You are on page 1of 50

Severity Library ArtifactId GroupId Version VulnerableType

Medium angular-1.6.8.min.js angular-1.6angular.js 1.6.8 2 VulnerabCVE


High angular-1.6.8.min.js angular-1.6angular.js 1.6.8 2 VulnerabCVE
High spring-beans-3.0.3.RELEASE.jar spring-beaorg.spring 3.0.3.RELE 2 VulnerabCVE
Medium spring-beans-3.0.3.RELEASE.jar spring-beaorg.spring 3.0.3.RELE 2 VulnerabWS
Medium spring-core-3.0.3.RELEASE.jar spring-coreorg.spring 3.0.3.RELE 5 VulnerabCVE
Medium spring-core-3.0.3.RELEASE.jar spring-coreorg.spring 3.0.3.RELE 5 VulnerabWS
Medium spring-core-3.0.3.RELEASE.jar spring-coreorg.spring 3.0.3.RELE 5 VulnerabCVE
Medium spring-core-3.0.3.RELEASE.jar spring-coreorg.spring 3.0.3.RELE 5 VulnerabCVE
High spring-core-3.0.3.RELEASE.jar spring-coreorg.spring 3.0.3.RELE 5 VulnerabCVE
Medium spring-context-3.0.3.RELEASE.jar spring-con org.spring 3.0.3.RELE 2 VulnerabWS
High spring-context-3.0.3.RELEASE.jar spring-con org.spring 3.0.3.RELE 2 VulnerabCVE
High jetty-webapp-9.4.14.v20181114.jar jetty-webaorg.eclipse.9.4.14.v20 1 VulnerabiCVE
High jasypt-1.6.jar jasypt org.jasypt 1.6 1 VulnerabiCVE
High http2-server-9.4.14.v20181114.jar http2-serv org.eclipse9.4.14.v20 1 VulnerabiCVE
Medium http2-common-9.4.14.v20181114.jar http2-com org.eclipse9.4.14.v20 8 VulnerabCVE
High http2-common-9.4.14.v20181114.jar http2-com org.eclipse9.4.14.v20 8 VulnerabCVE
High http2-common-9.4.14.v20181114.jar http2-com org.eclipse9.4.14.v20 8 VulnerabCVE
High http2-common-9.4.14.v20181114.jar http2-com org.eclipse9.4.14.v20 8 VulnerabCVE
High http2-common-9.4.14.v20181114.jar http2-com org.eclipse9.4.14.v20 8 VulnerabCVE
High http2-common-9.4.14.v20181114.jar http2-com org.eclipse9.4.14.v20 8 VulnerabCVE
High http2-common-9.4.14.v20181114.jar http2-com org.eclipse9.4.14.v20 8 VulnerabCVE
High http2-common-9.4.14.v20181114.jar http2-com org.eclipse9.4.14.v20 8 VulnerabCVE
High pebble-3.1.0.jar pebble io.pebblet 3.1.0 2 VulnerabCVE
High pebble-3.1.0.jar pebble io.pebblet 3.1.0 2 VulnerabCVE
Medium spring-expression-3.0.3.RELEASE.jar spring-exp org.spring 3.0.3.RELE 1 VulnerabCVE
Low jetty-http-9.4.14.v20181114.jar jetty-http org.eclipse.9.4.14.v20 3 VulnerabCVE
Medium jetty-http-9.4.14.v20181114.jar jetty-http org.eclipse.9.4.14.v20 3 VulnerabCVE
Medium jetty-http-9.4.14.v20181114.jar jetty-http org.eclipse.9.4.14.v20 3 VulnerabCVE
Medium hibernate-validator-6.0.17.Final.jar hibernate-vorg.hiberna6.0.17.Fina2 VulnerabCVE
Medium hibernate-validator-6.0.17.Final.jar hibernate-vorg.hiberna6.0.17.Fina2 VulnerabCVE
High asciidoctorj-1.5.3.2.jar asciidoctororg.asciido1.5.3.2 1 VulnerabiCVE
Medium jetty-servlet-9.4.14.v20181114.jar jetty-servleorg.eclipse.9.4.14.v20 1 VulnerabCVE
Medium angular-sanitize-1.6.8.js angular-sanangular.js 1.6.8 1 VulnerabWS
High jetty-io-9.4.14.v20181114.jar jetty-io org.eclipse.9.4.14.v20 1 VulnerabiCVE
Medium angular-sanitize-1.6.8.min.js angular-sanangular.js 1.6.8 1 VulnerabWS
High infinispan-commons-8.2.4.Final.jar infinispan org.infinis 8.2.4.Final 1 VulnerabiCVE
Medium commons-io-2.6.jar commons-icommons-i2.6 1 VulnerabCVE
Medium cxf-core-3.1.8.jar cxf-core org.apache3.1.8 2 VulnerabCVE
Medium cxf-core-3.1.8.jar cxf-core org.apache3.1.8 2 VulnerabCVE
Medium groovy-2.4.12.jar groovy org.codeha2.4.12 1 VulnerabCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
Medium jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
Medium jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High jackson-databind-2.9.9.jar jackson-dacom.faster2.9.9 52 VulneraCVE
High uimaj-core-3.0.1.jar uimaj-coreorg.apache3.0.1 1 VulnerabiCVE
High gson-2.8.6.jar gson com.google2.8.6 2 VulnerabWS
High gson-2.8.6.jar gson com.google2.8.6 2 VulnerabCVE
Medium spring-expression-5.1.9.RELEASE.jar spring-exp org.spring 5.1.9.RELE 1 VulnerabCVE
Medium follow-redirects-1.13.0.tgz follow-redifollow-redi1.13.0 2 VulnerabCVE
Medium follow-redirects-1.13.0.tgz follow-redifollow-redi1.13.0 2 VulnerabCVE
Medium logback-core-1.1.3.jar logback-coch.qos.log 1.1.3 2 VulnerabCVE
High logback-core-1.1.3.jar logback-coch.qos.log 1.1.3 2 VulnerabCVE
High infinispan-core-8.2.4.Final.jar infinispan- org.infinis 8.2.4.Final 1 VulnerabiCVE
Medium metadata-extractor-2.11.0.jar metadata-ecom.drewn2.11.0 3 VulnerabCVE
Medium metadata-extractor-2.11.0.jar metadata-ecom.drewn2.11.0 3 VulnerabCVE
High metadata-extractor-2.11.0.jar metadata-ecom.drewn2.11.0 3 VulnerabCVE
High bcprov-jdk15-1.46.jar bcprov-jdkorg.bouncy1.46 11 VulneraCVE
Medium bcprov-jdk15-1.46.jar bcprov-jdkorg.bouncy1.46 11 VulneraCVE
High bcprov-jdk15-1.46.jar bcprov-jdkorg.bouncy1.46 11 VulneraCVE
Low bcprov-jdk15-1.46.jar bcprov-jdkorg.bouncy1.46 11 VulneraCVE
Medium bcprov-jdk15-1.46.jar bcprov-jdkorg.bouncy1.46 11 VulneraCVE
Low bcprov-jdk15-1.46.jar bcprov-jdkorg.bouncy1.46 11 VulneraCVE
Medium bcprov-jdk15-1.46.jar bcprov-jdkorg.bouncy1.46 11 VulneraCVE
Medium bcprov-jdk15-1.46.jar bcprov-jdkorg.bouncy1.46 11 VulneraCVE
High bcprov-jdk15-1.46.jar bcprov-jdkorg.bouncy1.46 11 VulneraCVE
Medium bcprov-jdk15-1.46.jar bcprov-jdkorg.bouncy1.46 11 VulneraCVE
Low bcprov-jdk15-1.46.jar bcprov-jdkorg.bouncy1.46 11 VulneraCVE
High tika-core-1.20.jar tika-core org.apache.1.20 5 VulnerabCVE
Low tika-core-1.20.jar tika-core org.apache.1.20 5 VulnerabCVE
High tika-core-1.20.jar tika-core org.apache.1.20 5 VulnerabCVE
Medium tika-core-1.20.jar tika-core org.apache.1.20 5 VulnerabCVE
Medium tika-core-1.20.jar tika-core org.apache.1.20 5 VulnerabCVE
Medium cxf-rt-frontend-jaxrs-3.1.8.jar cxf-rt-fron org.apache3.1.8 1 VulnerabCVE
Medium poi-ooxml-4.0.1.jar poi-ooxml org.apache4.0.1 1 VulnerabCVE
High groovy-all-1.8.9.jar groovy-all org.codeha1.8.9 2 VulnerabCVE
Medium groovy-all-1.8.9.jar groovy-all org.codeha1.8.9 2 VulnerabCVE
High xalan-2.7.1.jar xalan xalan 2.7.1 2 VulnerabiCVE
High xalan-2.7.1.jar xalan xalan 2.7.1 2 VulnerabiCVE
High commons-compress-1.18.jar commons-corg.apach 1.18 5 VulnerabCVE
High commons-compress-1.18.jar commons-corg.apach 1.18 5 VulnerabCVE
High commons-compress-1.18.jar commons-corg.apach 1.18 5 VulnerabCVE
High commons-compress-1.18.jar commons-corg.apach 1.18 5 VulnerabCVE
High commons-compress-1.18.jar commons-corg.apach 1.18 5 VulnerabCVE
Medium tinymce-4.8.0.tgz tinymce-4.8tinymce 4.8.0 9 VulnerabWS
Medium tinymce-4.8.0.tgz tinymce-4.8tinymce 4.8.0 9 VulnerabCVE
Medium tinymce-4.8.0.tgz tinymce-4.8tinymce 4.8.0 9 VulnerabWS
High tinymce-4.8.0.tgz tinymce-4.8tinymce 4.8.0 9 VulnerabWS
Medium tinymce-4.8.0.tgz tinymce-4.8tinymce 4.8.0 9 VulnerabWS
Medium tinymce-4.8.0.tgz tinymce-4.8tinymce 4.8.0 9 VulnerabWS
Medium tinymce-4.8.0.tgz tinymce-4.8tinymce 4.8.0 9 VulnerabWS
High tinymce-4.8.0.tgz tinymce-4.8tinymce 4.8.0 9 VulnerabWS
Medium tinymce-4.8.0.tgz tinymce-4.8tinymce 4.8.0 9 VulnerabCVE
Medium bcprov-jdk15on-1.64.jar bcprov-jdkorg.bouncy1.64 1 VulnerabCVE
High commons-fileupload-1.3.3.jar commons-ficommons-fi1.3.3 1 VulnerabiWS
Medium commons-codec-1.6.jar commons-ccommons-c1.6 1 VulnerabWS
Medium lxml-4.5.0-cp37-cp37m-manylinux1_x86 lxml-4.5.0 lxml 4.5.0 4 VulnerabCVE
High lxml-4.5.0-cp37-cp37m-manylinux1_x86 lxml-4.5.0 lxml 4.5.0 4 VulnerabCVE
High lxml-4.5.0-cp37-cp37m-manylinux1_x86 lxml-4.5.0 lxml 4.5.0 4 VulnerabCVE
Medium lxml-4.5.0-cp37-cp37m-manylinux1_x86 lxml-4.5.0 lxml 4.5.0 4 VulnerabCVE
High ansi-regex-4.1.0.tgz ansi-regex-ansi-regex 4.1.0 1 VulnerabiCVE
High spring-beans-5.1.9.RELEASE.jar spring-beaorg.spring 5.1.9.RELE 2 VulnerabCVE
Medium spring-beans-5.1.9.RELEASE.jar spring-beaorg.spring 5.1.9.RELE 2 VulnerabCVE
High cxf-rt-ws-security-3.1.8.jar cxf-rt-ws-s org.apache3.1.8 1 VulnerabiCVE
Medium logback-core-1.2.3.jar logback-coch.qos.log 1.2.3 1 VulnerabCVE
Medium logback-core-1.2.3.jar logback-coch.qos.log 1.2.3 1 VulnerabCVE
High jcommander-1.35.jar jcommandecom.beust 1.35 1 VulnerabiWS
Medium logback-classic-1.2.3.jar logback-clach.qos.log 1.2.3 1 VulnerabCVE
Medium logback-classic-1.2.3.jar logback-clach.qos.log 1.2.3 1 VulnerabCVE
Medium bootstrap-2.3.1.js bootstrap-2twitter-boo2.3.1 6 VulnerabCVE
Medium bootstrap-2.3.1.js bootstrap-2twitter-boo2.3.1 6 VulnerabCVE
Medium bootstrap-2.3.1.js bootstrap-2twitter-boo2.3.1 6 VulnerabCVE
Medium bootstrap-2.3.1.js bootstrap-2twitter-boo2.3.1 6 VulnerabCVE
Medium bootstrap-2.3.1.js bootstrap-2twitter-boo2.3.1 6 VulnerabCVE
Medium bootstrap-2.3.1.js bootstrap-2twitter-boo2.3.1 6 VulnerabCVE
High moment-2.22.2.tgz moment-2.2 moment 2.22.2 2 VulnerabCVE
High moment-2.22.2.tgz moment-2.2 moment 2.22.2 2 VulnerabCVE
Medium microsoft.aspnetcore.authentication.jwtmicrosoft. Microsoft. 3.1.3 1 VulnerabCVE
High xmlsec-1.5.6.jar xmlsec org.apache1.5.6 1 VulnerabiCVE
Medium jquery-3.4.1.min.js jquery-3.4.jquery 3.4.1 2 VulnerabCVE
Medium jquery-3.4.1.min.js jquery-3.4.jquery 3.4.1 2 VulnerabCVE
Medium xercesImpl-2.8.0.jar xercesImplxerces 2.8.0 4 VulnerabCVE
Medium xercesImpl-2.8.0.jar xercesImplxerces 2.8.0 4 VulnerabCVE
High xercesImpl-2.8.0.jar xercesImplxerces 2.8.0 4 VulnerabCVE
Medium xercesImpl-2.8.0.jar xercesImplxerces 2.8.0 4 VulnerabCVE
Medium httpclient-4.5.9.jar httpclient org.apache4.5.9 1 VulnerabCVE
High jackson-databind-2.10.0.jar jackson-dacom.faster2.10.0 4 VulnerabCVE
High jackson-databind-2.10.0.jar jackson-dacom.faster2.10.0 4 VulnerabCVE
High jackson-databind-2.10.0.jar jackson-dacom.faster2.10.0 4 VulnerabCVE
High jackson-databind-2.10.0.jar jackson-dacom.faster2.10.0 4 VulnerabCVE
High hadoop-hdfs-client-3.2.0.jar hadoop-hdforg.apache3.2.0 1 VulnerabiCVE
High jdom-1.0.jar jdom jdom 1.0 1 VulnerabiCVE
High postgresql-42.2.12.jar postgresql org.postgre42.2.12 6 VulnerabCVE
High postgresql-42.2.12.jar postgresql org.postgre42.2.12 6 VulnerabCVE
Medium postgresql-42.2.12.jar postgresql org.postgre42.2.12 6 VulnerabCVE
High postgresql-42.2.12.jar postgresql org.postgre42.2.12 6 VulnerabWS
High postgresql-42.2.12.jar postgresql org.postgre42.2.12 6 VulnerabCVE
High postgresql-42.2.12.jar postgresql org.postgre42.2.12 6 VulnerabCVE
Medium activemq-core-5.4.2.jar activemq-corg.apache5.4.2 4 VulnerabCVE
Medium activemq-core-5.4.2.jar activemq-corg.apache5.4.2 4 VulnerabCVE
Low activemq-core-5.4.2.jar activemq-corg.apache5.4.2 4 VulnerabCVE
Medium activemq-core-5.4.2.jar activemq-corg.apache5.4.2 4 VulnerabCVE
Medium ant-1.5.jar ant ant 1.5 5 VulnerabCVE
Medium ant-1.5.jar ant ant 1.5 5 VulnerabCVE
Medium ant-1.5.jar ant ant 1.5 5 VulnerabCVE
Medium ant-1.5.jar ant ant 1.5 5 VulnerabCVE
High ant-1.5.jar ant ant 1.5 5 VulnerabCVE
Medium spring-core-5.1.9.RELEASE.jar spring-coreorg.spring 5.1.9.RELE 2 VulnerabCVE
Medium spring-core-5.1.9.RELEASE.jar spring-coreorg.spring 5.1.9.RELE 2 VulnerabCVE
Medium not-yet-commons-ssl-0.3.9.jar not-yet-co ca.juliusda0.3.9 1 VulnerabCVE
Medium bootstrap-3.3.7.tgz bootstrap-3bootstrap 3.3.7 6 VulnerabCVE
Medium bootstrap-3.3.7.tgz bootstrap-3bootstrap 3.3.7 6 VulnerabCVE
Medium bootstrap-3.3.7.tgz bootstrap-3bootstrap 3.3.7 6 VulnerabCVE
Medium bootstrap-3.3.7.tgz bootstrap-3bootstrap 3.3.7 6 VulnerabCVE
Medium bootstrap-3.3.7.tgz bootstrap-3bootstrap 3.3.7 6 VulnerabCVE
Medium bootstrap-3.3.7.tgz bootstrap-3bootstrap 3.3.7 6 VulnerabCVE
Medium spring-web-5.1.9.RELEASE.jar spring-weborg.spring 5.1.9.RELE 4 VulnerabCVE
High spring-web-5.1.9.RELEASE.jar spring-weborg.spring 5.1.9.RELE 4 VulnerabCVE
Medium spring-web-5.1.9.RELEASE.jar spring-weborg.spring 5.1.9.RELE 4 VulnerabCVE
High spring-web-5.1.9.RELEASE.jar spring-weborg.spring 5.1.9.RELE 4 VulnerabCVE
Medium spring-webmvc-5.1.9.RELEASE.jar spring-we org.spring 5.1.9.RELE 1 VulnerabCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
Medium jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
Medium jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High jackson-databind-2.1.2.jar jackson-dacom.faster2.1.2 66 VulneraCVE
High cxf-rt-security-3.1.8.jar cxf-rt-securorg.apache3.1.8 1 VulnerabiCVE
High microsoft.visualstudio.azure.containers. microsoft.vMicrosoft.V1.9.10 1 VulnerabiWS
Medium microsoft.visualstudio.web.codegenerat microsoft. Microsoft. 3.1.0 1 VulnerabCVE
Medium pdfbox-2.0.13.jar pdfbox org.apache2.0.13 4 VulnerabCVE
Medium pdfbox-2.0.13.jar pdfbox org.apache2.0.13 4 VulnerabCVE
Medium pdfbox-2.0.13.jar pdfbox org.apache2.0.13 4 VulnerabCVE
Medium pdfbox-2.0.13.jar pdfbox org.apache2.0.13 4 VulnerabCVE
High spring-web-5.2.20.RELEASE.jar spring-weborg.spring 5.2.20.REL 1 VulnerabiCVE
Medium jackson-core-2.1.2.jar jackson-cocom.faster2.1.2 2 VulnerabWS
Medium jackson-core-2.1.2.jar jackson-cocom.faster2.1.2 2 VulnerabWS
High jquery.validate-1.9.0.min.js jquery.vali jquery-vali1.9.0 1 VulnerabiCVE
