Update dependency org.apache.logging.log4j:log4j-core to v2.12.2 #387
This check has been archived and is scheduled for deletion.
Learn more about checks retention
Mend for GitHub.com / WhiteSource Security Check
failed
Jun 21, 2023 in 1h 26m 59s
Security Report
You have successfully remediated 461 vulnerabilities, but introduced 4 new vulnerabilities in this branch.
❌ New vulnerabilities:
Partial results (-1 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the Mend Application.
CVE | Severity | CVSS Score | Vulnerable Library | Suggested Fix | Issue |
---|
✔️ Remediated vulnerabilities:
CVE | Vulnerable Library |
---|---|
WS-2017-3767 | spring-security-web-5.0.7.RELEASE.jar |
CVE-2019-17267 | jackson-databind-2.9.6.jar |
CVE-2022-24773 | node-forge-0.10.0.tgz |
CVE-2021-23386 | dns-packet-1.3.1.tgz |
CVE-2019-17531 | jackson-databind-2.9.6.jar |
CVE-2020-15366 | ajv-4.11.8.tgz |
CVE-2023-28708 | tomcat-embed-core-8.5.32.jar |
CVE-2020-36188 | jackson-databind-2.9.6.jar |
WS-2020-0408 | netty-handler-4.1.27.Final.jar |
CVE-2020-11111 | jackson-databind-2.6.7.2.jar |
CVE-2020-28500 | lodash-4.17.20.tgz |
CVE-2021-3807 | ansi-regex-4.1.0.tgz |
CVE-2020-14060 | jackson-databind-2.9.6.jar |
CVE-2021-21290 | netty-handler-4.1.13.Final.jar |
CVE-2021-25329 | tomcat-embed-core-8.5.32.jar |
CVE-2022-0437 | karma-4.4.1.tgz |
CVE-2022-0512 | url-parse-1.4.7.tgz |
CVE-2020-35490 | jackson-databind-2.9.6.jar |
WS-2022-0008 | node-forge-0.10.0.tgz |
CVE-2020-2933 | mysql-connector-java-5.1.46.jar |
CVE-2020-36181 | jackson-databind-2.6.7.2.jar |
CVE-2023-32681 | requests-2.25.1-py2.py3-none-any.whl |
CVE-2022-38750 | snakeyaml-1.19.jar |
CVE-2020-8840 | jackson-databind-2.6.7.2.jar |
CVE-2018-11694 | node-sass-4.14.1.tgz |
CVE-2019-20330 | jackson-databind-2.9.6.jar |
CVE-2019-17267 | jackson-databind-2.6.7.2.jar |
CVE-2020-9488 | log4j-1.2.14.jar |
CVE-2015-9251 | jquery-1.7.1.min.js |
CVE-2021-23413 | jszip-3.5.0.tgz |
CVE-2022-38749 | snakeyaml-1.19.jar |
CVE-2022-24999 | qs-6.5.2.tgz |
CVE-2023-1370 | json-smart-2.3.jar |
CVE-2021-45046 | log4j-core-2.7.jar |
CVE-2021-29059 | is-svg-2.1.0.tgz |
CVE-2020-7656 | jquery-1.4.4.min.js |
CVE-2022-25857 | snakeyaml-1.17.jar |
CVE-2022-38751 | snakeyaml-1.17.jar |
CVE-2021-23424 | ansi-html-0.0.7.tgz |
CVE-2018-1260 | spring-security-oauth2-2.2.1.RELEASE.jar |
CVE-2020-36185 | jackson-databind-2.9.6.jar |
CVE-2020-7608 | yargs-parser-11.1.1.tgz |
CVE-2021-33623 | trim-newlines-1.0.0.tgz |
CVE-2020-36189 | jackson-databind-2.6.7.2.jar |
CVE-2021-23343 | path-parse-1.0.6.tgz |
CVE-2020-7656 | jquery-1.7.1.min.js |
CVE-2015-9251 | jquery-1.4.4.min.js |
CVE-2020-36049 | socket.io-parser-3.2.0.tgz |
