CVE-2018-8012 | HIGH | 3.4.8 | 3.4.10, 3.5.4-beta |
org.apache.zookeeper:zookeeper |
CVE-2018-8012 | HIGH | 3.4.8 | 3.4.10, 3.5.4-beta |
org.apache.zookeeper:zookeeper |
CVE-2019-0201 | MEDIUM | 3.4.8 | 3.4.14, 3.5.5 |
org.apache.zookeeper:zookeeper |
CVE-2019-0201 | MEDIUM | 3.4.8 | 3.4.14, 3.5.5 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.6.2 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2023-44981 | CRITICAL | 3.6.2 | 3.7.2, 3.8.3, 3.9.1 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.6.2 | 3.8.4, 3.9.2 |
org.apache.zookeeper:zookeeper |
CVE-2024-23944 | MEDIUM | 3.6.2 | 3.8.4, 3.9.2 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.43.v20210629 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.43.v20210629 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.43.v20210629 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2024-6763 | MEDIUM | 9.4.43.v20210629 | 12.0.12 |
org.eclipse.jetty:jetty-http |
CVE-2024-6763 | MEDIUM | 9.4.43.v20210629 | 12.0.12 |
org.eclipse.jetty:jetty-http |
CVE-2024-6763 | MEDIUM | 9.4.43.v20210629 | 12.0.12 |
org.eclipse.jetty:jetty-http |
CVE-2022-2047 | LOW | 9.4.43.v20210629 | 9.4.47, 10.0.10, 11.0.10 |
org.eclipse.jetty:jetty-http |
CVE-2022-2047 | LOW | 9.4.43.v20210629 | 9.4.47, 10.0.10, 11.0.10 |
org.eclipse.jetty:jetty-http |
CVE-2022-2047 | LOW | 9.4.43.v20210629 | 9.4.47, 10.0.10, 11.0.10 |
org.eclipse.jetty:jetty-http |
CVE-2023-40167 | MEDIUM | 9.4.48.v20220622 | 9.4.52, 10.0.16, 11.0.16, 12.0.1 |
org.eclipse.jetty:jetty-http |
CVE-2024-6763 | MEDIUM | 9.4.48.v20220622 | 12.0.12 |
org.eclipse.jetty:jetty-server |
CVE-2023-26048 | MEDIUM | 9.4.48.v20220622 | 9.4.51.v20230217, 10.0.14, 11.0.14 |
org.eclipse.jetty:jetty-server |
CVE-2024-8184 | MEDIUM | 9.4.48.v20220622 | 12.0.9, 10.0.24, 11.0.24, 9.4.56 |
org.eclipse.jetty:jetty-server |
CVE-2023-26049 | LOW | 9.4.48.v20220622 | 9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
org.eclipse.jetty:jetty-servlets |
CVE-2024-9823 | MEDIUM | 9.4.48.v20220622 | 9.4.54, 10.0.18, 11.0.18 |
org.eclipse.jetty:jetty-servlets |
CVE-2023-36479 | LOW | 9.4.48.v20220622 | 9.4.52, 10.0.16, 11.0.16 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.43.v20210629 | 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.43.v20210629 | 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh | LOW | 9.4.43.v20210629 | 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
org.hibernate.validator:hibernate-validator |
CVE-2020-10693 | MEDIUM | 6.0.13.Final | 6.1.5.Final, 6.0.20.Final |
org.hibernate.validator:hibernate-validator |
CVE-2020-10693 | MEDIUM | 6.0.13.Final | 6.1.5.Final, 6.0.20.Final |
org.hibernate.validator:hibernate-validator |
CVE-2020-10693 | MEDIUM | 6.0.13.Final | 6.1.5.Final, 6.0.20.Final |
org.hibernate.validator:hibernate-validator |
CVE-2023-1932 | MEDIUM | 6.0.13.Final | 6.2.0.Final |
org.hibernate.validator:hibernate-validator |
CVE-2023-1932 | MEDIUM | 6.0.13.Final | 6.2.0.Final |
org.hibernate.validator:hibernate-validator |
CVE-2023-1932 | MEDIUM | 6.0.13.Final | 6.2.0.Final |
org.infinispan.protostream:protostream |
CVE-2023-5236 | MEDIUM | 4.6.0.Final | 4.6.2.Final |
org.infinispan.protostream:protostream |
CVE-2023-5236 | MEDIUM | 4.6.0.Final | 4.6.2.Final |
org.infinispan.protostream:protostream |
CVE-2023-5236 | MEDIUM | 4.6.0.Final | 4.6.2.Final |
org.infinispan:infinispan-commons |
CVE-2023-5384 | LOW | 14.0.5.Final | 15.0.0.Dev07, 14.0.25.Final |
org.infinispan:infinispan-commons |
CVE-2023-5384 | LOW | 14.0.5.Final | 15.0.0.Dev07, 14.0.25.Final |
org.infinispan:infinispan-commons |
CVE-2023-5384 | LOW | 14.0.5.Final | 15.0.0.Dev07, 14.0.25.Final |