High jsonpointer-4.0.1.tgz jsonpointerjsonpointe4.0.1 2 VulnerabWS
High jsonpointer-4.0.1.tgz jsonpointerjsonpointe4.0.1 2 VulnerabCVE
Medium infinispan-client-hotrod-8.2.4.Final.jar infinispan- org.infinis 8.2.4.Final 2 VulnerabCVE
High infinispan-client-hotrod-8.2.4.Final.jar infinispan- org.infinis 8.2.4.Final 2 VulnerabCVE
High jsoup-1.11.3.jar jsoup org.jsoup 1.11.3 2 VulnerabCVE
Medium jsoup-1.11.3.jar jsoup org.jsoup 1.11.3 2 VulnerabCVE
Medium numpy-1.18.4-cp37-cp37m-manylinux1_numpy-1.1numpy 1.18.4 2 VulnerabCVE
Medium numpy-1.18.4-cp37-cp37m-manylinux1_numpy-1.1numpy 1.18.4 2 VulnerabCVE
High jackson-databind-2.9.10.6.jar jackson-dacom.faster2.9.10.6 17 VulneraCVE
High jackson-databind-2.9.10.6.jar jackson-dacom.faster2.9.10.6 17 VulneraCVE
High jackson-databind-2.9.10.6.jar jackson-dacom.faster2.9.10.6 17 VulneraCVE
High jackson-databind-2.9.10.6.jar jackson-dacom.faster2.9.10.6 17 VulneraCVE
High jackson-databind-2.9.10.6.jar jackson-dacom.faster2.9.10.6 17 VulneraCVE
High jackson-databind-2.9.10.6.jar jackson-dacom.faster2.9.10.6 17 VulneraCVE
High jackson-databind-2.9.10.6.jar jackson-dacom.faster2.9.10.6 17 VulneraCVE
High jackson-databind-2.9.10.6.jar jackson-dacom.faster2.9.10.6 17 VulneraCVE
High jackson-databind-2.9.10.6.jar jackson-dacom.faster2.9.10.6 17 VulneraCVE
High jackson-databind-2.9.10.6.jar jackson-dacom.faster2.9.10.6 17 VulneraCVE
High jackson-databind-2.9.10.6.jar jackson-dacom.faster2.9.10.6 17 VulneraCVE
High jackson-databind-2.9.10.6.jar jackson-dacom.faster2.9.10.6 17 VulneraCVE
High jackson-databind-2.9.10.6.jar jackson-dacom.faster2.9.10.6 17 VulneraCVE
High jackson-databind-2.9.10.6.jar jackson-dacom.faster2.9.10.6 17 VulneraCVE
High jackson-databind-2.9.10.6.jar jackson-dacom.faster2.9.10.6 17 VulneraCVE
High jackson-databind-2.9.10.6.jar jackson-dacom.faster2.9.10.6 17 VulneraCVE
High jackson-databind-2.9.10.6.jar jackson-dacom.faster2.9.10.6 17 VulneraCVE
Medium spring-core-5.2.20.RELEASE.jar spring-coreorg.spring 5.2.20.REL 1 VulnerabCVE
Low jetty-client-9.4.14.v20181114.jar jetty-clientorg.eclipse.9.4.14.v20 1 VulnerabiCVE
Medium jetty-util-9.4.14.v20181114.jar jetty-util org.eclipse.9.4.14.v20 1 VulnerabCVE
Medium jetty-server-9.4.14.v20181114.jar jetty-serveorg.eclipse.9.4.14.v20 6 VulnerabCVE
Low jetty-server-9.4.14.v20181114.jar jetty-serveorg.eclipse.9.4.14.v20 6 VulnerabCVE
Medium jetty-server-9.4.14.v20181114.jar jetty-serveorg.eclipse.9.4.14.v20 6 VulnerabCVE
Low jetty-server-9.4.14.v20181114.jar jetty-serveorg.eclipse.9.4.14.v20 6 VulnerabCVE
Medium jetty-server-9.4.14.v20181114.jar jetty-serveorg.eclipse.9.4.14.v20 6 VulnerabCVE
Medium jetty-server-9.4.14.v20181114.jar jetty-serveorg.eclipse.9.4.14.v20 6 VulnerabCVE
High netty-handler-4.1.42.Final.jar netty-handio.netty 4.1.42.Fina2 VulnerabWS
Medium netty-handler-4.1.42.Final.jar netty-handio.netty 4.1.42.Fina2 VulnerabCVE
Medium numpy-1.21.6-cp37-cp37m-manylinux_2numpy-1.2numpy 1.21.6 1 VulnerabCVE
High tomcat-embed-websocket-9.0.22.jar tomcat-emorg.apach 9.0.22 1 VulnerabiCVE
High velocity-1.7.jar velocity org.apache.1.7 1 VulnerabiCVE
High jdom2-2.0.6.jar jdom2 org.jdom 2.0.6 1 VulnerabiCVE
Medium tinymce-4.7.9.min.js tinymce-4.7tinymce 4.7.9 10 VulneraWS
Medium tinymce-4.7.9.min.js tinymce-4.7tinymce 4.7.9 10 VulneraCVE
Medium tinymce-4.7.9.min.js tinymce-4.7tinymce 4.7.9 10 VulneraCVE
Medium tinymce-4.7.9.min.js tinymce-4.7tinymce 4.7.9 10 VulneraWS
High tinymce-4.7.9.min.js tinymce-4.7tinymce 4.7.9 10 VulneraWS
Medium tinymce-4.7.9.min.js tinymce-4.7tinymce 4.7.9 10 VulneraWS
Medium tinymce-4.7.9.min.js tinymce-4.7tinymce 4.7.9 10 VulneraWS
Medium tinymce-4.7.9.min.js tinymce-4.7tinymce 4.7.9 10 VulneraWS
High tinymce-4.7.9.min.js tinymce-4.7tinymce 4.7.9 10 VulneraWS
Medium tinymce-4.7.9.min.js tinymce-4.7tinymce 4.7.9 10 VulneraCVE
Medium jquery.tinymce-4.7.9.min.js jquery.tinytinymce 4.7.9 7 VulnerabCVE
Medium jquery.tinymce-4.7.9.min.js jquery.tinytinymce 4.7.9 7 VulnerabCVE
Medium jquery.tinymce-4.7.9.min.js jquery.tinytinymce 4.7.9 7 VulnerabWS
High jquery.tinymce-4.7.9.min.js jquery.tinytinymce 4.7.9 7 VulnerabWS
Medium jquery.tinymce-4.7.9.min.js jquery.tinytinymce 4.7.9 7 VulnerabWS
High jquery.tinymce-4.7.9.min.js jquery.tinytinymce 4.7.9 7 VulnerabWS
Medium jquery.tinymce-4.7.9.min.js jquery.tinytinymce 4.7.9 7 VulnerabCVE
Medium netty-common-4.1.42.Final.jar netty-com io.netty 4.1.42.Fina1 VulnerabCVE
Medium commons-httpclient-3.1.jar commons-ht commons-ht 3.1 1 VulnerabCVE
Medium jquery-3.3.1.js jquery-3.3.jquery 3.3.1 3 VulnerabCVE
Medium jquery-3.3.1.js jquery-3.3.jquery 3.3.1 3 VulnerabCVE
Medium jquery-3.3.1.js jquery-3.3.jquery 3.3.1 3 VulnerabCVE
Medium netty-codec-http2-4.1.42.Final.jar netty-codeio.netty 4.1.42.Fina2 VulnerabCVE
Medium netty-codec-http2-4.1.42.Final.jar netty-codeio.netty 4.1.42.Fina2 VulnerabCVE
Medium jquery-3.3.1.min.js jquery-3.3.jquery 3.3.1 3 VulnerabCVE
Medium jquery-3.3.1.min.js jquery-3.3.jquery 3.3.1 3 VulnerabCVE
Medium jquery-3.3.1.min.js jquery-3.3.jquery 3.3.1 3 VulnerabCVE
High netty-codec-http-4.1.42.Final.jar netty-codeio.netty 4.1.42.Fina6 VulnerabCVE
Medium netty-codec-http-4.1.42.Final.jar netty-codeio.netty 4.1.42.Fina6 VulnerabCVE
High netty-codec-http-4.1.42.Final.jar netty-codeio.netty 4.1.42.Fina6 VulnerabCVE
High netty-codec-http-4.1.42.Final.jar netty-codeio.netty 4.1.42.Fina6 VulnerabCVE
Medium netty-codec-http-4.1.42.Final.jar netty-codeio.netty 4.1.42.Fina6 VulnerabCVE
Medium netty-codec-http-4.1.42.Final.jar netty-codeio.netty 4.1.42.Fina6 VulnerabCVE
Medium core-8.2.3.tgz core-8.2.3.@angular/8.2.3 1 VulnerabCVE
High netty-codec-4.1.42.Final.jar netty-codeio.netty 4.1.42.Fina3 VulnerabCVE
High netty-codec-4.1.42.Final.jar netty-codeio.netty 4.1.42.Fina3 VulnerabCVE
High netty-codec-4.1.42.Final.jar netty-codeio.netty 4.1.42.Fina3 VulnerabCVE
Medium protobuf-java-3.6.1.jar protobuf-j com.google3.6.1 3 VulnerabCVE
High protobuf-java-3.6.1.jar protobuf-j com.google3.6.1 3 VulnerabCVE
High protobuf-java-3.6.1.jar protobuf-j com.google3.6.1 3 VulnerabCVE
High newtonsoft.json.12.0.3.nupkg newtonsoftNewtonsoft12.0.3 1 VulnerabiWS
High chart.js-2.8.0.tgz chart.js-2.8chart.js 2.8.0 1 VulnerabiCVE
Medium esapi-2.0.1.jar esapi org.owasp.2.0.1 4 VulnerabCVE
Medium esapi-2.0.1.jar esapi org.owasp.2.0.1 4 VulnerabCVE
High esapi-2.0.1.jar esapi org.owasp.2.0.1 4 VulnerabCVE
Medium esapi-2.0.1.jar esapi org.owasp.2.0.1 4 VulnerabCVE
Medium bootstrap-2.3.1.min.js bootstrap-2twitter-boo2.3.1 6 VulnerabCVE
Medium bootstrap-2.3.1.min.js bootstrap-2twitter-boo2.3.1 6 VulnerabCVE
Medium bootstrap-2.3.1.min.js bootstrap-2twitter-boo2.3.1 6 VulnerabCVE
Medium bootstrap-2.3.1.min.js bootstrap-2twitter-boo2.3.1 6 VulnerabCVE
Medium bootstrap-2.3.1.min.js bootstrap-2twitter-boo2.3.1 6 VulnerabCVE
Medium bootstrap-2.3.1.min.js bootstrap-2twitter-boo2.3.1 6 VulnerabCVE
High angular-v1.5.8 angular angular v1.5.8 2 VulnerabWS
Medium angular-v1.5.8 angular angular v1.5.8 2 VulnerabWS
High junrar-2.0.0.jar junrar com.github2.0.0 1 VulnerabiCVE
High spring-boot-2.1.7.RELEASE.jar spring-booorg.spring 2.1.7.RELE 1 VulnerabiCVE
High solr-core-8.1.0.jar solr-core org.apache.8.1.0 6 VulnerabCVE
High solr-core-8.1.0.jar solr-core org.apache.8.1.0 6 VulnerabCVE
High solr-core-8.1.0.jar solr-core org.apache.8.1.0 6 VulnerabCVE
High solr-core-8.1.0.jar solr-core org.apache.8.1.0 6 VulnerabCVE
High solr-core-8.1.0.jar solr-core org.apache.8.1.0 6 VulnerabCVE
High solr-core-8.1.0.jar solr-core org.apache.8.1.0 6 VulnerabCVE
Medium httpclient-4.2.2.jar httpclient org.apache4.2.2 4 VulnerabCVE
Low httpclient-4.2.2.jar httpclient org.apache4.2.2 4 VulnerabCVE
Medium httpclient-4.2.2.jar httpclient org.apache4.2.2 4 VulnerabCVE
Medium httpclient-4.2.2.jar httpclient org.apache4.2.2 4 VulnerabWS
High simple-xml-2.7.1.jar simple-xmlorg.simple 2.7.1 1 VulnerabiCVE
High system.text.encodings.web.4.5.0.nupkg system.texSystem.Tex4.5.0 1 VulnerabiCVE
High system.text.regularexpressions.4.3.0.nu system.texSystem.Tex4.3.0 1 VulnerabiCVE
Low cxf-rt-transports-http-3.1.8.jar cxf-rt-tran org.apache3.1.8 3 VulnerabCVE
High cxf-rt-transports-http-3.1.8.jar cxf-rt-tran org.apache3.1.8 3 VulnerabCVE
Medium cxf-rt-transports-http-3.1.8.jar cxf-rt-tran org.apache3.1.8 3 VulnerabCVE
Medium jetty-servlets-9.4.14.v20181114.jar jetty-servleorg.eclipse.9.4.14.v20 1 VulnerabCVE
Low guava-25.1-jre.jar guava com.google25.1-jre 1 VulnerabiCVE
High underscore-min-1.5.1.js underscoreunderscore1.5.1 1 VulnerabiCVE
High async-3.2.0.tgz async-3.2.0async 3.2.0 1 VulnerabiCVE
High gson-2.8.5.jar gson com.google2.8.5 2 VulnerabWS
High gson-2.8.5.jar gson com.google2.8.5 2 VulnerabCVE
High avatica-core-1.13.0.jar avatica-cororg.apache.1.13.0 1 VulnerabiCVE
High json-20171018.jar json org.json 20171018 1 VulnerabiWS
High newtonsoft.json.11.0.2.nupkg newtonsoftNewtonsoft11.0.2 1 VulnerabiWS
Medium calcite-core-1.18.0.jar calcite-cor org.apache.1.18.0 1 VulnerabCVE
High ramda-0.25.0.tgz ramda-0.25ramda 0.25.0 1 VulnerabiCVE
Medium httpclient-4.5.6.jar httpclient org.apache4.5.6 1 VulnerabCVE
Medium axios-0.20.0.tgz axios-0.20.axios 0.20.0 1 VulnerabCVE
Medium tika-parsers-1.20.jar tika-parserorg.apache.1.20 6 VulnerabCVE
Medium tika-parsers-1.20.jar tika-parserorg.apache.1.20 6 VulnerabCVE
Medium tika-parsers-1.20.jar tika-parserorg.apache.1.20 6 VulnerabCVE
Medium tika-parsers-1.20.jar tika-parserorg.apache.1.20 6 VulnerabCVE
Medium tika-parsers-1.20.jar tika-parserorg.apache.1.20 6 VulnerabCVE
Medium tika-parsers-1.20.jar tika-parserorg.apache.1.20 6 VulnerabCVE
High json-smart-2.3.jar json-smartnet.minide2.3 1 VulnerabiCVE
High json-smart-2.3.jar json-smartnet.minide2.3 1 VulnerabiCVE
High aws-sdk-2.698.0.tgz aws-sdk-2.aws-sdk 2.698.0 1 VulnerabiCVE
High hsqldb-2.5.1.jar hsqldb org.hsqldb2.5.1 1 VulnerabiCVE
High hadoop-common-3.2.0.jar hadoop-c org.apache3.2.0 2 VulnerabCVE
High hadoop-common-3.2.0.jar hadoop-c org.apache3.2.0 2 VulnerabCVE
High jquery.validate-1.17.0.min.js jquery.vali jquery-vali1.17.0 1 VulnerabiCVE
High snakeyaml-1.23.jar snakeyamlorg.yaml 1.23 6 VulnerabCVE
Medium snakeyaml-1.23.jar snakeyamlorg.yaml 1.23 6 VulnerabCVE
High snakeyaml-1.23.jar snakeyamlorg.yaml 1.23 6 VulnerabCVE
Medium snakeyaml-1.23.jar snakeyamlorg.yaml 1.23 6 VulnerabCVE
Medium snakeyaml-1.23.jar snakeyamlorg.yaml 1.23 6 VulnerabCVE
Medium snakeyaml-1.23.jar snakeyamlorg.yaml 1.23 6 VulnerabCVE
Low tomcat-embed-core-9.0.22.jar tomcat-emorg.apach 9.0.22 13 VulneraCVE
High tomcat-embed-core-9.0.22.jar tomcat-emorg.apach 9.0.22 13 VulneraCVE
High tomcat-embed-core-9.0.22.jar tomcat-emorg.apach 9.0.22 13 VulneraCVE
High tomcat-embed-core-9.0.22.jar tomcat-emorg.apach 9.0.22 13 VulneraCVE
High tomcat-embed-core-9.0.22.jar tomcat-emorg.apach 9.0.22 13 VulneraCVE
Medium tomcat-embed-core-9.0.22.jar tomcat-emorg.apach 9.0.22 13 VulneraCVE
Medium tomcat-embed-core-9.0.22.jar tomcat-emorg.apach 9.0.22 13 VulneraCVE
High tomcat-embed-core-9.0.22.jar tomcat-emorg.apach 9.0.22 13 VulneraCVE
Medium tomcat-embed-core-9.0.22.jar tomcat-emorg.apach 9.0.22 13 VulneraCVE
High tomcat-embed-core-9.0.22.jar tomcat-emorg.apach 9.0.22 13 VulneraCVE
Medium tomcat-embed-core-9.0.22.jar tomcat-emorg.apach 9.0.22 13 VulneraCVE
High tomcat-embed-core-9.0.22.jar tomcat-emorg.apach 9.0.22 13 VulneraCVE
High tomcat-embed-core-9.0.22.jar tomcat-emorg.apach 9.0.22 13 VulneraCVE
High commons-text-1.6.jar commons-torg.apach 1.6 1 VulnerabiCVE
Medium spring-beans-5.2.20.RELEASE.jar spring-beaorg.spring 5.2.20.REL 1 VulnerabCVE
Medium opensaml-2.6.1.jar opensaml org.opensa2.6.1 2 VulnerabCVE
Medium opensaml-2.6.1.jar opensaml org.opensa2.6.1 2 VulnerabCVE
Medium commons-codec-1.11.jar commons-ccommons-c1.11 1 VulnerabWS
Medium commons-codec-1.11.jar commons-ccommons-c1.11 1 VulnerabWS
High jgroups-3.6.7.Final.jar jgroups org.jgroup 3.6.7.Final 1 VulnerabiCVE
High urllib3-1.25.9-py2.py3-none-any.whl urllib3-1. urllib3 1.25.9 1 VulnerabiCVE
Medium ajv-6.5.1.tgz ajv-6.5.1.t ajv 6.5.1 1 VulnerabCVE
Medium spring-context-5.2.20.RELEASE.jar spring-con org.spring 5.2.20.REL 1 VulnerabCVE
Medium spring-messaging-5.2.20.RELEASE.jar spring-mesorg.spring 5.2.20.REL 1 VulnerabCVE
VulnerabiliCVSS 2 CVSS 3 ConfidentiaAttack ComScope Attack VecAvailabilit Integrity I Privileges
CVE-2020- 3.5 5.4 LOW LOW CHANGED NETWORK NONE LOW LOW
CVE-2019- 5.0 7.5 NONE LOW UNCHANGNETWORK NONE HIGH NONE
CVE-2022- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
WS-2021-05.3 5.3 LOW LOW UNCHANGLOCAL LOW LOW LOW