CVE-2020-36179 | jackson-databind-2.6.7.2.jar |
CVE-2021-25122 | tomcat-embed-core-8.5.32.jar |
CVE-2017-18640 | snakeyaml-1.19.jar |
CVE-2019-17531 | jackson-databind-2.6.7.2.jar |
CVE-2022-38752 | snakeyaml-1.15.jar |
CVE-2020-36518 | jackson-databind-2.6.7.2.jar |
CVE-2020-28469 | glob-parent-2.0.0.tgz |
CVE-2020-9493 | log4j-1.2.14.jar |
CVE-2019-10086 | commons-beanutils-1.8.3.jar |
CVE-2021-27568 | json-smart-2.3.jar |
CVE-2020-36185 | jackson-databind-2.6.7.2.jar |
CVE-2022-27772 | spring-boot-2.0.4.RELEASE.jar |
CVE-2019-10072 | tomcat-embed-core-8.5.32.jar |
CVE-2019-20445 | netty-codec-http-4.1.27.Final.jar |
CVE-2018-19360 | jackson-databind-2.6.7.2.jar |
CVE-2020-14060 | jackson-databind-2.6.7.2.jar |
CVE-2022-22968 | spring-context-5.0.8.RELEASE.jar |
CVE-2022-41854 | snakeyaml-1.19.jar |
WS-2018-0125 | jackson-core-2.6.7.jar |
CVE-2021-43797 | netty-codec-http-4.1.27.Final.jar |
CVE-2019-3799 | spring-cloud-config-server-2.0.0.RELEASE.jar |
CVE-2020-11022 | jquery-1.10.1.min.js |
CVE-2018-19827 | node-sass-4.14.1.tgz |
CVE-2020-11111 | jackson-databind-2.9.6.jar |
CVE-2019-3778 | spring-security-oauth2-2.2.1.RELEASE.jar |
CVE-2019-20445 | netty-codec-http-4.1.13.Final.jar |
CVE-2018-11698 | node-sass-4.14.1.tgz |
CVE-2020-8840 | jackson-databind-2.9.6.jar |
CVE-2021-21295 | netty-codec-http-4.1.27.Final.jar |
CVE-2022-38900 | decode-uri-component-0.2.0.tgz |
CVE-2019-14439 | jackson-databind-2.9.6.jar |
CVE-2020-25649 | jackson-databind-2.6.7.2.jar |
CVE-2019-10202 | jackson-databind-2.9.6.jar |
CVE-2021-22044 | spring-cloud-openfeign-core-2.0.0.RELEASE.jar |
CVE-2022-0536 | follow-redirects-1.13.1.tgz |
CVE-2020-10969 | jackson-databind-2.6.7.2.jar |
CVE-2020-28491 | jackson-dataformat-cbor-2.9.6.jar |
CVE-2020-28491 | jackson-dataformat-cbor-2.8.9.jar |
CVE-2022-22969 | spring-security-oauth2-2.2.1.RELEASE.jar |
WS-2019-0063 | js-yaml-3.7.0.tgz |
CVE-2019-3802 | spring-data-jpa-2.0.9.RELEASE.jar |
CVE-2020-10969 | jackson-databind-2.9.6.jar |
CVE-2020-7774 | y18n-3.2.1.tgz |
CVE-2018-1000873 | jackson-datatype-jsr310-2.9.6.jar |
CVE-2020-10673 | jackson-databind-2.9.6.jar |
CVE-2021-29060 | color-string-0.3.0.tgz |
WS-2021-0153 | ejs-2.7.4.tgz |
CVE-2020-2875 | mysql-connector-java-5.1.46.jar |
CVE-2020-13943 | tomcat-embed-core-8.5.32.jar |
CVE-2020-24025 | node-sass-4.14.1.tgz |
CVE-2019-6283 | libsass-3.5.2 |
CVE-2021-23337 | lodash-4.17.20.tgz |
CVE-2020-36048 | engine.io-3.2.1.tgz |
CVE-2020-13956 | httpclient-4.5.2.jar |
CVE-2018-14718 | jackson-databind-2.9.6.jar |
CVE-2019-20444 | netty-3.10.6.Final.jar |
CVE-2020-35728 | jackson-databind-2.9.6.jar |
CVE-2018-1000180 | bcprov-jdk15on-1.56.jar |