org.infinispan:infinispan-core |
CVE-2023-5384 | LOW | 14.0.5.Final | 15.0.0.Dev07, 14.0.25.Final |
org.infinispan:infinispan-core |
CVE-2023-5384 | LOW | 14.0.5.Final | 15.0.0.Dev07, 14.0.25.Final |
org.infinispan:infinispan-core |
CVE-2023-5384 | LOW | 14.0.5.Final | 15.0.0.Dev07, 14.0.25.Final |
org.json:json |
CVE-2022-45688 | HIGH | 20220924 | 20230227 |
org.json:json |
CVE-2022-45688 | HIGH | 20220924 | 20230227 |
org.json:json |
CVE-2022-45688 | HIGH | 20220924 | 20230227 |
org.json:json |
CVE-2023-5072 | HIGH | 20220924 | 20231013 |
org.json:json |
CVE-2023-5072 | HIGH | 20220924 | 20231013 |
org.json:json |
CVE-2023-5072 | HIGH | 20220924 | 20231013 |
org.xerial.snappy:snappy-java |
CVE-2023-34455 | HIGH | 1.1.8.4 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34455 | HIGH | 1.1.8.4 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34455 | HIGH | 1.1.8.4 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-43642 | HIGH | 1.1.8.4 | 1.1.10.4 |
org.xerial.snappy:snappy-java |
CVE-2023-43642 | HIGH | 1.1.8.4 | 1.1.10.4 |
org.xerial.snappy:snappy-java |
CVE-2023-43642 | HIGH | 1.1.8.4 | 1.1.10.4 |
org.xerial.snappy:snappy-java |
CVE-2023-34453 | MEDIUM | 1.1.8.4 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34453 | MEDIUM | 1.1.8.4 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34453 | MEDIUM | 1.1.8.4 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34454 | MEDIUM | 1.1.8.4 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34454 | MEDIUM | 1.1.8.4 | 1.1.10.1 |
org.xerial.snappy:snappy-java |
CVE-2023-34454 | MEDIUM | 1.1.8.4 | 1.1.10.1 |
org.yaml:snakeyaml |
CVE-2022-1471 | HIGH | 1.31 | 2.0 |
org.yaml:snakeyaml |
CVE-2022-38752 | MEDIUM | 1.31 | 1.32 |
org.yaml:snakeyaml |
CVE-2022-41854 | MEDIUM | 1.31 | 1.32 |
software.amazon.ion:ion-java |
CVE-2024-21634 | HIGH | 1.0.2 | 1.10.5 |
No Misconfigurations found
Python
1 known vulnerabilities found (CRITICAL: 0 HIGH: 1 MEDIUM: 0 LOW: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
setuptools |
CVE-2024-6345 | HIGH | 68.2.2 | 70.0.0 |
No Misconfigurations found
opt/bitnami/java
No Vulnerabilities found
No Misconfigurations found
opt/bitnami/python
12 known vulnerabilities found (CRITICAL: 0 HIGH: 7 MEDIUM: 5 LOW: 0)
Show detailed table of vulnerabilities
Package | ID | Severity | Installed Version | Fixed Version |
---|---|---|---|---|
python |
CVE-2023-36632 | HIGH | 3.10.13-20 | 3.11.4 |
python |
CVE-2023-6597 | HIGH | 3.10.13-20 | 3.12.3, 3.11.9, 3.10.14, 3.9.19, 3.8.19 |
python |
CVE-2024-0397 | HIGH | 3.10.13-20 | 3.12.3, 3.11.9, 3.10.14, 3.9.20, 3.8.20 |
python |
CVE-2024-4032 | HIGH | 3.10.13-20 | 3.12.4, 3.11.10, 3.10.15, 3.9.20, 3.8.20 |
python |
CVE-2024-6232 | HIGH | 3.10.13-20 | 3.12.6, 3.11.10, 3.10.15, 3.9.20, 3.8.20 |
python |
CVE-2024-7592 | HIGH | 3.10.13-20 | 3.12.6, 3.11.10, 3.10.15, 3.9.20, 3.8.20 |
python |
CVE-2023-27043 | MEDIUM | 3.10.13-20 | 3.8.20, 3.12.6, 3.11.10, 3.10.15, 3.9.20 |
python |
CVE-2024-0450 | MEDIUM | 3.10.13-20 | 3.12.3, 3.11.9, 3.10.14, 3.9.19, 3.8.19 |
python |
CVE-2024-6923 | MEDIUM | 3.10.13-20 | 3.12.5, 3.11.10, 3.10.15, 3.9.20, 3.8.20 |
python |
CVE-2024-8088 | MEDIUM | 3.10.13-20 | 3.12.6, 3.11.10, 3.10.15, 3.9.20, 3.8.20 |
python |
CVE-2024-9287 | MEDIUM | 3.10.13-20 | 3.13.0 |
setuptools |
CVE-2024-6345 | HIGH | 68.2.2 | 70.0.0 |
No Misconfigurations found
opt/bitnami/spark
No Vulnerabilities found
No Misconfigurations found
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
b525405
->9f05290
Configuration
📅 Schedule: Branch creation - "* 0-3 1 * *" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.