CVE-2018- 5.0 5.3 LOW LOW UNCHANGNETWORK NONE NONE NONE
WS-2021-06.1 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2021- 4.0 4.3 NONE LOW UNCHANGNETWORK NONE LOW LOW
CVE-2014- 5.0 5.3 LOW LOW UNCHANGNETWORK NONE NONE NONE
CVE-2011- 6.8 7.3 LOW LOW UNCHANGNETWORK LOW LOW NONE
WS-2016-74.9 4.9 NONE LOW UNCHANGNETWORK HIGH NONE HIGH
CVE-2011- 6.8 7.3 LOW LOW UNCHANGNETWORK LOW LOW NONE
CVE-2020- 4.4 7.0 HIGH HIGH UNCHANGLOCAL HIGH HIGH LOW
CVE-2014- 5.0 7.5 HIGH LOW UNCHANGNETWORK NONE NONE NONE
CVE-2022- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2019- 6.8 6.5 NONE LOW UNCHANGNETWORK HIGH NONE LOW
CVE-2019- 7.8 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2019- 7.8 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2019- 7.8 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2019- 7.8 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2019- 7.8 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2019- 7.8 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2019- 7.8 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2019- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2022- 9.8 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2022- 4.0 6.5 NONE LOW UNCHANGNETWORK HIGH NONE LOW
CVE-2022- 4.0 2.7 NONE LOW UNCHANGNETWORK NONE LOW HIGH
CVE-2020- 4.3 5.3 NONE LOW UNCHANGNETWORK LOW NONE NONE
CVE-2021- 5.0 5.3 LOW LOW UNCHANGNETWORK NONE NONE NONE
CVE-2020- 5.0 5.3 NONE LOW UNCHANGNETWORK NONE LOW NONE
CVE-2019- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2018- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2019- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
WS-2018-06.1 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2021- 7.8 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
WS-2018-06.1 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2017- 6.5 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH LOW
CVE-2021- 5.8 4.8 LOW HIGH UNCHANGNETWORK NONE LOW NONE
CVE-2017- 4.3 5.5 NONE LOW UNCHANGLOCAL HIGH NONE NONE
CVE-2019- 4.3 6.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2020- 2.1 5.5 HIGH LOW UNCHANGLOCAL NONE NONE LOW
CVE-2019- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 6.8 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 5.0 7.5 NONE LOW UNCHANGNETWORK NONE HIGH NONE
CVE-2019- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 5.0 7.5 HIGH LOW UNCHANGNETWORK NONE NONE NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 4.3 5.9 HIGH HIGH UNCHANGNETWORK NONE NONE NONE
CVE-2020- 6.8 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 8.1 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 4.3 5.9 HIGH HIGH UNCHANGNETWORK NONE NONE NONE
CVE-2020- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 6.8 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2021- 8.3 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2022- 7.5 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2022- 7.5 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2020- 6.8 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2020- 6.8 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2022- 7.5 7.5 NONE LOW UNCHANGNETWORK NONE HIGH NONE
WS-2021-07.7 7.7 LOW HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2022- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2022- 4.0 6.5 NONE LOW UNCHANGNETWORK HIGH NONE LOW
CVE-2022- 4.3 6.5 HIGH LOW UNCHANGNETWORK NONE NONE NONE
CVE-2022- 4.3 5.9 HIGH HIGH UNCHANGNETWORK NONE NONE NONE
CVE-2021- 8.5 6.6 HIGH HIGH UNCHANGNETWORK HIGH HIGH HIGH
CVE-2017- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 6.5 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH LOW
CVE-2022- 4.3 5.5 NONE LOW UNCHANGLOCAL HIGH NONE NONE
CVE-2022- 4.3 5.5 NONE LOW UNCHANGLOCAL HIGH NONE NONE
CVE-2019- 7.8 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2019- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2016- 5.0 5.3 LOW LOW UNCHANGNETWORK NONE NONE NONE
CVE-2016- 5.8 7.4 HIGH HIGH UNCHANGNETWORK NONE HIGH NONE
CVE-2016- 4.3 3.7 LOW HIGH UNCHANGNETWORK NONE NONE NONE
CVE-2018- 3.6 4.4 LOW LOW UNCHANGLOCAL NONE LOW LOW
CVE-2016- 4.3 3.7 LOW HIGH UNCHANGNETWORK NONE NONE NONE
CVE-2013- 4.0 5.6 LOW HIGH UNCHANGNETWORK LOW LOW NONE
CVE-2016- 5.0 5.3 NONE LOW UNCHANGNETWORK NONE LOW NONE
CVE-2016- 5.8 7.4 HIGH HIGH UNCHANGNETWORK NONE HIGH NONE
CVE-2016- 4.3 5.9 HIGH HIGH UNCHANGNETWORK NONE NONE NONE
CVE-2015- 5.0 3.7 LOW HIGH UNCHANGNETWORK NONE NONE NONE
CVE-2019- 6.8 7.8 HIGH LOW UNCHANGLOCAL HIGH HIGH NONE
CVE-2022- 2.6 3.3 NONE LOW UNCHANGLOCAL LOW NONE NONE
CVE-2019- 6.8 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2022- 4.3 5.5 NONE LOW UNCHANGLOCAL HIGH NONE NONE
CVE-2022- 2.6 5.5 NONE LOW UNCHANGLOCAL HIGH NONE NONE
CVE-2017- 4.3 5.5 NONE LOW UNCHANGLOCAL HIGH NONE NONE
CVE-2019- 2.1 5.5 HIGH LOW UNCHANGLOCAL NONE NONE LOW
CVE-2016- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2015- 7.5 5.6 LOW HIGH UNCHANGNETWORK LOW LOW NONE
CVE-2014- 7.5 7.3 LOW LOW UNCHANGNETWORK LOW LOW NONE
CVE-2022- 7.5 7.5 NONE LOW UNCHANGNETWORK NONE HIGH NONE
CVE-2021- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2019- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2021- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2021- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2021- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
WS-2021-06.1 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2019- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
WS-2021-06.1 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
WS-2021-07.5 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
WS-2020-06.1 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
WS-2021-06.1 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
WS-2021-06.1 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
WS-2020-07.6 7.6 HIGH LOW CHANGED NETWORK NONE LOW HIGH
CVE-2020- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2020- 4.3 5.9 HIGH HIGH UNCHANGNETWORK NONE NONE NONE
WS-2014-07.5 7.5 HIGH LOW UNCHANGNETWORK NONE NONE NONE
WS-2019-06.5 6.5 LOW LOW UNCHANGNETWORK NONE LOW NONE
CVE-2021- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2021- 6.8 7.1 LOW LOW CHANGED NETWORK LOW LOW NONE
CVE-2022- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2020- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2021- 7.8 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2022- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2022- 3.5 5.3 NONE HIGH UNCHANGNETWORK HIGH NONE LOW
CVE-2017- 5.0 7.5 HIGH LOW UNCHANGNETWORK NONE NONE NONE
CVE-2021- 8.5 6.6 HIGH HIGH UNCHANGNETWORK HIGH HIGH HIGH
CVE-2021- 8.5 6.6 HIGH HIGH UNCHANGNETWORK HIGH HIGH HIGH
WS-2019-08.1 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2021- 8.5 6.6 HIGH HIGH UNCHANGNETWORK HIGH HIGH HIGH
CVE-2021- 8.5 6.6 HIGH HIGH UNCHANGNETWORK HIGH HIGH HIGH
CVE-2019- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2018- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2018- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2018- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2018- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2016- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2022- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2022- 5.0 7.5 NONE LOW UNCHANGNETWORK NONE HIGH NONE
CVE-2021- 2.1 5.5 HIGH LOW UNCHANGLOCAL NONE NONE LOW
CVE-2021- 5.0 7.5 HIGH LOW UNCHANGNETWORK NONE NONE NONE
CVE-2020- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2020- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2022- 7.1 6.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2013- 7.1 5.9 NONE HIGH UNCHANGNETWORK HIGH NONE NONE
CVE-2012- 7.8 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2009- 5.0 5.3 NONE LOW UNCHANGNETWORK LOW NONE NONE
CVE-2020- 5.0 5.3 NONE LOW UNCHANGNETWORK NONE LOW NONE
CVE-2022- 7.5 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2022- 7.5 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2020- 5.0 7.5 NONE LOW UNCHANGNETWORK NONE HIGH NONE
CVE-2020- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2020- 6.5 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH LOW
CVE-2021- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2022- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2022- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2022- 5.5 5.5 HIGH LOW UNCHANGLOCAL NONE NONE LOW
WS-2022-09.8 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 7.7 HIGH HIGH UNCHANGNETWORK HIGH LOW NONE
CVE-2022- 8.0 8.0 HIGH LOW UNCHANGNETWORK HIGH HIGH LOW
CVE-2015- 5.0 5.3 LOW LOW UNCHANGNETWORK NONE NONE NONE
CVE-2011- 5.0 5.3 NONE LOW UNCHANGNETWORK LOW NONE NONE
CVE-2013- 4.3 3.7 NONE HIGH UNCHANGNETWORK NONE LOW NONE
CVE-2014- 7.5 5.3 LOW LOW UNCHANGNETWORK NONE NONE NONE
CVE-2012- 5.0 5.3 NONE LOW UNCHANGNETWORK LOW NONE NONE
CVE-2020- 3.3 6.3 HIGH HIGH UNCHANGLOCAL NONE HIGH LOW
CVE-2021- 4.3 5.5 NONE LOW UNCHANGLOCAL HIGH NONE NONE
CVE-2021- 4.3 5.5 NONE LOW UNCHANGLOCAL HIGH NONE NONE
CVE-2020- 5.0 7.5 NONE LOW UNCHANGNETWORK NONE HIGH NONE
CVE-2021- 4.0 4.3 NONE LOW UNCHANGNETWORK NONE LOW LOW
CVE-2022- 3.5 5.3 NONE HIGH UNCHANGNETWORK HIGH NONE LOW
CVE-2014- 6.8 4.8 LOW HIGH UNCHANGNETWORK NONE LOW NONE
CVE-2019- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2018- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2018- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2018- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2018- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2016- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2021- 4.0 4.3 NONE LOW UNCHANGNETWORK NONE LOW LOW
CVE-2016- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 3.6 6.5 LOW HIGH CHANGED NETWORK NONE HIGH LOW
CVE-2020- 7.6 7.5 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2021- 4.0 4.3 NONE LOW UNCHANGNETWORK NONE LOW LOW
CVE-2019- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 5.0 7.5 HIGH LOW UNCHANGNETWORK NONE NONE NONE
CVE-2019- 6.8 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2017- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2017- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2018- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 5.0 7.5 NONE LOW UNCHANGNETWORK NONE HIGH NONE
CVE-2018- 7.5 10.0 HIGH LOW CHANGED NETWORK HIGH HIGH NONE
CVE-2018- 5.1 7.5 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2018- 5.1 7.5 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 5.0 7.5 HIGH LOW UNCHANGNETWORK NONE NONE NONE
CVE-2019- 4.3 5.9 HIGH HIGH UNCHANGNETWORK NONE NONE NONE
CVE-2020- 6.8 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2018- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 8.1 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2018- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 4.3 5.9 HIGH HIGH UNCHANGNETWORK NONE NONE NONE
CVE-2020- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 6.8 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2018- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2018- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2018- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2021- 8.3 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2022- 7.5 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2019- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2022- 7.5 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2020- 6.8 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2017- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2018- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2018- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2018- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2017- 5.0 7.5 HIGH LOW UNCHANGNETWORK NONE NONE NONE
WS-2022-07.5 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2020- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2021- 4.3 5.5 NONE LOW UNCHANGLOCAL HIGH NONE NONE
CVE-2021- 4.3 5.5 NONE LOW UNCHANGLOCAL HIGH NONE NONE
CVE-2021- 4.3 5.5 NONE LOW UNCHANGLOCAL HIGH NONE NONE
CVE-2021- 4.3 5.5 NONE LOW UNCHANGLOCAL HIGH NONE NONE
CVE-2016- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
WS-2018-05.3 5.3 NONE LOW UNCHANGNETWORK LOW NONE NONE
WS-2018-05.3 5.3 NONE LOW UNCHANGNETWORK LOW NONE NONE
CVE-2021- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
WS-2020-08.2 8.2 NONE LOW UNCHANGNETWORK HIGH LOW NONE
CVE-2021- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2016- 6.5 4.2 LOW HIGH UNCHANGNETWORK NONE LOW LOW
CVE-2017- 6.5 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH LOW