CVE-2020-5421 | spring-web-5.0.8.RELEASE.jar |
CVE-2022-0122 | node-forge-0.10.0.tgz |
CVE-2021-37136 | netty-codec-4.1.27.Final.jar |
CVE-2020-10968 | jackson-databind-2.6.7.2.jar |
CVE-2019-6284 | libsass-3.5.2 |
CVE-2015-9251 | jquery-1.11.1.jar |
CVE-2020-10693 | hibernate-validator-6.0.11.Final.jar |
CVE-2019-16869 | netty-codec-http-4.1.13.Final.jar |
WS-2019-0379 | commons-codec-1.9.jar |
CVE-2022-21704 | log4js-4.5.1.tgz |
CVE-2022-24999 | qs-6.4.0.tgz |
CVE-2022-22950 | spring-expression-5.0.8.RELEASE.jar |
CVE-2020-25638 | hibernate-core-5.2.17.Final.jar |
CVE-2022-37603 | loader-utils-1.1.0.tgz |
CVE-2019-14893 | jackson-databind-2.9.6.jar |
CVE-2021-44228 | log4j-core-2.7.jar |
CVE-2020-14195 | jackson-databind-2.6.7.2.jar |
CVE-2023-20873 | spring-boot-actuator-autoconfigure-2.0.4.RELEASE.jar |
CVE-2022-1471 | snakeyaml-1.15.jar |
CVE-2020-7608 | yargs-parser-7.0.0.tgz |
CVE-2014-0114 | commons-beanutils-1.8.3.jar |
CVE-2021-22096 | spring-webmvc-5.0.8.RELEASE.jar |
CVE-2020-13956 | httpclient-4.5.6.jar |
CVE-2018-15758 | spring-security-oauth2-2.2.1.RELEASE.jar |
CVE-2021-21290 | netty-codec-http-4.1.27.Final.jar |
CVE-2021-3664 | url-parse-1.4.7.tgz |
WS-2019-0379 | commons-codec-1.10.jar |
CVE-2020-11112 | jackson-databind-2.6.7.2.jar |
WS-2020-0408 | netty-handler-4.1.13.Final.jar |
CVE-2022-22970 | spring-beans-4.3.8.RELEASE.jar |
CVE-2021-44906 | minimist-0.0.10.tgz |
CVE-2019-14379 | jackson-databind-2.9.6.jar |
CVE-2021-37137 | netty-codec-4.1.17.Final.jar |
CVE-2019-0232 | tomcat-embed-core-8.5.32.jar |
CVE-2017-5645 | log4j-core-2.7.jar |
CVE-2020-35491 | jackson-databind-2.9.6.jar |
CVE-2020-11113 | jackson-databind-2.9.6.jar |
CVE-2020-11612 | netty-codec-4.1.27.Final.jar |
CVE-2018-11499 | libsass-3.5.2 |
CVE-2020-14062 | jackson-databind-2.9.6.jar |
CVE-2020-24750 | jackson-databind-2.9.6.jar |
CVE-2020-28481 | socket.io-2.1.1.tgz |
CVE-2018-20821 | node-sass-4.14.1.tgz |
CVE-2020-7660 | serialize-javascript-1.9.1.tgz |
CVE-2017-18640 | snakeyaml-1.17.jar |
CVE-2020-9546 | jackson-databind-2.6.7.2.jar |
CVE-2021-33037 | tomcat-embed-core-8.5.32.jar |
CVE-2019-12814 | jackson-databind-2.9.6.jar |
CVE-2018-1000620 | cryptiles-2.0.5.tgz |
CVE-2019-20330 | jackson-databind-2.6.7.2.jar |
CVE-2022-22950 | spring-expression-4.3.8.RELEASE.jar |
CVE-2020-5408 | spring-security-crypto-5.0.7.RELEASE.jar |
CVE-2022-22970 | spring-core-5.0.8.RELEASE.jar |
CVE-2023-20883 | spring-boot-autoconfigure-2.0.4.RELEASE.jar |
CVE-2022-29078 | ejs-2.7.4.tgz |
CVE-2020-9547 | jackson-databind-2.9.6.jar |
CVE-2021-28092 | is-svg-2.1.0.tgz |
CVE-2019-17570 | xmlrpc-common-3.1.3.jar |
CVE-2018-1000850 | retrofit-2.4.0.jar |
CVE-2022-38751 | snakeyaml-1.15.jar |