CVE-2021- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2022- 6.1 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2021- 3.5 5.3 NONE HIGH UNCHANGNETWORK HIGH NONE LOW
CVE-2021- 5.0 5.3 NONE LOW UNCHANGNETWORK LOW NONE NONE
CVE-2022- 7.5 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2022- 7.5 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2021- 8.3 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 5.0 7.5 NONE LOW UNCHANGNETWORK NONE HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2022- 3.5 5.3 NONE HIGH UNCHANGNETWORK HIGH NONE LOW
CVE-2022- 4.0 2.7 NONE LOW UNCHANGNETWORK NONE LOW HIGH
CVE-2019- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2020- 5.8 4.8 NONE HIGH UNCHANGNETWORK LOW LOW NONE
CVE-2022- 4.0 2.7 NONE LOW UNCHANGNETWORK NONE LOW HIGH
CVE-2019- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2021- 3.6 3.5 LOW LOW UNCHANGPHYSICAL NONE LOW NONE
CVE-2021- 5.0 5.3 LOW LOW UNCHANGNETWORK NONE NONE NONE
CVE-2019- 5.0 5.3 LOW LOW UNCHANGNETWORK NONE NONE NONE
WS-2020-07.4 7.4 HIGH HIGH UNCHANGNETWORK NONE HIGH NONE
CVE-2021- 1.9 5.5 HIGH LOW UNCHANGLOCAL NONE NONE LOW
CVE-2021- 5.0 5.3 NONE LOW UNCHANGNETWORK LOW NONE NONE
CVE-2020- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2020- 9.0 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH LOW
CVE-2021- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
WS-2021-06.1 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2019- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2020- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
WS-2021-06.1 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
WS-2021-07.5 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
WS-2020-06.1 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
WS-2021-06.1 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
WS-2021-06.1 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
WS-2020-07.6 7.6 HIGH LOW CHANGED NETWORK NONE LOW HIGH
CVE-2020- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2019- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2020- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
WS-2021-06.1 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
WS-2021-07.5 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
WS-2021-06.1 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
WS-2020-07.6 7.6 HIGH LOW CHANGED NETWORK NONE LOW HIGH
CVE-2020- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2022- 1.9 5.5 HIGH LOW UNCHANGLOCAL NONE NONE LOW
CVE-2012- 5.8 4.8 LOW HIGH UNCHANGNETWORK NONE LOW NONE
CVE-2020- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2020- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2019- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2021- 2.6 5.9 NONE HIGH UNCHANGNETWORK NONE HIGH NONE
CVE-2021- 4.3 5.9 NONE HIGH UNCHANGNETWORK NONE HIGH NONE
CVE-2020- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2020- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2019- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2019- 6.4 9.1 HIGH LOW UNCHANGNETWORK NONE HIGH NONE
CVE-2021- 2.6 5.9 NONE HIGH UNCHANGNETWORK NONE HIGH NONE
CVE-2019- 6.4 9.1 HIGH LOW UNCHANGNETWORK NONE HIGH NONE
CVE-2020- 5.0 7.5 NONE LOW UNCHANGNETWORK NONE HIGH NONE
CVE-2021- 1.9 5.5 HIGH LOW UNCHANGLOCAL NONE NONE LOW
CVE-2021- 4.3 6.5 NONE LOW UNCHANGNETWORK NONE HIGH NONE
CVE-2021- 3.5 5.4 LOW LOW CHANGED NETWORK NONE LOW LOW
CVE-2020- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2021- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2021- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2021- 4.3 5.5 NONE LOW UNCHANGLOCAL HIGH NONE NONE
CVE-2022- 7.5 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2022- 7.5 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
WS-2022-07.5 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2020- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2013- 2.6 4.0 LOW HIGH UNCHANGLOCAL NONE LOW NONE
CVE-2013- 5.8 4.8 LOW HIGH UNCHANGNETWORK NONE LOW NONE
CVE-2022- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2022- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2019- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2018- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2018- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2018- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2018- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2016- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
WS-2017-08.6 8.6 HIGH LOW CHANGED NETWORK NONE NONE NONE
WS-2017-04.7 4.7 LOW LOW CHANGED NETWORK NONE NONE NONE
CVE-2022- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2022- 4.6 7.8 HIGH LOW UNCHANGLOCAL HIGH HIGH LOW
CVE-2021- 4.3 7.5 HIGH LOW UNCHANGNETWORK NONE NONE NONE
CVE-2020- 6.5 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH LOW
CVE-2021- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2021- 6.8 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2021- 6.4 9.1 HIGH LOW UNCHANGNETWORK NONE HIGH NONE
CVE-2014- 5.8 4.8 LOW HIGH UNCHANGNETWORK NONE LOW NONE
CVE-2012- 4.3 3.7 NONE HIGH UNCHANGNETWORK NONE LOW NONE
CVE-2020- 5.0 5.3 NONE LOW UNCHANGNETWORK NONE LOW NONE
WS-2017-35.3 5.3 LOW LOW UNCHANGNETWORK NONE NONE NONE
CVE-2017- 6.4 9.1 HIGH LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2021- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2019- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2016- 4.3 3.7 NONE HIGH UNCHANGNETWORK NONE LOW NONE
CVE-2018- 6.8 8.1 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 4.3 6.1 LOW LOW CHANGED NETWORK NONE LOW NONE
CVE-2021- 5.0 5.3 LOW LOW UNCHANGNETWORK NONE NONE NONE
CVE-2020- 2.1 3.3 LOW LOW UNCHANGLOCAL NONE NONE LOW
CVE-2021- 6.5 7.2 HIGH LOW UNCHANGNETWORK HIGH HIGH HIGH
CVE-2021- 6.8 7.8 HIGH LOW UNCHANGLOCAL HIGH HIGH NONE
WS-2021-07.7 7.7 LOW HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2022- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2022- 8.8 8.8 HIGH LOW UNCHANGNETWORK HIGH HIGH LOW
WS-2017-37.5 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
WS-2022-07.5 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2020- 4.3 5.9 HIGH HIGH UNCHANGNETWORK NONE NONE NONE
CVE-2021- 6.4 9.1 NONE LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 5.0 5.3 NONE LOW UNCHANGNETWORK NONE LOW NONE
CVE-2020- 4.3 5.9 HIGH HIGH UNCHANGNETWORK NONE NONE NONE
CVE-2020- 4.3 5.5 NONE LOW UNCHANGLOCAL HIGH NONE NONE
CVE-2020- 4.3 5.5 NONE LOW UNCHANGLOCAL HIGH NONE NONE
CVE-2020- 4.3 5.5 NONE LOW UNCHANGLOCAL HIGH NONE NONE
CVE-2022- 4.3 5.5 NONE LOW UNCHANGLOCAL HIGH NONE NONE
CVE-2019- 4.3 6.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2021- 4.3 5.5 NONE LOW UNCHANGLOCAL HIGH NONE NONE
CVE-2021- 6.4 9.1 HIGH LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2021- 6.4 9.1 HIGH LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2020- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2022- 9.8 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2022- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2022- 9.8 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2021- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2017- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2022- 6.5 6.5 NONE LOW UNCHANGNETWORK HIGH NONE LOW
CVE-2022- 7.5 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2022- 6.5 6.5 NONE LOW UNCHANGNETWORK HIGH NONE LOW
CVE-2022- 6.5 6.5 NONE LOW UNCHANGNETWORK HIGH NONE LOW
CVE-2022- 5.5 5.5 NONE LOW UNCHANGLOCAL HIGH NONE NONE
CVE-2021- 3.7 3.7 LOW HIGH UNCHANGNETWORK NONE NONE NONE
CVE-2021- 4.4 7.0 HIGH HIGH UNCHANGLOCAL HIGH HIGH LOW
CVE-2019- 5.1 7.5 HIGH HIGH UNCHANGNETWORK HIGH HIGH NONE
CVE-2020- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2019- 4.4 7.0 HIGH HIGH UNCHANGLOCAL HIGH HIGH LOW
CVE-2020- 5.8 4.8 LOW HIGH UNCHANGNETWORK NONE LOW NONE
CVE-2020- 4.0 4.3 LOW LOW UNCHANGNETWORK NONE NONE LOW
CVE-2020- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2021- 5.0 5.3 NONE LOW UNCHANGNETWORK NONE LOW NONE
CVE-2021- 5.0 7.5 HIGH LOW UNCHANGNETWORK NONE NONE NONE
CVE-2021- 4.3 5.9 HIGH HIGH UNCHANGNETWORK NONE NONE NONE
CVE-2021- 4.3 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2020- 4.4 7.0 HIGH HIGH UNCHANGLOCAL HIGH HIGH LOW
CVE-2022- 9.8 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2022- 3.5 5.3 NONE HIGH UNCHANGNETWORK HIGH NONE LOW
CVE-2015- 4.3 5.3 HIGH HIGH UNCHANGNETWORK NONE NONE LOW
CVE-2014- 4.3 5.9 NONE HIGH UNCHANGNETWORK NONE HIGH NONE
WS-2019-06.5 6.5 LOW LOW UNCHANGNETWORK NONE LOW NONE
WS-2019-06.5 6.5 LOW LOW UNCHANGNETWORK NONE LOW NONE
CVE-2016- 7.5 9.8 HIGH LOW UNCHANGNETWORK HIGH HIGH NONE
CVE-2021- 5.0 7.5 NONE LOW UNCHANGNETWORK HIGH NONE NONE
CVE-2020- 6.8 5.6 LOW HIGH UNCHANGNETWORK LOW LOW NONE
CVE-2022- 5.0 5.3 NONE LOW UNCHANGNETWORK NONE LOW NONE
CVE-2022- 4.0 6.5 NONE LOW UNCHANGNETWORK HIGH NONE LOW
Vector User InteraDescriptio Published Modified Message:
Top Fix Upgrade
Product to Project
version Locations
CVSS:3.1/AREQUIRED angular.js 2020-06-0 2020-10-0 Details:
In AngularJS before 1.7.9 the function
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_/web/js/lib/angular/angular.min.js
`merge()`
Upgrade
could
to version
be tricked into adding or modifying properties
CVSS:3.1/ANONE Mend Note: 2019-11-1
After conducting
2022-01-0further
Details:
research,
https://github.com/angular/angular.js/commit/726f49dcf6c
GH_spigit_GH_spigit_/web/js/lib/angular/angular.min.js
Mend has determined that versions 1.4.0-beta.6 bef
Message: Upgrade to version
CVSS:3.1/ANONE A Spring MV 2022-04-0 2022-07-2 Details: https://spring.io/blog/2022/03/31/spring-framework-rce-ea
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE In spring-f 2021-06-2 2021-06-2 Details:
Message: https://github.com/spring-projects/spring-framework/releas
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE Spring Secu2018-03-1 2022-06-2 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/AREQUIRED In spring-f 2021-06-2 2021-06-2 Details: https://github.com/spring-projects/spring-framework/releas
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE In Spring F 2021-10-2 2022-04-2 Details:
Message: https://tanzu.vmware.com/security/cve-2021-22096
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE Directory t2015-02-1 2019-07-1 Details: https://nvd.nist.gov/vuln/detail/CVE-2014-3578
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE Spring Fram2011-10-0 2018-10-0 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE In Spring F 2021-09-2 2021-09-2 Message:
Details: https://github.com/spring-projects/spring-framework/releas
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE Spring Fram2011-10-0 2018-10-0 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE In Eclipse 2020-10-2 2022-03-0 Details:
Message: https://bugs.eclipse.org/bugs/show_bug.cgi?id=567921
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.0/ANONE jasypt befo2017-05-2 2018-02-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE In Eclipse 2022-07-0 2022-10-2 Details: https://github.com/eclipse/jetty.project/security/advisories
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE Some HTTP/2 2019-08-1 2022-08-0 Message:
Details: https://mailman.nginx.org/pipermail/nginx-announce/2019/
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE Some HTTP/2 2019-08-1 2022-08-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE Some HTTP/ 2019-08-1 2022-08-1 Details:
Message: https://netty.io/news/2019/08/13/4-1-39-Final.html
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE Some HTTP/2 2019-08-1 2022-08-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE Some HTTP/2 2019-08-1 2022-08-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE Some HTTP/2 2019-08-1 2022-08-1 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE Some HTTP/ 2019-08-1 2022-08-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE Some HTTP/2 2019-08-1 2022-08-1 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE Pebble Temp2019-12-1 2021-07-2
** DISPUTED ** Pebble Templates Details:
Message: https://nvd.nist.gov/vuln/detail/CVE-2019-19899
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
3.1.5 allows
Upgrade
attackers
to version
to bypass a protection mechanism and imp
CVSS:3.1/ANONE Mend Note: 2022-09-1
After conducting
2022-10-1further
Details:
research,
https://nvd.nist.gov/vuln/detail/CVE-2022-37767
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
Mend has
Message: Upgrade to version determined that versions 2.5.0 through 3.
CVSS:3.1/ANONE n Spring Fr2022-04-0 2022-06-2 Message:
Details: https://tanzu.vmware.com/security/cve-2022-22950
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE In Eclipse 2022-07-0 2022-10-2 Details: https://github.com/eclipse/jetty.project/security/advisories
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE In Eclipse 2021-02-2 2021-09-1 Details:
Message: https://github.com/eclipse/jetty.project/security/advisories
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE For Eclipse2021-06-0 2022-10-2 Details: https://github.com/eclipse/jetty.project/security/advisories
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE A flaw was 2020-05-0 2022-05-1 Details:
Message: Upgrade to GH_spigit-
https://in.relation.to/2020/05/07/hibernate-validator-615-6
GH_spigit- version /home/wss-scanner/.gradle/caches
CVSS:3.1/AREQUIRED A vulnerabi2019-11-0 2022-09-1 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit-
Upgrade to GH_spigit- /home/wss-scanner/.gradle/caches
version /home/wss-scanner/.gradle/caches
CVSS:3.0/ANONE Asciidoctor2018-10-1 2019-10-0 Details:
Message: Upgrade to version /caches/modules-2/files-2.1/org.asc
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-183
GH_spigit_GH_spigit_
CVSS:3.1/AREQUIRED In Eclipse 2019-04-2 2022-04-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/AREQUIRED XSS vulnera2018-01-0 2018-01-0 Details: https://github.com/angular/angular.js/blob/master/CHANG
GH_spigit_GH_spigit_/web/js/lib/angular/angular-sanitize
Message: Upgrade to version
CVSS:3.1/ANONE In Eclipse 2021-04-0 2022-07-2 Details: https://github.com/eclipse/jetty.project/security/advisories
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/AREQUIRED XSS vulnera2018-01-0 2018-01-0 Message:
Details: https://github.com/angular/angular.js/blob/master/CHANG
GH_spigit_GH_spigit_/web/js/lib/angular/angular-sanitize
Upgrade to version
CVSS:3.0/ANONE It was foun2018-02-1 2019-06-0 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE In Apache C2021-04-1 2022-10-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-
GH_spigit_GH_spigit_
Upgrade to version /caches/modules-2/files-2.1/commo
/caches/modules-2/files-2.1/org.ap
CVSS:3.0/AREQUIRED Apache CXF2017-11-1 2021-06-1 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-
GH_spigit_GH_spigit_ /caches/modules-2/files-2.1/org.ap
CVSS:3.1/AREQUIRED Apache CXF2019-11-0 2021-06-1 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_
CVSS:3.1/ANONE Apache Groo 2020-12-0 2022-07-2 Message:
Details: https://issues.apache.org/jira/browse/GROOVY-9824
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE A Polymorph 2019-09-1 2021-02-2 Details:
Message: Upgrade to GH_spigit-
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit- version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE A Polymorph 2019-10-1 2022-10-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE A flaw was 2020-12-0 2022-07-2 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://github.com/FasterXML/jackson-databind/issues/258
GH_spigit- GH_spigit-
CVSS:3.1/ANONE A Polymorph 2019-09-1 2021-02-2 Details:
Message: https://github.com/FasterXML/jackson-databind/blob/mast
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE FasterXML 2020-04-0
j 2021-02-2 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE A Polymorp2019-10-0 2021-02-2 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://github.com/FasterXML/jackson-databind/issues/246
GH_spigit- GH_spigit-
CVSS:3.0/ANONE A Polymorph 2019-07-3 2020-08-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE FasterXML 2020-12-2
j 2022-09-0 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit- GH_spigit-
CVSS:3.0/ANONE A Polymorph 2019-06-1 2020-10-2 Details: https://github.com/FasterXML/jackson-databind/issues/234
GH_spigit- GH_spigit- /home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/AREQUIRED FasterXML 2020-03-2
j 2021-12-0 Message:
Details: https://nvd.nist.gov/vuln/detail/CVE-2020-10968
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/AREQUIRED FasterXML 2020-03-2
j 2021-12-0 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit- GH_spigit-
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-07-2 Details:
Message: https://github.com/FasterXML/jackson-databind/issues/299
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE FasterXML 2021-01-0
j 2022-09-0 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://github.com/FasterXML/jackson-databind/issues/299
GH_spigit- GH_spigit-
CVSS:3.1/ANONE FasterXML 2020-04-0 2021-02-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE jackson-dat2020-07-2 2020-07-2 Message:
Details: https://github.com/advisories/GHSA-rpr3-cw39-3pxh
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://github.com/FasterXML/jackson-databind/issues/300
GH_spigit- GH_spigit-
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Details:
Message: https://github.com/FasterXML/jackson-databind/issues/300
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE FasterXML 2021-01-0
j 2022-09-0 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://github.com/FasterXML/jackson-databind/issues/300
GH_spigit- GH_spigit-
CVSS:3.1/ANONE FasterXML 2020-12-1 2022-07-2 Details:
Message: https://github.com/FasterXML/jackson-databind/issues/298
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Message:
Details: https://github.com/FasterXML/jackson-databind/issues/300
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://github.com/FasterXML/jackson-databind/issues/299
GH_spigit- GH_spigit-
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Details:
Message: https://github.com/FasterXML/jackson-databind/issues/299
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE FasterXML 2020-12-1 2022-07-2 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://github.com/FasterXML/jackson-databind/issues/298
GH_spigit- GH_spigit-
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Details:
Message: https://github.com/FasterXML/jackson-databind/issues/299
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Message:
Details: https://github.com/FasterXML/jackson-databind/issues/299
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.0/ANONE FasterXML 2019-06-2
j 2020-10-2 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit- GH_spigit-
CVSS:3.1/ANONE FasterXML 2020-02-1
j 2021-02-2 Details:
Message: https://github.com/FasterXML/jackson-databind/issues/262
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE A Polymorph2019-10-0 2022-10-2 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit- GH_spigit-
CVSS:3.1/ANONE A Polymorph2019-10-0 2022-10-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE A flaw was 2021-01-1 2022-06-0 Message:
Details: https://github.com/FasterXML/jackson-databind/issues/285
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/AREQUIRED FasterXML 2020-03-3
j 2021-12-1 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit- GH_spigit-
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Details:
Message: https://github.com/FasterXML/jackson-databind/issues/300
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/AREQUIRED FasterXML 2020-03-3 2021-12-1 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit- GH_spigit-
CVSS:3.1/AREQUIRED FasterXML 2020-03-3 2021-12-1 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE FasterXML 2020-08-2 2022-05-1 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE FasterXML 2020-06-1
j 2021-11-1 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit- GH_spigit-
CVSS:3.1/ANONE FasterXML 2020-06-1 2021-11-1 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE FasterXML 2020-06-1
j 2021-11-1 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit- GH_spigit-
CVSS:3.1/ANONE In FasterXM2022-10-0 2022-11-2 Details:
Message: https://github.com/FasterXML/jackson-databind/issues/358
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE FasterXML 2020-09-1
j 2022-05-1 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE A flaw was 2020-03-0 2021-03-1 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit- GH_spigit-
CVSS:3.1/ANONE A flaw was 2020-03-0 2020-09-0 Details:
Message: https://github.com/FasterXML/jackson-databind/issues/246
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE In FasterXM2022-10-0 2022-11-2 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://github.com/FasterXML/jackson-databind/issues/359
GH_spigit- GH_spigit-
CVSS:3.1/ANONE FasterXML 2020-03-0
j 2021-12-0 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE SubTypeVal2019-07-2 2022-04-2 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE FasterXML 2020-03-0
j 2021-12-0 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit- GH_spigit-
CVSS:3.1/ANONE FasterXML 2020-03-0
j 2021-12-0 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE FasterXML 2020-01-0
j 2022-10-2 Details:
jackson-databind before 2.13.0 allows
Message: https://github.com/FasterXML/jackson-databind/issues/252
GH_spigit-
a Java
Upgrade GH_spigit-
StackOverflow
to version /home/wss-scanner/.gradle/caches
exception and denial of service via a larg
CVSS:3.1/ANONE Mend Note:2022-03-1
After conducting
2022-11-2further
Details:
research,
https://github.com/FasterXML/jackson-databind/issues/281
GH_spigit-
Mend GH_spigit-
has
Message: Upgrade to version determined
/home/wss-scanner/.gradle/caches
that all versions of com.faster
CVSS:3.1/AREQUIRED FasterXML 2020-03-1
j 2021-12-0 Message:
Details: https://nvd.nist.gov/vuln/detail/CVE-2020-10672
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/AREQUIRED FasterXML 2020-03-1
j 2021-12-0 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://github.com/FasterXML/jackson-databind/issues/266
GH_spigit- GH_spigit-
CVSS:3.1/ANONE FasterXML 2020-06-1
j 2021-11-1 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE A relative 2022-11-0 2022-11-0 Details: https://lists.apache.org/thread/57vk0d79j94d0lk0vol8xn935
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE Denial of S2021-10-1 2021-11-1 Details:
Message: https://github.com/google/gson/releases/tag/gson-parent-2
GH_spigit-
Upgrade to GH_spigit-
version s/modules-2/files-2.1/com.google.c
/home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE The package2022-05-0 2022-11-2 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-
GH_spigit-
Upgrade to GH_spigit-
version s/modules-2/files-2.1/com.google.c
CVSS:3.1/ANONE n Spring Fr2022-04-0 2022-06-2 Details:
Message: https://tanzu.vmware.com/security/cve-2022-22950
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/AREQUIRED follow-redi2022-01-1 2022-10-2 Details:
Message: https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a641
GH_sp-odaGH_sp-oda/tmp/ws-scm/sp-odata/nginx-gatew
Upgrade to version
CVSS:3.1/ANONE Exposure of2022-02-0 2022-02-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-
GH_sp-odaGH_sp-oda/tmp/ws-scm/sp-odata/nginx-gatew
Message: Upgrade to version
CVSS:3.1/ANONE In logback 2021-12-1 2022-11-0 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2021-4
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE QOS.ch Logb 2017-03-1 2022-04-1 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE A vulnerabi2019-11-2 2022-02-2 Details: https://github.com/advisories/GHSA-h47x-2j37-fw5m
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/AREQUIRED When readin 2022-02-2 2022-03-0 Details:
Message: https://github.com/drewnoakes/metadata-extractor/issues/
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/AREQUIRED metadata-ex 2022-02-2 2022-03-0 Details: https://github.com/drewnoakes/metadata-extractor/issues/
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.0/ANONE MetadataEx 2019-07-2 2020-03-2 Details: https://github.com/drewnoakes/metadata-extractor/pull/42
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE The ASN.1 2p019-10-0 2022-10-0 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE In the Boun2018-06-0 2020-10-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.0/ANONE In the Boun2018-06-0 2020-10-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE In the Boun2018-06-0 2020-10-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE The default2018-04-1 2022-04-2 Details: https://vulners.com/cert/VU:306792
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE In the Boun2018-06-0 2020-10-2 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE The TLS imp 2013-02-0 2018-10-3 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE In the Boun2018-06-0 2020-10-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.0/ANONE In the Boun2018-06-0 2020-10-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.0/ANONE In the Boun2018-06-0 2020-10-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.0/ANONE The Bouncy2015-11-0 2019-01-1 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.0/AREQUIRED A carefully2019-08-0 2020-08-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/AREQUIRED The initial 2022-06-2 2022-10-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.0/AREQUIRED A carefully2019-08-0 2020-08-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/AREQUIRED In Apache T2022-05-1 2022-10-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/AREQUIRED We failed t2022-05-3 2022-10-2 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.0/AREQUIRED Apache CXF2017-11-1 2021-06-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/org.ap
Message: Upgrade to version
CVSS:3.1/ANONE In Apache P2019-10-2 2022-04-0 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/org.ap
Upgrade to version
CVSS:3.0/ANONE When an app 2018-01-1 2020-07-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE The MethodC 2015-08-1 2020-06-2 Details: http://groovy-lang.org/security.html
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE The Transfo2014-04-1 2021-10-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE The Apache2022-07-1 2022-11-07Message: UpgradeGH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
to version
CVSS:3.1/ANONE When readin 2021-07-1 2022-07-2 Details: https://commons.apache.org/proper/commons-compress/s
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE The file na 2019-08-3 2022-05-1 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE When readin 2021-07-1 2022-07-2 Details: https://commons.apache.org/proper/commons-compress/s
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE When readin 2021-07-1 2022-07-2 Message:
Details: https://commons.apache.org/proper/commons-compress/s
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE When readin 2021-07-1 2022-07-2 Details: https://commons.apache.org/proper/commons-compress/s
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/AREQUIRED A cross-sit 2021-10-2 2021-10-2 Details:
Message: https://github.com/advisories/GHSA-5h9g-x5rv-25wg
GH_spigit_GH_spigit_/src/spigit/node_modules/tinymce/
Upgrade to version
CVSS:3.1/AREQUIRED tinymce 4.72019-07-1 2020-08-1 Details: https://github.com/advisories/GHSA-c78w-2gw7-gjv3
GH_spigit_GH_spigit_/src/spigit/node_modules/tinymce/
Message: Upgrade to version
CVSS:3.1/AREQUIRED Cross-site 2021-05-2 2021-05-3 Details:
This vulnerability has been patched
Message: https://github.com/advisories/GHSA-5vm8-hhgr-jcjp
GH_spigit_GH_spigit_/src/spigit/node_modules/tinymce/
in TinyMCE
Upgrade
5.6.0toby
version
upgrading to a version of the dependency w
CVSS:3.1/ANONE 2021-01-0 2021-01-0 Message:
Details: https://github.com/tinymce/tinymce/security/advisories/GH
GH_spigit_GH_spigit_/src/spigit/node_modules/tinymce/
Upgrade to version
CVSS:3.1/AREQUIRED A
A cross-sit
cross-site2020-08-1 2020-08-1
scripting (XSS) Details:
vulnerability
Message: https://github.com/advisories/GHSA-vrv8-v4w8-f95h
wasGH_spigit_GH_spigit_/src/spigit/node_modules/tinymce/
Upgrade
discovered
to version
in the URL sanitization logic of the core parse
CVSS:3.1/AREQUIRED The issue has
2021-02-1
been fixed
2021-02-2
in TinyMCE
Details:
5.6.0.
https://github.com/advisories/GHSA-w7jx-j77m-wp65
GH_spigit_GH_spigit_/src/spigit/node_modules/tinymce/
Message: Upgrade to version
CVSS:3.1/AREQUIRED A cross-sit 2021-11-0 2021-11-0 Details:
Message: https://github.com/advisories/GHSA-r8hm-w5f7-wj39
GH_spigit_GH_spigit_/src/spigit/node_modules/tinymce/
Upgrade to version
CVSS:3.1/ANONE A cross-sit 2019-12-1 2020-02-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-
GH_spigit_GH_spigit_/src/spigit/node_modules/tinymce/
Message: Upgrade to version
CVSS:3.1/AREQUIRED TinyMCE bef 2020-08-1 2020-08-1 Message:
Details: https://github.com/tinymce/tinymce/tree/5.1.4,https://gith
GH_spigit_GH_spigit_/src/spigit/node_modules/tinymce/
Upgrade to version
CVSS:3.1/ANONE Bouncy Cast 2021-05-2 2021-06-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
Message: Upgrade to version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE The class F2014-02-1 2019-09-2 Details:
Message: https://github.com/apache/commons-fileupload/commit/5b
GH_spigit_GH_spigit_
Upgrade to version /caches/modules-2/files-2.1/commo
CVSS:3.1/ANONE Apache com 2019-05-2 2020-03-0 Details: https://github.com/apache/commons-codec/commit/48b61
GH_spigit_GH_spigit_/home/wss-scanner/.m2/repository
Message: Upgrade to version
CVSS:3.1/AREQUIRED An XSS vuln2021-03-2 2022-08-1 Details:
Message: https://github.com/advisories/GHSA-jq4v-f5q6-mjqq
GH_sp-odaGH_sp-odata
Upgrade to version
CVSS:3.1/AREQUIRED lxml is a l 2021-12-1 2022-08-1 Message:
Details: https://github.com/lxml/lxml/security/advisories/GHSA-55x
GH_sp-odaGH_sp-odata
Upgrade to version
CVSS:3.1/ANONE NULL Pointe 2022-07-0 2022-10-2 Details: https://github.com/lxml/lxml/commit/86368e9cf70a0ad23c
GH_sp-odaGH_sp-odata
Message: Upgrade to version
CVSS:3.1/AREQUIRED A XSS vulne2020-12-0 2022-08-0 Details:
Message: https://bugzilla.redhat.com/show_bug.cgi?id=1901633
GH_sp-odaGH_sp-odata
Upgrade to version
CVSS:3.1/ANONE ansi-regex 2021-09-1 2022-11-0 Details: https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-8008
GH_sp-odaGH_sp-oda/tmp/ws-scm/sp-odata/utils/dynam
Message: Upgrade to version
CVSS:3.1/ANONE A Spring MV 2022-04-0 2022-07-2 Details: https://spring.io/blog/2022/03/31/spring-framework-rce-ea
GH_spigit- GH_spigit- /home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE In spring f 2022-05-1 2022-10-0 Message:
Details: https://tanzu.vmware.com/security/cve-2022-22970
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.0/ANONE Apache CXF' 2017-04-1 2021-06-1 Details: https://nvd.nist.gov/vuln/detail/CVE-2017-5656
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/org.ap
Message: Upgrade to version
CVSS:3.1/ANONE In logback 2021-12-1 2022-11-0 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2021-4
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
Upgrade to version
CVSS:3.1/ANONE In logback 2021-12-1 2022-11-0 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2021-4
GH_spigit-
Message: Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE Inclusion 2019-02-1 2020-09-1 Details:
Message: https://github.com/cbeust/jcommander/issues/465