CVE-2020-36182 | jackson-databind-2.6.7.2.jar |
CVE-2018-11087 | spring-amqp-2.0.5.RELEASE.jar |
CVE-2020-9548 | jackson-databind-2.9.6.jar |
CVE-2020-7238 | netty-codec-http-4.1.13.Final.jar |
CVE-2020-11023 | jquery-1.10.1.min.js |
CVE-2020-14061 | jackson-databind-2.9.6.jar |
CVE-2022-29167 | hawk-3.1.3.tgz |
CVE-2022-22965 | spring-beans-5.0.8.RELEASE.jar |
CVE-2022-25857 | snakeyaml-1.15.jar |
CVE-2022-24823 | netty-common-4.1.27.Final.jar |
CVE-2021-44906 | minimist-1.2.5.tgz |
CVE-2018-5968 | jackson-databind-2.6.7.2.jar |
CVE-2019-14540 | jackson-databind-2.6.7.2.jar |
CVE-2020-14061 | jackson-databind-2.6.7.2.jar |
CVE-2021-22096 | spring-core-5.0.8.RELEASE.jar |
CVE-2019-16942 | jackson-databind-2.6.7.2.jar |
CVE-2012-6708 | jquery-1.7.1.min.js |
CVE-2019-3797 | spring-data-jpa-2.0.9.RELEASE.jar |
CVE-2020-25649 | jackson-databind-2.9.6.jar |
CVE-2019-14892 | jackson-databind-2.9.6.jar |
CVE-2018-1199 | spring-core-4.3.8.RELEASE.jar |
CVE-2019-20444 | netty-codec-http-4.1.27.Final.jar |
CVE-2020-7238 | netty-codec-http-4.1.27.Final.jar |
CVE-2022-0686 | url-parse-1.4.7.tgz |
CVE-2020-36518 | jackson-databind-2.9.6.jar |
CVE-2020-13934 | tomcat-embed-core-8.5.32.jar |
CVE-2020-9548 | jackson-databind-2.6.7.2.jar |
WS-2016-7107 | spring-security-web-5.0.7.RELEASE.jar |
CVE-2017-18640 | snakeyaml-1.15.jar |
WS-2018-0124 | jackson-core-2.6.7.jar |
WS-2021-0152 | color-string-0.3.0.tgz |
CVE-2019-2692 | mysql-connector-java-5.1.46.jar |
CVE-2022-31159 | aws-java-sdk-s3-1.11.636.jar |
CVE-2022-22971 | spring-messaging-5.0.8.RELEASE.jar |
CVE-2021-21295 | netty-codec-http-4.1.17.Final.jar |
CVE-2020-5405 | spring-cloud-config-server-2.0.0.RELEASE.jar |
CVE-2021-33503 | urllib3-1.26.2-py2.py3-none-any.whl |
CVE-2021-23362 | hosted-git-info-2.8.8.tgz |
CVE-2018-11087 | amqp-client-5.1.2.jar |
CVE-2021-3807 | ansi-regex-3.0.0.tgz |
CVE-2020-9546 | jackson-databind-2.9.6.jar |
CVE-2020-14422 | ipaddress-1.0.23-py2.py3-none-any.whl |
CVE-2020-15366 | ajv-5.5.2.tgz |
CVE-2019-10202 | jackson-databind-2.6.7.2.jar |
CVE-2023-20861 | spring-expression-5.0.8.RELEASE.jar |
CVE-2020-28469 | glob-parent-5.1.1.tgz |
CVE-2020-5410 | spring-cloud-config-server-2.0.0.RELEASE.jar |
CVE-2022-37620 | html-minifier-3.5.21.tgz |
CVE-2020-13935 | tomcat-embed-websocket-8.5.32.jar |
CVE-2018-19839 | libsass-3.5.2 |
CVE-2022-45688 | json-20180130.jar |
CVE-2020-11612 | netty-codec-4.1.13.Final.jar |
CVE-2020-9484 | tomcat-embed-core-8.5.32.jar |
CVE-2022-24823 | netty-common-4.1.13.Final.jar |
CVE-2018-3728 | hoek-2.16.3.tgz |
CVE-2019-6283 | node-sass-4.14.1.tgz |
CVE-2021-44228 | log4j-core-2.9.0.jar |
CVE-2021-45105 | log4j-core-2.9.0.jar |