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE In logback 2021-12-1 2022-11-0 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2021-4
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
Upgrade to version
CVSS:3.1/ANONE In logback 2021-12-1 2022-11-0 Details:
Message: Upgrade to GH_spigit-
https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2021-4
GH_spigit- version /home/wss-scanner/.gradle/caches
CVSS:3.1/AREQUIRED In Bootstra2019-02-2 2022-05-1 Details:
Message: https://github.com/twbs/bootstrap/pull/28236
GH_spigit_GH_spigit_/web/js/bootstrap/js/bootstrap.js
Upgrade to version
CVSS:3.0/AREQUIRED In Bootstra2018-07-1 2021-07-2 Details: https://github.com/twbs/bootstrap/pull/26630
GH_spigit_GH_spigit_/web/js/bootstrap/js/bootstrap.js
Message: Upgrade to version
CVSS:3.0/AREQUIRED In Bootstra2019-01-0 2021-07-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-
GH_spigit_GH_spigit_/web/js/bootstrap/js/bootstrap.js
Message: Upgrade to version
CVSS:3.0/AREQUIRED In Bootstra2019-01-0 2021-07-2 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-
GH_spigit_GH_spigit_/web/js/bootstrap/js/bootstrap.js
Upgrade to version
CVSS:3.0/AREQUIRED In Bootstra2018-07-1 2021-07-2 Details: https://github.com/twbs/bootstrap/pull/26630
GH_spigit_GH_spigit_/web/js/bootstrap/js/bootstrap.js
Message: Upgrade to version
CVSS:3.0/AREQUIRED In Bootstra2019-01-0 2021-07-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-
GH_spigit_GH_spigit_/web/js/bootstrap/js/bootstrap.js
Upgrade to version
CVSS:3.1/ANONE moment is 2022-07-0
a 2022-10-2 Details: https://github.com/moment/moment/security/advisories/G
GH_spigit_GH_spigit_/src/spigit/node_modules/moment
Message: Upgrade to version
CVSS:3.1/ANONE Moment.js2022-04-0
i 2022-07-3 Details: https://github.com/moment/moment/security/advisories/G
GH_spigit_GH_spigit_/src/spigit/node_modules/moment
Message: Upgrade to version /home/wss-scanner/.nuget/package
CVSS:3.1/ANONE ASP.NET Cor 2021-08-1 2021-08-1 Message:
Details: https://github.com/advisories/GHSA-q7cg-43mg-qp69
GH_sp-odaGH_sp-oda
Upgrade to version uget/packages/microsoft.aspnetcor
CVSS:3.1/ANONE All version 2021-09-1 2022-10-0 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version /web/js/jquery/jquery-3.4.1.min.js
CVSS:3.1/AREQUIRED In jQuery v2020-04-2 2022-07-2 Details:
Message: https://github.com/jquery/jquery/security/advisories/GHSA
GH_spigit_GH_spigit_
Upgrade to version /web/html/api/../../js/jquery/jquery
/web/js/jquery/jquery-3.4.1.min.js
CVSS:3.1/AREQUIRED In jQuery v2020-04-2 2022-07-2 Details:
Message: Upgrade to version /web/html/api/../../js/jquery/jquery
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_
CVSS:3.1/AREQUIRED There's a v2022-01-2 2022-10-2 Details:
Message: https://github.com/advisories/GHSA-h65f-jvqw-m9fj
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/com.sp
Upgrade to version
CVSS:3.1/ANONE XMLscanner. 2013-07-2 2022-05-1 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/com.sp
Upgrade to version
CVSS:3.0/ANONE Apache Xerc 2017-10-3 2021-09-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/com.sp
Message: Upgrade to version
CVSS:3.1/ANONE XMLScanner. 2009-08-0 2022-05-1 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/com.sp
Upgrade to version
CVSS:3.1/ANONE Apache Http 2020-12-0 2022-05-1 Details: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-139
GH_spigit-
Message: Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE In FasterXM 2022-10-0 2022-11-2 Details:
Message: https://github.com/FasterXML/jackson-databind/issues/358
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
Upgrade to version
CVSS:3.1/ANONE In FasterXM 2022-10-0 2022-11-2 Message:
Details: https://github.com/FasterXML/jackson-databind/issues/359
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
Upgrade to version
CVSS:3.1/ANONE A flaw was 2020-12-0 2022-07-2 Details:
jackson-databind before 2.13.0 allows
Message: https://github.com/FasterXML/jackson-databind/issues/258
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
a Java
Upgrade
StackOverflow
to version
exception and denial of service via a larg
CVSS:3.1/ANONE Mend Note: 2022-03-1
After conducting
2022-11-2further
Details:
research,
https://github.com/FasterXML/jackson-databind/issues/281
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
Mend has
Message: Upgrade to version determined that all versions of com.faster
CVSS:3.1/ANONE In Apache H 2021-01-2 2022-07-2 Details: https://lists.apache.org/thread.html/rca4516b00b55b34790
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE An XXE issu2021-06-1 2022-07-2 Details:
Message: https://nvd.nist.gov/vuln/detail/CVE-2021-33813
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE pgjdbc is t 2022-02-0 2022-11-0 Message:
Details: https://github.com/advisories/GHSA-v7wg-cpwc-24m4
GH_sp-odaGH_sp-oda2/repository/org/postgresql/postgre
Upgrade to version
CVSS:3.1/ANONE ** DISPUTED 2022-03-1 2022-11-0 Details: https://security-tracker.debian.org/tracker/CVE-2022-26520
GH_sp-odaGH_sp-oda2/repository/org/postgresql/postgre
Message: Upgrade to version
CVSS:3.1/ANONE pgjdbc is a 2022-11-2 2022-11-2 Details:
Message: https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA
GH_sp-odaGH_sp-oda2/repository/org/postgresql/postgre
Upgrade to version
CVSS:3.1/ANONE In org.post2022-02-1 2022-02-1 Details: https://github.com/advisories/GHSA-673j-qm5f-xpv8
GH_sp-odaGH_sp-oda2/repository/org/postgresql/postgre
Message: Upgrade to version
CVSS:3.1/ANONE PostgreSQL2020-06-0 2022-08-0 Details: https://jdbc.postgresql.org/documentation/changelog.html#
GH_sp-odaGH_sp-oda2/repository/org/postgresql/postgre
Message: Upgrade to version
CVSS:3.1/AREQUIRED PostgreSQL2022-08-0 2022-10-0 Message:
Details: https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA
GH_sp-odaGH_sp-oda2/repository/org/postgresql/postgre
Upgrade to version
CVSS:3.1/ANONE The LDAPLog 2015-08-2 2016-12-0 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/org.ap
Message: Upgrade to version
CVSS:3.1/ANONE Apache Acti2012-01-0 2012-01-0 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/org.ap
Upgrade to version
CVSS:3.1/ANONE Cross-site 2013-07-2 2017-08-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/org.ap
Message: Upgrade to version
CVSS:3.1/ANONE XML extern2017-10-2 2019-03-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/org.ap
Message: Upgrade to version
CVSS:3.1/ANONE Algorithmic2012-06-2 2021-08-1 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE Apache Ant2020-05-1 2022-04-0 Details: https://ant.apache.org/security.html
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/AREQUIRED When readin 2021-07-1 2022-07-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/AREQUIRED When readin 2021-07-1 2022-07-2 Details: https://ant.apache.org/security.html
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE As mitigati2020-10-0 2022-05-1 Details: https://ant.apache.org/security.html
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE In Spring F 2021-10-2 2022-04-2 Message:
Details: https://tanzu.vmware.com/security/cve-2021-22096
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE In spring f 2022-05-1 2022-10-0 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://tanzu.vmware.com/security/cve-2022-22970
GH_spigit- GH_spigit-
CVSS:3.1/ANONE Certificate 2014-10-2 2018-01-0 Details:
Message: https://github.com/victims/victims-cve-db/blob/master/dat
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/AREQUIRED In Bootstra2019-02-2 2022-05-1 Details: https://github.com/twbs/bootstrap/pull/28236
GH_spigit_GH_spigit_/src/spigit/node_modules/bootstra
Message: Upgrade to version
CVSS:3.0/AREQUIRED In Bootstra2018-07-1 2021-07-2 Details: https://github.com/twbs/bootstrap/pull/26630
GH_spigit_GH_spigit_/src/spigit/node_modules/bootstra
Message: Upgrade to version
CVSS:3.0/AREQUIRED In Bootstra2019-01-0 2021-07-2 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-
GH_spigit_GH_spigit_/src/spigit/node_modules/bootstra
Upgrade to version
CVSS:3.0/AREQUIRED In Bootstra2018-07-1 2021-07-2 Details: https://github.com/twbs/bootstrap/pull/26630
GH_spigit_GH_spigit_/src/spigit/node_modules/bootstra
Message: Upgrade to version
CVSS:3.0/AREQUIRED In Bootstra2019-01-0 2021-07-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-
GH_spigit_GH_spigit_/src/spigit/node_modules/bootstra
Upgrade to version
CVSS:3.0/AREQUIRED In Bootstra2019-01-0 2021-07-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-
GH_spigit_GH_spigit_/src/spigit/node_modules/bootstra
Message: Upgrade to version
CVSS:3.1/ANONE In Spring F 2021-10-2 2022-04-2 Details:
Message: Upgrade to GH_spigit-
https://tanzu.vmware.com/security/cve-2021-22096
GH_spigit- version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE Pivotal Spr2020-01-0 2022-06-1 Message:
Details: https://github.com/spring-projects/spring-framework/comm
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/AREQUIRED In Spring F 2020-09-1 2022-06-2 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://tanzu.vmware.com/security/cve-2020-5421
GH_spigit- GH_spigit-
CVSS:3.1/AREQUIRED In Spring F 2020-01-1 2022-07-2 Details:
Message: https://pivotal.io/security/cve-2020-5398
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE In Spring F 2021-10-2 2022-04-2 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://tanzu.vmware.com/security/cve-2021-22096
GH_spigit- GH_spigit-
CVSS:3.1/ANONE A Polymorph 2019-09-1 2021-02-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.0/ANONE A Polymorph 2019-05-1 2022-04-2 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/ANONE A Polymorph 2019-10-1 2022-10-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE A deseriali 2018-02-0 2022-10-2 Details:
Message: https://nvd.nist.gov/vuln/detail/CVE-2017-15095
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/ANONE A deseriali 2018-02-0 2022-04-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.0/ANONE FasterXML 2019-01-0
j 2020-08-3 Details: https://nvd.nist.gov/vuln/detail/CVE-2018-14720
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE A flaw was 2020-12-0 2022-07-2 Message:
Details: https://github.com/FasterXML/jackson-databind/issues/258
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.0/ANONE FasterXML 2019-01-0
j 2020-08-3 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.0/AREQUIRED An issue wa2019-03-2 2020-10-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.0/AREQUIRED An issue wa2019-03-2 2020-10-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE A Polymorph 2019-09-1 2021-02-2 Details: https://github.com/FasterXML/jackson-databind/blob/mast
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE FasterXML 2020-04-0
j 2021-02-2 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/ANONE A Polymorp2019-10-0 2021-02-2 Details: https://github.com/FasterXML/jackson-databind/issues/246
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.0/ANONE A Polymorph 2019-07-3 2020-08-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.0/ANONE A Polymorph 2019-06-1 2020-10-2 Details: https://github.com/FasterXML/jackson-databind/issues/234
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/AREQUIRED FasterXML 2020-03-2
j 2021-12-0 Details: https://nvd.nist.gov/vuln/detail/CVE-2020-10968
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/AREQUIRED FasterXML 2020-03-2
j 2021-12-0 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-07-2 Details: https://github.com/FasterXML/jackson-databind/issues/299
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE An issue wa2019-07-0 2021-02-2 Details:
Message: https://github.com/FasterXML/jackson-databind/issues/203
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/ANONE FasterXML 2021-01-0
j 2022-09-0 Details: https://github.com/FasterXML/jackson-databind/issues/299
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE FasterXML 2020-04-0 2021-02-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE jackson-dat2020-07-2 2020-07-2 Message:
Details: https://github.com/advisories/GHSA-rpr3-cw39-3pxh
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Details: https://github.com/FasterXML/jackson-databind/issues/300
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Details:
Message: https://github.com/FasterXML/jackson-databind/issues/300
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/ANONE FasterXML 2021-01-0
j 2022-09-0 Details: https://github.com/FasterXML/jackson-databind/issues/300
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Details: https://github.com/FasterXML/jackson-databind/issues/300
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Message:
Details: https://github.com/FasterXML/jackson-databind/issues/299
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/ANONE FasterXML 2018-01-2
j 2021-01-2 Details: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Details:
Message: https://github.com/FasterXML/jackson-databind/issues/299
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Details: https://github.com/FasterXML/jackson-databind/issues/299
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Details: https://github.com/FasterXML/jackson-databind/issues/299
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.0/ANONE FasterXML 2019-06-2
j 2020-10-2 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/ANONE FasterXML 2020-02-1
j 2021-02-2 Details: https://github.com/FasterXML/jackson-databind/issues/262
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE A Polymorph 2019-10-0 2022-10-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/ANONE A Polymorph 2019-10-0 2022-10-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.0/ANONE FasterXML 2019-01-0
j 2020-08-3 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.0/ANONE FasterXML 2019-01-0
j 2020-08-3 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.0/ANONE FasterXML 2019-01-0
j 2020-08-3 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE A series o 2019-10-0 2021-07-3 Details:
Message: https://access.redhat.com/errata/RHSA-2019:2938
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/ANONE A flaw was 2021-01-1 2022-06-0 Details: https://github.com/FasterXML/jackson-databind/issues/285
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/AREQUIRED FasterXML 2020-03-3
j 2021-12-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Message:
Details: https://github.com/FasterXML/jackson-databind/issues/300
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/AREQUIRED FasterXML 2020-03-3 2021-12-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/AREQUIRED FasterXML 2020-03-3 2021-12-1 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/ANONE FasterXML 2020-08-2 2022-05-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE FasterXML 2020-06-1
j 2021-11-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE FasterXML 2020-06-1 2021-11-1 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/ANONE FasterXML 2020-06-1
j 2021-11-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE FasterXML 2020-09-1
j 2022-05-1 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/ANONE In FasterXM 2022-10-0 2022-11-2 Details: https://github.com/FasterXML/jackson-databind/issues/358
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE A flaw was 2020-03-0 2021-03-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE A flaw was 2020-03-0 2020-09-0 Message:
Details: https://github.com/FasterXML/jackson-databind/issues/246
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/ANONE In FasterXM 2022-10-0 2022-11-2 Details: https://github.com/FasterXML/jackson-databind/issues/359
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE FasterXML 2020-03-0
j 2021-12-0 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/ANONE FasterXML 2018-01-1
j 2021-01-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE SubTypeVal2019-07-2 2022-04-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE FasterXML 2020-03-0
j 2021-12-0 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/ANONE FasterXML 2020-03-0
j 2021-12-0 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/ANONE FasterXML 2020-01-0
j 2022-10-2 Details:
jackson-databind before 2.13.0 allows
Message: https://github.com/FasterXML/jackson-databind/issues/252
a JavaGH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade
StackOverflow
to version
exception and denial of service via a larg
CVSS:3.1/ANONE Mend Note: 2022-03-1
After conducting
2022-11-2further
Details:
research,
https://github.com/FasterXML/jackson-databind/issues/281
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade Mend has determined that all versions of com.faster
to version
CVSS:3.1/ANONE FasterXML 2019-01-0
j 2021-05-2 Details:
Message: https://nvd.nist.gov/vuln/detail/CVE-2018-14719
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/ANONE FasterXML 2019-01-0
j 2021-05-2 Message:
Details: https://nvd.nist.gov/vuln/detail/CVE-2018-14718
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/AREQUIRED FasterXML 2020-03-1
j 2021-12-0 Details: https://nvd.nist.gov/vuln/detail/CVE-2020-10672
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.1/AREQUIRED FasterXML 2020-03-1
j 2021-12-0 Details:
Message: https://github.com/FasterXML/jackson-databind/issues/266
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/ANONE FasterXML 2020-06-1
j 2021-11-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.0/ANONE FasterXML 2018-02-2
j 2021-03-2 Details: https://nvd.nist.gov/vuln/detail/CVE-2018-7489
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Message: Upgrade to version
CVSS:3.0/ANONE Apache CXF'
Improper 2017-04-1
Handling of 2021-06-1 Details:
ExceptionalMessage: https://nvd.nist.gov/vuln/detail/CVE-2017-5656
Conditions GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade
in Newtonsoft.Json.
to version uget/packages/microsoft.visualstud
CVSS:3.1/ANONE Newtonsoft.Json
2022-06-2
prior2022-06-2
to versionDetails:
Message: Upgrade totoversion
13.0.1 is
https://github.com/JamesNK/Newtonsoft.Json/commit/7e7
vulnerable
GH_sp-odaGH_sp-oda
Insecure /home/wss-scanner/.nuget/package
Defaults due to improper handling o
CVSS:3.1/AREQUIRED In jQuery v2020-04-2 2022-07-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_sp-odaGH_sp-oda/home/wss-scanner/.nuget/package
Upgrade to version
CVSS:3.1/AREQUIRED A carefully2021-03-1 2022-09-0 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/AREQUIRED A carefully2021-03-1 2022-09-0 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/AREQUIRED In Apache P2021-06-1 2022-07-2 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/AREQUIRED In Apache P2021-06-1 2022-07-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version /caches/modules-2/files-2.1/org.spr
CVSS:3.1/ANONE Pivotal
OutOfMemoryError when writingDetails:
Spr2020-01-0 2022-06-1 Message: https://github.com/spring-projects/spring-framework/comm
BigDecimal GH_spigit_GH_spigit_
Upgrade
In Jackson
to version /home/wss-scanner/.gradle/caches
Core before version 2.7.7.