CVE-2020-5408 | spring-security-core-5.0.7.RELEASE.jar |
CVE-2018-19838 | libsass-3.5.2 |
CVE-2020-36180 | jackson-databind-2.6.7.2.jar |
CVE-2022-4244 | plexus-utils-3.0.22.jar |
CVE-2021-45046 | log4j-core-2.9.0.jar |
CVE-2021-37136 | netty-codec-4.1.17.Final.jar |
CVE-2020-9547 | jackson-databind-2.6.7.2.jar |
CVE-2020-14062 | jackson-databind-2.6.7.2.jar |
CVE-2017-12629 | lucene-queryparser-6.6.1.jar |
CVE-2019-12814 | jackson-databind-2.6.7.2.jar |
CVE-2023-20863 | spring-expression-5.0.8.RELEASE.jar |
CVE-2020-28491 | jackson-dataformat-cbor-2.8.6.jar |
CVE-2018-20433 | c3p0-0.9.1.1.jar |
CVE-2020-2934 | mysql-connector-java-5.1.46.jar |
CVE-2021-24122 | tomcat-embed-core-8.5.32.jar |
CVE-2021-20190 | jackson-databind-2.9.6.jar |
CVE-2020-36181 | jackson-databind-2.9.6.jar |
CVE-2018-7489 | jackson-databind-2.6.7.2.jar |
CVE-2018-19797 | node-sass-4.14.1.tgz |
CVE-2021-45105 | log4j-core-2.7.jar |
CVE-2020-24750 | jackson-databind-2.6.7.2.jar |
CVE-2019-20444 | netty-codec-http-4.1.17.Final.jar |
CVE-2022-24771 | node-forge-0.10.0.tgz |
CVE-2020-1935 | tomcat-embed-core-8.5.32.jar |
CVE-2020-36183 | jackson-databind-2.6.7.2.jar |
CVE-2018-20190 | node-sass-4.14.1.tgz |
CVE-2020-7693 | sockjs-0.3.19.tgz |
CVE-2019-16942 | jackson-databind-2.9.6.jar |
CVE-2019-14893 | jackson-databind-2.6.7.2.jar |
CVE-2023-20863 | spring-expression-4.3.8.RELEASE.jar |
CVE-2022-1471 | snakeyaml-1.17.jar |
WS-2016-7057 | plexus-utils-3.0.22.jar |
CVE-2019-16335 | jackson-databind-2.6.7.2.jar |
CVE-2018-19362 | jackson-databind-2.9.6.jar |
CVE-2019-3795 | spring-security-core-5.0.7.RELEASE.jar |
CVE-2022-37601 | loader-utils-1.1.0.tgz |
CVE-2018-1272 | spring-core-4.3.8.RELEASE.jar |
CVE-2018-19839 | ProjectParty-for-Android-master_2014-08-08 |
CVE-2019-12086 | jackson-databind-2.6.7.2.jar |
CVE-2022-0639 | url-parse-1.4.7.tgz |
CVE-2021-21290 | netty-codec-http-4.1.13.Final.jar |
CVE-2019-0199 | tomcat-embed-core-8.5.32.jar |
CVE-2020-36184 | jackson-databind-2.9.6.jar |
CVE-2021-37137 | netty-codec-4.1.13.Final.jar |
CVE-2021-21295 | netty-codec-http-4.1.13.Final.jar |
CVE-2021-22060 | spring-core-4.3.8.RELEASE.jar |
CVE-2020-11112 | jackson-databind-2.9.6.jar |
CVE-2021-43138 | async-2.6.3.tgz |
CVE-2022-42003 | jackson-databind-2.6.7.2.jar |
CVE-2021-23495 | karma-4.4.1.tgz |
CVE-2019-6286 | node-sass-4.14.1.tgz |
WS-2017-3734 | httpclient-4.5.2.jar |
CVE-2021-43797 | netty-codec-http-4.1.17.Final.jar |
CVE-2018-11087 | spring-rabbit-2.0.5.RELEASE.jar |
CVE-2019-10202 | jackson-mapper-asl-1.9.13.jar |
CVE-2020-10673 | jackson-databind-2.6.7.2.jar |
CVE-2018-10899 | jolokia-core-1.5.0.jar |
CVE-2018-12022 | jackson-databind-2.6.7.2.jar |