CVSS:3.1/ANONE When enabled 2016-08-2
the WRITE_BIGDECIMAL_AS_PLAIN
2018-06-2 Details: https://github.com/FasterXML/jackson-core/releases/tag/ja
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
setting,
Message: Upgrade to version Jackson will attempt to write out the who
CVSS:3.1/ANONE In Jackson 2018-06-2 2018-06-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=WS-2018-
GH_spigit_GH_spigit_ository/com/fasterxml/jackson/core
Upgrade to version
CVSS:3.1/ANONE The jQuery2021-01-1 2021-02-1 Message:
Details: https://github.com/advisories/GHSA-jxwx-85vp-gvwm
GH_spigit_GH_spigit_/web/js/speui/jquery.validate.min.j
Upgrade to version
CVSS:3.1/ANONE Prototype P2020-07-0 2021-06-0 Details: https://github.com/janl/node-jsonpointer/releases/tag/v4.1
GH_spigit_GH_spigit_/tmp/ws-scm/spigit_engage/cypres
Message: Upgrade to version
CVSS:3.1/ANONE This affect 2021-11-0 2021-11-0 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-
GH_spigit_GH_spigit_/tmp/ws-scm/spigit_engage/cypres
Upgrade to version
CVSS:3.1/ANONE The hotrod2018-09-1 2019-10-0 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.0/ANONE It was foun2018-02-1 2019-06-0 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE jsoup is a 2021-08-1 2022-07-2 Message:
Details: https://jsoup.org/news/release-1.14.2
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/AREQUIRED jsoup is a 2022-08-2 2022-11-0
** DISPUTED ** A Buffer Overflow Details:
Message: https://github.com/jhy/jsoup/security/advisories/GHSA-gp7
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
vulnerability
Upgradeexists
to version
in NumPy 1.9.x in the PyArray_NewFromDescr
CVSS:3.1/ANONE Mend Note:
2021-12-1
After conducting
2022-07-2further
Details:
An incomplete string comparisonMessage: research,
https://nvd.nist.gov/vuln/detail/CVE-2021-33430
GH_sp-odaGH_sp-odata
in the numpy.core Mend has determined
Upgrade tocomponent
version thatbefore
in NumPy numpy1.22.0
versions before
allows 1
attac
CVSS:3.1/ANONE Mend Note: 2021-12-1
After conducting
2022-07-2further
Details:
Message: Upgrade to version /caches/modules-2/files-2.1/com.fa1
research,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-
GH_sp-odaGH_sp-odata
Mend has determined that versions 1.12.0 through
CVSS:3.1/ANONE In FasterXM 2022-10-0 2022-11-2 Details:
Message: https://github.com/FasterXML/jackson-databind/issues/358
GH_spigit_GH_spigit_
Upgrade to version /home/wss-scanner/.gradle/caches
/caches/modules-2/files-2.1/com.fa
CVSS:3.1/ANONE In FasterXM 2022-10-0 2022-11-2 Message:
Details: https://github.com/FasterXML/jackson-databind/issues/359
GH_spigit_GH_spigit_
Upgrade /home/wss-scanner/.gradle/caches
to version /caches/modules-2/files-2.1/com.fa
CVSS:3.1/ANONE A flaw was 2021-01-1 2022-06-0 Details:
jackson-databind before 2.13.0 allows
Message: https://github.com/FasterXML/jackson-databind/issues/285
a JavaGH_spigit_GH_spigit_
Upgrade
StackOverflow
to version /home/wss-scanner/.gradle/caches
exception
/caches/modules-2/files-2.1/com.fa
and denial of service via a larg
CVSS:3.1/ANONE Mend Note: 2022-03-1
After conducting
2022-11-2further
Details:
research,
https://github.com/FasterXML/jackson-databind/issues/281
GH_spigit_GH_spigit_
Mend has determined
/home/wss-scanner/.gradle/caches
that all versions of com.faster
Message: Upgrade to version /caches/modules-2/files-2.1/com.fa
CVSS:3.1/ANONE FasterXML 2020-12-2
j 2022-09-0 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_ /home/wss-scanner/.gradle/caches
Message: Upgrade to version /caches/modules-2/files-2.1/com.fa
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-07-2 Details: https://github.com/FasterXML/jackson-databind/issues/299
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version /caches/modules-2/files-2.1/com.fa
CVSS:3.1/ANONE FasterXML 2021-01-0
j 2022-09-0 Message:
Details: https://github.com/FasterXML/jackson-databind/issues/299
GH_spigit_GH_spigit_
Upgrade /home/wss-scanner/.gradle/caches
to version /caches/modules-2/files-2.1/com.fa
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://github.com/FasterXML/jackson-databind/issues/300
GH_spigit_GH_spigit_ /caches/modules-2/files-2.1/com.fa
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://github.com/FasterXML/jackson-databind/issues/300
GH_spigit_GH_spigit_ /caches/modules-2/files-2.1/com.fa
CVSS:3.1/ANONE A flaw was 2020-12-0 2022-07-2 Details:
Message: https://github.com/FasterXML/jackson-databind/issues/258
GH_spigit_GH_spigit_
Upgrade to version /home/wss-scanner/.gradle/caches
/caches/modules-2/files-2.1/com.fa
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://github.com/FasterXML/jackson-databind/issues/300
GH_spigit_GH_spigit_ /caches/modules-2/files-2.1/com.fa
CVSS:3.1/ANONE FasterXML 2021-01-0
j 2022-09-0 Message:
Details: https://github.com/FasterXML/jackson-databind/issues/300
GH_spigit_GH_spigit_
Upgrade /home/wss-scanner/.gradle/caches
to version /caches/modules-2/files-2.1/com.fa
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://github.com/FasterXML/jackson-databind/issues/300
GH_spigit_GH_spigit_ /caches/modules-2/files-2.1/com.fa
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://github.com/FasterXML/jackson-databind/issues/299
GH_spigit_GH_spigit_ /caches/modules-2/files-2.1/com.fa
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Details:
Message: https://github.com/FasterXML/jackson-databind/issues/299
GH_spigit_GH_spigit_
Upgrade to version /home/wss-scanner/.gradle/caches
/caches/modules-2/files-2.1/com.fa
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://github.com/FasterXML/jackson-databind/issues/299
GH_spigit_GH_spigit_ /caches/modules-2/files-2.1/com.fa
CVSS:3.1/ANONE FasterXML 2021-01-0 2022-09-0 Message:
Details: https://github.com/FasterXML/jackson-databind/issues/299
GH_spigit_GH_spigit_
Upgrade /home/wss-scanner/.gradle/caches
to version /caches/modules-2/files-2.1/org.spr
CVSS:3.1/ANONE In spring f 2022-05-1 2022-10-0 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://tanzu.vmware.com/security/cve-2022-22970
GH_spigit_GH_spigit_
CVSS:3.1/ANONE In Eclipse 2022-07-0 2022-10-2 Details:
Message: https://github.com/eclipse/jetty.project/security/advisories
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/AREQUIRED In Eclipse 2019-04-2 2022-04-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE In Eclipse 2020-11-2 2022-05-1 Details: https://github.com/eclipse/jetty.project/security/advisories
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE In Eclipse 2022-07-0 2022-10-2 Message:
Details: https://github.com/eclipse/jetty.project/security/advisories
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/AREQUIRED In Eclipse 2019-04-2 2022-04-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE For Eclipse2021-06-2 2022-05-1 Details:
Message: https://github.com/eclipse/jetty.project/security/advisories
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE For Eclipse2021-06-0 2022-10-2 Details: https://github.com/eclipse/jetty.project/security/advisories
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE In Eclipse 2019-04-2 2022-04-2 Details: https://bugs.eclipse.org/bugs/show_bug.cgi?id=546577
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE An issue wa2020-06-2 2021-08-2 Message:
Details: https://nvd.nist.gov/vuln/detail/WS-2020-0408
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
Upgrade to version
CVSS:3.1/ANONE Netty is an2021-02-0 2022-05-1 Details:
An incomplete string comparisonMessage: https://github.com/netty/netty/security/advisories/GHSA-5m
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
in the numpy.core
Upgrade tocomponent
version in /etl/requirements.txt
NumPy before 1.22.0 allows attac
CVSS:3.1/ANONE Mend Note: 2021-12-1
After conducting
2022-07-2further
Details:
research,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-
GH_sp-odaGH_sp-oda
Mend has
Message: Upgrade to version determined
/tmp/ws-scm/sp-odata/etl/requirem
that versions 1.12.0 through 1
CVSS:3.1/ANONE The payload 2020-07-1 2022-05-1 Details: https://lists.apache.org/thread.html/rd48c72bd3255bda875
GH_spigit- GH_spigit-
Message: Upgrade to version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE An attacker2021-03-1 2022-05-1 Details:
Message: https://github.com/apache/velocity-engine/commit/1ba607
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE An XXE issu2021-06-1 2022-07-2 Message:
Details: https://nvd.nist.gov/vuln/detail/CVE-2021-33813
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/AREQUIRED A cross-sit 2021-10-2 2021-10-2 Details: https://github.com/advisories/GHSA-5h9g-x5rv-25wg
GH_spigit_GH_spigit_/web/js/speui/tinymce/tinymce.min
Message: Upgrade to version
CVSS:3.1/AREQUIRED tinymce 4.72019-07-1 2020-08-1 Details:
Message: https://github.com/advisories/GHSA-c78w-2gw7-gjv3
GH_spigit_GH_spigit_/web/js/speui/tinymce/tinymce.min
Upgrade to version
CVSS:3.1/AREQUIRED A cross-sit 2020-08-1 2020-08-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_/web/js/speui/tinymce/tinymce.min
Message: Upgrade to version
CVSS:3.1/AREQUIRED Cross-site 2021-05-2 2021-05-3
This vulnerability has been patched Details:
Message: https://github.com/advisories/GHSA-5vm8-hhgr-jcjp
GH_spigit_GH_spigit_/web/js/speui/tinymce/tinymce.min
in TinyMCE
Upgrade
5.6.0toby
version
upgrading to a version of the dependency w
CVSS:3.1/ANONE 2021-01-0 2021-01-0 Message:
Details: https://github.com/tinymce/tinymce/security/advisories/GH
GH_spigit_GH_spigit_/web/js/speui/tinymce/tinymce.min
Upgrade to version
CVSS:3.1/AREQUIRED A
A cross-sit
cross-site2020-08-1 2020-08-1
scripting (XSS) Details:
vulnerability
Message: https://github.com/advisories/GHSA-vrv8-v4w8-f95h
wasGH_spigit_GH_spigit_/web/js/speui/tinymce/tinymce.min
Upgrade
discovered
to version
in the URL sanitization logic of the core parse
CVSS:3.1/AREQUIRED The issue has
2021-02-1
been fixed
2021-02-2
in TinyMCE
Details:
5.6.0.
https://github.com/advisories/GHSA-w7jx-j77m-wp65
GH_spigit_GH_spigit_/web/js/speui/tinymce/tinymce.min
Message: Upgrade to version
CVSS:3.1/AREQUIRED A cross-sit 2021-11-0 2021-11-0 Details:
Message: https://github.com/advisories/GHSA-r8hm-w5f7-wj39
GH_spigit_GH_spigit_/web/js/speui/tinymce/tinymce.min
Upgrade to version
CVSS:3.1/ANONE A cross-sit 2019-12-1 2020-02-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-
GH_spigit_GH_spigit_/web/js/speui/tinymce/tinymce.min
Message: Upgrade to version
CVSS:3.1/AREQUIRED TinyMCE bef 2020-08-1 2020-08-1 Message:
Details: https://github.com/tinymce/tinymce/tree/5.1.4,https://gith
GH_spigit_GH_spigit_/web/js/speui/tinymce/tinymce.min
Upgrade to version
CVSS:3.1/AREQUIRED tinymce 4.72019-07-1 2020-08-1 Details: https://github.com/advisories/GHSA-c78w-2gw7-gjv3
GH_spigit_GH_spigit_/web/js/speui/tinymce/jquery.tinym
Message: Upgrade to version
CVSS:3.1/AREQUIRED A cross-sit 2020-08-1 2020-08-1 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_/web/js/speui/tinymce/jquery.tinym
Upgrade to version
CVSS:3.1/AREQUIRED Cross-site 2021-05-2 2021-05-3
This vulnerability has been patched Details:
Message: https://github.com/advisories/GHSA-5vm8-hhgr-jcjp
GH_spigit_GH_spigit_/web/js/speui/tinymce/jquery.tinym
in TinyMCE
Upgrade
5.6.0toby
version
upgrading to a version of the dependency w
CVSS:3.1/ANONE 2021-01-0 2021-01-0 Details:
A cross-site scripting (XSS) vulnerability
Message: https://github.com/tinymce/tinymce/security/advisories/GH
GH_spigit_GH_spigit_/web/js/speui/tinymce/jquery.tinym
wasUpgrade
discovered
to version
in the URL sanitization logic of the core parse
CVSS:3.1/AREQUIRED The issue has
2021-02-1
been fixed
2021-02-2
in TinyMCE
Details:
5.6.0.
Message: https://github.com/advisories/GHSA-w7jx-j77m-wp65
GH_spigit_GH_spigit_/web/js/speui/tinymce/jquery.tinym
Upgrade to version
CVSS:3.1/ANONE A cross-sit 2019-12-1 2020-02-1 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-
GH_spigit_GH_spigit_/web/js/speui/tinymce/jquery.tinym
Upgrade to version
CVSS:3.1/AREQUIRED TinyMCE bef 2020-08-1 2020-08-1 Details: https://github.com/tinymce/tinymce/tree/5.1.4,https://gith
GH_spigit_GH_spigit_/web/js/speui/tinymce/jquery.tinym
Message: Upgrade to version
CVSS:3.1/ANONE Netty is an2022-05-0 2022-07-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
Upgrade to version
CVSS:3.1/ANONE Apache Comm 2012-11-0 2021-04-2 Details: https://nvd.nist.gov/vuln/detail/CVE-2012-5783
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/AREQUIRED In jQuery v2020-04-2 2022-07-2 Message:
Details: https://github.com/jquery/jquery/security/advisories/GHSA
GH_sp-odaGH_sp-odaddedService/EmbeddedService/Plan
Upgrade to version
CVSS:3.1/AREQUIRED In jQuery v2020-04-2 2022-07-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_sp-odaGH_sp-odaddedService/EmbeddedService/Plan
Message: Upgrade to version
CVSS:3.1/AREQUIRED jQuery befo2019-04-2 2022-04-0 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_sp-odaGH_sp-odaddedService/EmbeddedService/Plan
Upgrade to version
CVSS:3.1/ANONE Netty is an2021-03-0 2022-05-1 Details: https://github.com/advisories/GHSA-wm47-8v5p-wjpj
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
Message: Upgrade to version
CVSS:3.1/ANONE Netty is an2021-03-3 2022-05-1 Details: https://github.com/netty/netty/security/advisories/GHSA-f2
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
Message: Upgrade to version
CVSS:3.1/AREQUIRED In jQuery v2020-04-2 2022-07-2 Message:
Details: https://github.com/jquery/jquery/security/advisories/GHSA
GH_sp-odaGH_sp-odaddedService/EmbeddedService/Plan
Upgrade to version
CVSS:3.1/AREQUIRED In jQuery v2020-04-2 2022-07-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_sp-odaGH_sp-odaddedService/EmbeddedService/Plan
Message: Upgrade to version
CVSS:3.1/AREQUIRED jQuery befo2019-04-2 2022-04-0 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_sp-odaGH_sp-odaddedService/EmbeddedService/Plan
Upgrade to version
CVSS:3.1/ANONE HttpObject2020-01-2 2021-09-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
Message: Upgrade to version
CVSS:3.1/ANONE Netty is an2021-03-0 2022-05-1 Details: https://github.com/advisories/GHSA-wm47-8v5p-wjpj
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
Message: Upgrade to version
CVSS:3.1/ANONE HttpObjectD 2020-01-2 2021-09-1 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
Upgrade to version
CVSS:3.1/ANONE Netty 4.1.42020-01-2 2021-05-2 Details: https://github.com/netty/netty/issues/9861
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
Message: Upgrade to version
CVSS:3.1/ANONE Netty is an2021-02-0 2022-05-1
Netty is an asynchronous event-drivenDetails:
Message: https://github.com/netty/netty/security/advisories/GHSA-5m
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
network
Upgrade
application
to version
framework for rapid development of mai
CVSS:3.1/AREQUIRED Mend Note: 2021-12-0
After conducting
2022-07-2further
Details:
research,
CVE-2021-43797
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
Message: Upgrade Mend has determined that all versions of netty up to
to version
CVSS:3.1/AREQUIRED A vulnerabi2022-05-2 2022-06-0 Details:
Message: https://github.com/angular/angular/pull/40136
GH_spigit_GH_spigit_/src/spigit/node_modules/@angula
Upgrade to version
CVSS:3.1/ANONE The ZlibDec2020-04-0 2022-04-2 Message:
Details: https://netty.io/news/2020/02/28/4-1-46-Final.html
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
Upgrade to version
CVSS:3.1/ANONE The Bzip2 d2021-10-1 2022-10-0 Details: https://github.com/netty/netty/security/advisories/GHSA-gr
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
Message: Upgrade to version
CVSS:3.1/ANONE The Snappy2021-10-1 2022-10-0 Details:
Message: https://github.com/advisories/GHSA-9vjp-v76f-g363
GH_sp-odaGH_sp-oda/home/wss-scanner/.m2/repository
Upgrade to version
CVSS:3.1/AREQUIRED An issue in2022-01-1 2022-05-1 Details: https://github.com/advisories/GHSA-wrvw-hg22-4m67
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE A parsing i 2022-10-1 2022-10-1 Details: https://github.com/protocolbuffers/protobuf/commit/a388
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE A parsing iHandling
Improper 2022-10-1 of 2022-10-1 Details:
ExceptionalMessage: https://github.com/advisories/GHSA-h4h5-3hr4-j3g2
Conditions GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade
in Newtonsoft.Json.
to version uget/packages/newtonsoft.json/12.