CVE-2022-41854 | snakeyaml-1.17.jar |
WS-2020-0293 | spring-security-web-5.0.7.RELEASE.jar |
CVE-2011-4969 | jquery-1.4.4.min.js |
CVE-2022-38750 | snakeyaml-1.15.jar |
CVE-2022-38749 | snakeyaml-1.15.jar |
CVE-2022-24999 | qs-6.7.0.tgz |
CVE-2022-42004 | jackson-databind-2.9.6.jar |
CVE-2023-20861 | spring-expression-4.3.8.RELEASE.jar |
CVE-2021-28363 | urllib3-1.26.2-py2.py3-none-any.whl |
CVE-2020-36189 | jackson-databind-2.9.6.jar |
CVE-2019-6286 | libsass-3.5.2 |
CVE-2020-9040 | core-io-1.5.9.jar |
CVE-2019-16943 | jackson-databind-2.6.7.2.jar |
CVE-2022-42252 | tomcat-embed-core-8.5.32.jar |
CVE-2018-19361 | jackson-databind-2.6.7.2.jar |
CVE-2022-46175 | json5-0.5.1.tgz |
CVE-2020-11022 | jquery-1.7.1.min.js |
CVE-2019-17359 | bcprov-jdk15on-1.56.jar |
CVE-2019-6284 | node-sass-4.14.1.tgz |
CVE-2020-10650 | jackson-databind-2.6.7.2.jar |
CVE-2022-23307 | log4j-1.2.14.jar |
CVE-2018-15756 | spring-web-5.0.8.RELEASE.jar |
CVE-2022-21363 | mysql-connector-java-5.1.46.jar |
CVE-2021-43980 | tomcat-embed-core-8.5.32.jar |
CVE-2022-23491 | certifi-2020.12.5-py2.py3-none-any.whl |
CVE-2018-19362 | jackson-databind-2.6.7.2.jar |
CVE-2020-28502 | xmlhttprequest-ssl-1.5.5.tgz |
CVE-2023-28155 | request-2.81.0.tgz |
CVE-2020-11023 | jquery-1.7.1.min.js |
CVE-2020-10968 | jackson-databind-2.9.6.jar |
CVE-2022-38751 | snakeyaml-1.19.jar |
CVE-2022-38752 | snakeyaml-1.19.jar |
WS-2019-0379 | commons-codec-1.11.jar |
CVE-2021-22060 | spring-core-5.0.8.RELEASE.jar |
WS-2021-0172 | spring-web-5.0.8.RELEASE.jar |
CVE-2019-20444 | netty-codec-http-4.1.13.Final.jar |
CVE-2020-5405 | spring-cloud-config-client-2.0.0.RELEASE.jar |
CVE-2020-7238 | netty-codec-http-4.1.17.Final.jar |
CVE-2019-14900 | hibernate-core-5.2.17.Final.jar |
CVE-2021-21290 | netty-handler-4.1.27.Final.jar |
CVE-2022-4245 | plexus-utils-3.0.22.jar |
CVE-2019-10172 | jackson-mapper-asl-1.9.13.jar |
CVE-2020-17527 | tomcat-embed-core-8.5.32.jar |
CVE-2020-26939 | bcprov-jdk15on-1.56.jar |
CVE-2018-11307 | jackson-databind-2.6.7.2.jar |
CVE-2021-21290 | netty-codec-http-4.1.17.Final.jar |
CVE-2021-27515 | url-parse-1.4.7.tgz |
CVE-2022-42004 | jackson-databind-2.6.7.2.jar |
CVE-2018-20822 | libsass-3.5.2 |
WS-2018-0650 | useragent-2.3.0.tgz |
CVE-2018-19839 | node-sass-4.14.1.tgz |
CVE-2020-36187 | jackson-databind-2.9.6.jar |
CVE-2019-11358 | jquery-1.10.1.min.js |
CVE-2022-0155 | follow-redirects-1.13.1.tgz |
CVE-2023-26464 | log4j-1.2.14.jar |
CVE-2021-23382 | postcss-5.2.18.tgz |
CVE-2019-17563 | tomcat-embed-core-8.5.32.jar |
CVE-2020-11619 | jackson-databind-2.6.7.2.jar |
CVE-2021-44832 | log4j-core-2.7.jar |
CVE-2021-43797 | netty-codec-http-4.1.13.Final.jar |
CVE-2018-14720 | jackson-databind-2.6.7.2.jar |
CVE-2020-24616 | jackson-databind-2.6.7.2.jar |
WS-2019-0605 | libsass-3.5.2 |
CVE-2020-11113 | jackson-databind-2.6.7.2.jar |
CVE-2020-11620 | jackson-databind-2.9.6.jar |
CVE-2022-37598 | uglify-js-3.4.10.tgz |
CVE-2019-12384 | jackson-databind-2.6.7.2.jar |
CVE-2022-42003 | jackson-databind-2.9.6.jar |
CVE-2019-14439 | jackson-databind-2.6.7.2.jar |
CVE-2020-36184 | jackson-databind-2.6.7.2.jar |
CVE-2012-6708 | jquery-1.4.4.min.js |
CVE-2019-12384 | jackson-databind-2.9.6.jar |
CVE-2020-11612 | netty-codec-4.1.17.Final.jar |
WS-2019-0032 | js-yaml-3.7.0.tgz |
CVE-2022-22965 | spring-beans-4.3.8.RELEASE.jar |
CVE-2019-16335 | jackson-databind-2.9.6.jar |
CVE-2022-24772 | node-forge-0.10.0.tgz |
CVE-2022-38750 | snakeyaml-1.17.jar |
CVE-2018-19797 | libsass-3.5.2 |
CVE-2019-5427 | c3p0-0.9.1.1.jar |
CVE-2022-0691 | url-parse-1.4.7.tgz |
CVE-2020-11022 | jquery-1.11.1.jar |
CVE-2018-11697 | libsass-3.5.2 |
CVE-2021-37137 | netty-codec-4.1.27.Final.jar |
CVE-2018-14719 | jackson-databind-2.9.6.jar |
CVE-2020-24616 | jackson-databind-2.9.6.jar |
WS-2016-7062 | plexus-utils-3.0.22.jar |
CVE-2015-9251 | jquery-1.10.1.min.js |
CVE-2018-12023 | jackson-databind-2.6.7.2.jar |
CVE-2019-17571 | log4j-1.2.14.jar |
CVE-2020-36183 | jackson-databind-2.9.6.jar |
CVE-2019-0221 | tomcat-embed-core-8.5.32.jar |
CVE-2020-36186 | jackson-databind-2.9.6.jar |
CVE-2022-22970 | spring-core-4.3.8.RELEASE.jar |
CVE-2022-25857 | snakeyaml-1.19.jar |
CVE-2020-5398 | spring-web-5.0.8.RELEASE.jar |
CVE-2020-7608 | yargs-parser-4.2.1.tgz |
CVE-2018-14721 | jackson-databind-2.6.7.2.jar |
CVE-2020-36186 | jackson-databind-2.6.7.2.jar |
CVE-2020-11620 | jackson-databind-2.6.7.2.jar |
CVE-2018-19360 | jackson-databind-2.9.6.jar |
CVE-2018-14719 | jackson-databind-2.6.7.2.jar |
CVE-2023-0842 | xml2js-0.4.23.tgz |
CVE-2022-1471 | snakeyaml-1.19.jar |
CVE-2020-10672 | jackson-databind-2.9.6.jar |
CVE-2020-10650 | jackson-databind-2.9.6.jar |
CVE-2020-36188 | jackson-databind-2.6.7.2.jar |
CVE-2021-20190 | jackson-databind-2.6.7.2.jar |
CVE-2019-12086 | jackson-databind-2.9.6.jar |
CVE-2022-37601 | loader-utils-0.2.17.tgz |
CVE-2019-16869 | netty-codec-http-4.1.27.Final.jar |
CVE-2023-24998 | tomcat-embed-core-8.5.32.jar |
CVE-2022-38749 | snakeyaml-1.17.jar |
CVE-2021-22096 | spring-core-4.3.8.RELEASE.jar |
CVE-2021-37136 | netty-codec-4.1.13.Final.jar |
CVE-2019-11358 | jquery-1.11.1.jar |
CVE-2019-14892 | jackson-databind-2.6.7.2.jar |
CVE-2021-23382 | postcss-6.0.23.tgz |
CVE-2021-41079 | tomcat-embed-core-8.5.32.jar |
CVE-2021-4104 | log4j-1.2.14.jar |
CVE-2022-25758 | scss-tokenizer-0.2.3.tgz |
CVE-2020-7598 | minimist-0.0.10.tgz |
CVE-2019-11269 | spring-security-oauth2-2.2.1.RELEASE.jar |
CVE-2022-41854 | snakeyaml-1.15.jar |
CVE-2021-22096 | spring-web-5.0.8.RELEASE.jar |
CVE-2018-19361 | jackson-databind-2.9.6.jar |
CVE-2022-24823 | netty-common-4.1.17.Final.jar |
CVE-2018-14720 | jackson-databind-2.9.6.jar |
CVE-2020-36179 | jackson-databind-2.9.6.jar |
CVE-2020-15522 | bcprov-jdk15on-1.56.jar |
CVE-2021-3803 | nth-check-1.0.2.tgz |
CVE-2020-36180 | jackson-databind-2.9.6.jar |
CVE-2021-27290 | ssri-5.3.0.tgz |
CVE-2021-30640 | tomcat-embed-core-8.5.32.jar |
CVE-2018-11698 | libsass-3.5.2 |
CVE-2020-28498 | elliptic-6.5.3.tgz |
CVE-2018-14732 | webpack-dev-server-2.11.5.tgz |
CVE-2022-38752 | snakeyaml-1.17.jar |
CVE-2018-14721 | jackson-databind-2.9.6.jar |
CVE-2016-1000027 | spring-web-5.0.8.RELEASE.jar |
CVE-2021-22047 | spring-data-rest-webmvc-3.0.9.RELEASE.jar |
CVE-2019-16869 | netty-codec-http-4.1.17.Final.jar |
WS-2020-0408 | netty-handler-4.1.17.Final.jar |
CVE-2022-23302 | log4j-1.2.14.jar |
CVE-2022-48285 | jszip-3.5.0.tgz |
CVE-2019-16943 | jackson-databind-2.9.6.jar |
CVE-2019-16769 | serialize-javascript-1.9.1.tgz |
CVE-2021-22112 | spring-security-web-5.0.7.RELEASE.jar |
CVE-2020-9488 | log4j-core-2.7.jar |
CVE-2018-1000632 | dom4j-1.6.1.jar |
WS-2020-0443 | socket.io-2.1.1.tgz |
CVE-2018-19838 | node-sass-4.14.1.tgz |
CVE-2019-14540 | jackson-databind-2.9.6.jar |
CVE-2021-21290 | netty-handler-4.1.17.Final.jar |
CVE-2021-31597 | xmlhttprequest-ssl-1.5.5.tgz |
CVE-2020-28469 | glob-parent-3.1.0.tgz |
CVE-2020-11023 | jquery-1.11.1.jar |
CVE-2020-28491 | jackson-dataformat-cbor-2.6.7.jar |
CVE-2022-23305 | log4j-1.2.14.jar |
WS-2019-0307 | mem-1.1.0.tgz |
CVE-2019-14379 | jackson-databind-2.6.7.2.jar |
CVE-2020-11619 | jackson-databind-2.9.6.jar |
CVE-2021-44832 | log4j-core-2.9.0.jar |
CVE-2017-17485 | jackson-databind-2.6.7.2.jar |
CVE-2018-14718 | jackson-databind-2.6.7.2.jar |
CVE-2019-10219 | hibernate-validator-6.0.11.Final.jar |
CVE-2020-10672 | jackson-databind-2.6.7.2.jar |
CVE-2020-10683 | dom4j-1.6.1.jar |
CVE-2022-22978 | spring-security-web-5.0.7.RELEASE.jar |
CVE-2020-36182 | jackson-databind-2.9.6.jar |
CVE-2020-36187 | jackson-databind-2.6.7.2.jar |
CVE-2020-13956 | httpclient-4.5.9.jar |
CVE-2019-20445 | netty-codec-http-4.1.17.Final.jar |
CVE-2020-9488 | log4j-core-2.9.0.jar |
CVE-2022-1650 | eventsource-0.1.6.tgz |
CVE-2022-22970 | spring-beans-5.0.8.RELEASE.jar |
CVE-2020-14195 | jackson-databind-2.9.6.jar |
CVE-2022-3517 | minimatch-3.0.4.tgz |
CVE-2022-41940 | engine.io-3.2.1.tgz |
Base branch total remaining vulnerabilities: 671
Base branch commit: null
Total libraries scanned: 329
Scan token: 80be12c5207a48b9870378acefab07e6
Loading