CVSS:3.1/ANONE Newtonsoft.Json
2022-06-2
prior2022-06-2
to versionDetails:
Message: Upgrade totoversion
13.0.1 is
https://github.com/JamesNK/Newtonsoft.Json/commit/7e7
vulnerable
GH_sp-odaGH_sp-oda
Insecure /home/wss-scanner/.nuget/package
Defaults due to improper handling o
CVSS:3.1/ANONE This affect 2020-10-2 2021-07-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_/src/spigit/node_modules/chart.js/p
Upgrade to version
CVSS:3.1/ANONE The authent 2013-09-3 2016-05-0 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE The authent 2013-09-3 2019-02-0 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE ESAPI (The 2022-04-2 2022-07-2 Message:
Details: https://github.com/ESAPI/esapi-java-legacy/security/adviso
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/AREQUIRED ESAPI (The 2022-04-2 2022-07-2 Details: https://github.com/advisories/GHSA-q77q-vx4q-xx6q
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/AREQUIRED In Bootstra2019-02-2 2022-05-1 Details:
Message: https://github.com/twbs/bootstrap/pull/28236
GH_spigit_GH_spigit_/web/js/bootstrap/js/bootstrap.min
Upgrade to version
CVSS:3.0/AREQUIRED In Bootstra2018-07-1 2021-07-2 Details: https://github.com/twbs/bootstrap/pull/26630
GH_spigit_GH_spigit_/web/js/bootstrap/js/bootstrap.min
Message: Upgrade to version
CVSS:3.0/AREQUIRED In Bootstra2019-01-0 2021-07-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-
GH_spigit_GH_spigit_/web/js/bootstrap/js/bootstrap.min
Message: Upgrade to version
CVSS:3.0/AREQUIRED In Bootstra2019-01-0 2021-07-2 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-
GH_spigit_GH_spigit_/web/js/bootstrap/js/bootstrap.min
Upgrade to version
CVSS:3.0/AREQUIRED In Bootstra2018-07-1 2021-07-2 Details: https://github.com/twbs/bootstrap/pull/26630
GH_spigit_GH_spigit_/web/js/bootstrap/js/bootstrap.min
Message: Upgrade to version
CVSS:3.0/AREQUIRED In Bootstra2019-01-0 2021-07-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-
GH_spigit_GH_spigit_/web/js/bootstrap/js/bootstrap.min
Upgrade to version
CVSS:3.1/ANONE angular.js 2016-11-0 2017-01-2 Details: https://github.com/angular/angular.js/pull/15346
GH_spigit_GH_spigit_/tmp/ws-scm/spigit_engage/src/mo
Message: Upgrade to version
CVSS:3.1/AREQUIRED Both Firef 2017-05-2 2017-07-0 Details: https://github.com/angular/angular.js/commit/8f31f1ff43b6
GH_spigit_GH_spigit_/tmp/ws-scm/spigit_engage/src/mo
Message: Upgrade to version
CVSS:3.1/ANONE Junrar is a 2022-02-0 2022-02-0 Message:
Details: https://github.com/advisories/GHSA-m6cj-93v6-cvr5
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE ** UNSUPPO 2022-03-3 2022-04-0 Details:
Message: Upgrade to GH_spigit-
https://github.com/JLLeitschuh/security-research/security/a
GH_spigit- version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE When starti2021-04-1 2022-04-0 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/org.ap
Upgrade to version
CVSS:3.1/ANONE Reported in2020-08-1 2021-03-2 Details: https://lists.apache.org/thread.html/rf54e7912b7d2b72c63
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/org.ap
Message: Upgrade to version
CVSS:3.1/ANONE The Replica2021-04-1 2021-09-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/org.ap
Message: Upgrade to version
CVSS:3.1/ANONE An Improper 2021-12-2 2022-08-0 Message:
Details: https://issues.apache.org/jira/browse/SOLR-15826
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/org.ap
Upgrade to version
CVSS:3.1/ANONE Apache Solr2020-10-1 2022-02-2 Details: https://issues.apache.org/jira/browse/SOLR-14925
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/org.ap
Message: Upgrade to version
CVSS:3.1/ANONE When using2021-04-1 2021-06-0 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CE-V2021-
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/org.ap
Upgrade to version
CVSS:3.1/ANONE org.apache.2014-08-2 2021-10-0 Details: https://github.com/apache/struts/tree/STRUTS_4_3_5/
GH_spigit_GH_spigit_ository/org/apache/httpcomponent
Message: Upgrade to version
CVSS:3.1/ANONE http/conn/s2014-09-0 2018-01-0 Details: https://nvd.nist.gov/vuln/detail/CVE-2012-6153
GH_spigit_GH_spigit_ository/org/apache/httpcomponent
Message: Upgrade to version
CVSS:3.1/ANONE Apache Http 2020-12-0 2022-05-1 Message:
Details: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-139
GH_spigit_GH_spigit_ository/org/apache/httpcomponent
Upgrade to version
CVSS:3.1/ANONE Apache http 2017-01-2 2019-05-3 Details: https://issues.apache.org/jira/browse/HTTPCLIENT-1803
GH_spigit_GH_spigit_ository/org/apache/httpcomponent
Message: Upgrade to version
CVSS:3.0/ANONE SimpleXML2017-11-1
( 2019-07-2 Details:
Message: https://github.com/ngallagher/simplexml/issues/18
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE .NET Core 2021-02-2 2021-11-2 Details:
A denial of service vulnerability exists
Message: https://github.com/dotnet/announcements/issues/178
GH_sp-odaGH_sp-oda/home/wss-scanner/.nuget/package
whenUpgrade
.NET Framework
to versionand .NET Core improperly process RegE
CVSS:3.1/ANONE Mend Note: 2019-05-1
After conducting
2020-08-2further
Details:
research,
https://github.com/advisories/GHSA-cmhx-cq75-c4mj
GH_sp-odaGH_sp-oda/home/wss-scanner/.nuget/package
Mend has determined
Message: Upgrade to version that CVE-2019-0820 only affec
/caches/modules-2/files-2.1/org.ap
CVSS:3.1/ANONE The HTTP tr2017-08-1 2021-06-1 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-
GH_spigit_GH_spigit_
Upgrade /home/wss-scanner/.gradle/caches
to version /caches/modules-2/files-2.1/org.ap
CVSS:3.0/ANONE It is possi 2018-07-0 2021-06-1 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-
GH_spigit_GH_spigit_ /caches/modules-2/files-2.1/org.ap
CVSS:3.1/AREQUIRED By default,2020-11-1 2022-05-1 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
http://cxf.apache.org/security-advisories.data/CVE-2020-13
GH_spigit_GH_spigit_
CVSS:3.1/ANONE For Eclipse2021-06-0 2022-10-2 Details:
Message: https://github.com/eclipse/jetty.project/security/advisories
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version /caches/modules-2/files-2.1/com.go
CVSS:3.1/ANONE A temp dire2020-12-1 2022-05-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE The package 2021-03-2 2021-09-2 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-
GH_spigit_GH_spigit_/web/js/speui/underscore-min.js
Upgrade to version
CVSS:3.1/AREQUIRED In Async be2022-04-0 2022-05-1 Details: https://nvd.nist.gov/vuln/detail/CVE-2021-43138
GH_sp-odaGH_sp-oda/utils/dynamodb_csv/node_module
Message: Upgrade to version /caches/modules-2/files-2.1/com.go
CVSS:3.1/ANONE Denial of S2021-10-1 2021-11-1 Details:
Message: https://github.com/google/gson/releases/tag/gson-parent-2
GH_spigit_GH_spigit_
Upgrade to version /home/wss-scanner/.gradle/caches
/caches/modules-2/files-2.1/com.go
CVSS:3.1/ANONE The package 2022-05-0 2022-11-2 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-
GH_spigit_GH_spigit_
CVSS:3.1/ANONE Apache Calc 2022-07-2 2022-08-0 Details:
Message: https://github.com/advisories/GHSA-w7f5-jrpr-5c2m
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE Affected ve
Improper 2017-10-3
Handling of 2022-06-2 Details:
ExceptionalMessage: https://github.com/stleary/JSON-java/issues/372
Conditions GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade
in Newtonsoft.Json.
to version
CVSS:3.1/ANONE Newtonsoft.Json
2022-06-2
prior2022-06-2
to versionDetails:
Message: Upgrade totoversion
13.0.1 is
https://github.com/JamesNK/Newtonsoft.Json/commit/7e7
vulnerable
GH_sp-odaGH_sp-oda/home/wss-scanner/.nuget/package
Insecure Defaults due to improper handling o
CVSS:3.1/ANONE HttpUtils#g2020-10-0 2021-07-2 Details:
Message: https://github.com/apache/calcite/releases/tag/calcite-1.26
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE ** DISPUTED 2022-05-1 2022-06-0 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-
GH_spigit_GH_spigit_/tmp/ws-scm/spigit_engage/cypres
Message: Upgrade to version
CVSS:3.1/ANONE Apache Http 2020-12-0 2022-05-1 Details: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-139
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE Axios NPM2020-11-0
p 2022-09-1 Message:
Details: https://github.com/axios/axios/commit/c7329fefc890050ed
GH_sp-odaGH_sp-oda/nginx-gateway/tableau-web-data-c
Upgrade to version
CVSS:3.1/AREQUIRED A carefully2020-04-2 2022-10-0 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/org.ap
Message: Upgrade to version
CVSS:3.1/AREQUIRED A carefully2020-03-2 2022-10-0 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/org.ap
Upgrade to version
CVSS:3.1/AREQUIRED A carefully2020-03-2 2022-10-0 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/org.ap
Message: Upgrade to version
CVSS:3.1/AREQUIRED The BPG par 2022-05-1 2022-11-0 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/org.ap
Message: Upgrade to version
CVSS:3.0/AREQUIRED In Apache T2019-08-0 2020-08-2 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/org.ap
Upgrade to version
CVSS:3.1/AREQUIRED A carefully2021-03-3 2022-05-1 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/org.ap
Message: Upgrade to version
CVSS:3.1/ANONE An issue wa2021-02-2 2022-05-1 Details:
Message: https://github.com/netplex/json-smart-v1/issues/7
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE An issue wa2021-02-2 2022-05-1 Details: https://github.com/netplex/json-smart-v1/issues/7
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE This affect 2021-01-1 2021-01-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-2847
GH_sp-odaGH_sp-oda/utils/dynamodb_csv/node_module
Upgrade to version
CVSS:3.1/ANONE Those using2022-10-0 2022-10-1 Message:
Details: https://nvd.nist.gov/vuln/detail/CVE-2022-41853
GH_sp-odaGH_sp-oda2/repository/org/hsqldb/hsqldb/2.5
Upgrade to version
CVSS:3.1/ANONE In Apache H 2022-04-0 2022-09-0 Details: https://nvd.nist.gov/vuln/detail/CVE-2022-26612
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version
CVSS:3.1/ANONE Apache Hado 2022-08-0 2022-10-2 Details:
Message: https://lists.apache.org/thread/mxqnb39jfrwgs3j6phwvlrfq4
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE The jQuery2021-01-1 2021-02-1 Details: https://github.com/advisories/GHSA-jxwx-85vp-gvwm
GH_sp-odaGH_sp-odaddedService/EmbeddedService/Plan
Message: Upgrade to version
CVSS:3.1/ANONE The Alias f 2019-12-1 2022-07-2 Details:
Message: Upgrade to GH_spigit-
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-
GH_spigit- version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE Using snake2022-09-0 2022-10-0 Message:
Details: https://bitbucket.org/snakeyaml/snakeyaml/issues/526/stac
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE The package 2022-08-3 2022-10-0 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-
GH_spigit- GH_spigit-
CVSS:3.1/ANONE Using snake2022-09-0 2022-09-2 Details:
Message: https://github.com/advisories/GHSA-9w3m-gqgf-c4p9
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE Using snake2022-09-0 2022-10-0 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=470
GH_spigit- GH_spigit-
CVSS:3.1/AREQUIRED Using snake2022-09-0 2022-10-0 Details:
Message: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=470
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE The simplif2022-09-2 2022-11-1 Message:
Details: https://lists.apache.org/thread/3jjqbsp6j88b198x5rmg99b1
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE The fix for 2021-03-0 2022-10-2 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe
GH_spigit- GH_spigit-
CVSS:3.1/AREQUIRED When using2019-12-2 2022-10-0 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE A specially 2020-06-2 2021-07-2 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://lists.apache.org/thread.html/r5541ef6b6b68b49f76f
GH_spigit- GH_spigit-
CVSS:3.1/ANONE When Apache 2019-12-2 2022-04-1 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE In Apache T2020-02-2 2021-05-0 Message:
Details: https://github.com/advisories/GHSA-6v7p-v754-j89v
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE If an HTTP/2020-10-1 2021-06-1 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://lists.apache.org/thread.html/r4a390027eb27e45501
GH_spigit- GH_spigit-
CVSS:3.1/ANONE An h2c dire2020-07-1 2022-03-0 Details:
Message: https://lists.apache.org/thread.html/r61f411cf82488d6ec21
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE Apache Tomc 2021-07-1 2022-10-2 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://lists.apache.org/thread.html/rd84fae1f474597bdf35
GH_spigit- GH_spigit-
CVSS:3.1/ANONE When respon 2021-03-0 2022-10-2 Details:
Message: https://lists.apache.org/thread.html/r7b95bc248603360501
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE When servin 2021-01-1 2022-10-2 Message:
Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE Apache Tomc 2021-09-1 2022-10-2 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://tomcat.apache.org/security-10.html
GH_spigit- GH_spigit-
CVSS:3.1/ANONE When using2020-05-2 2022-07-2 Details:
Message: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE Apache Comm 2022-10-1 2022-10-2 Details: https://www.openwall.com/lists/oss-security/2022/10/13/4
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version /home/wss-scanner/.gradle/caches
CVSS:3.1/ANONE In spring f 2022-05-1 2022-10-0 Details:
Message: https://tanzu.vmware.com/security/cve-2022-22970
GH_spigit_GH_spigit_
Upgrade to version /caches/modules-2/files-2.1/org.spr
CVSS:3.1/ANONE The PKIX tr2015-07-0 2016-11-3 Message:
Details: https://nvd.nist.gov/vuln/detail/CVE-2015-1796
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/org.op
Upgrade to version
CVSS:3.0/ANONE The (1) Htt2019-04-0 2019-04-0 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-
GH_spigit_GH_spigit_/caches/modules-2/files-2.1/org.op
Message: Upgrade to version
CVSS:3.1/ANONE Apache com 2019-05-2 2020-03-0 Details:
Message: https://github.com/apache/commons-codec/commit/48b61
GH_spigit-
Upgrade to GH_spigit-
version /home/wss-scanner/.gradle/caches
/caches/modules-2/files-2.1/commo
CVSS:3.1/ANONE Apache com 2019-05-2 2020-03-0 Details:
Message: Upgrade to version /home/wss-scanner/.gradle/caches
https://github.com/apache/commons-codec/commit/48b61
GH_spigit_GH_spigit_
CVSS:3.1/ANONE JGroups bef2016-06-3 2022-02-2 Details: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Message: Upgrade to version /tmp/ws-scm/sp-odata/etl-schedule
CVSS:3.1/ANONE An issue wa2021-06-2 2021-12-0 Message:
Details: https://github.com/urllib3/urllib3/security/advisories/GHSA
GH_sp-odaGH_sp-oda
Upgrade to version /etl-scheduler/requirements.txt
CVSS:3.1/ANONE An issue wa2020-07-1 2021-07-2 Details: https://github.com/ajv-validator/ajv/releases/tag/v6.12.3
GH_spigit_GH_spigit_/src/spigit/node_modules/ajv/packa
Message: Upgrade to version
CVSS:3.1/ANONE In Spring F 2022-04-1 2022-10-1 Details:
Message: https://tanzu.vmware.com/security/cve-2022-22968
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
Upgrade to version
CVSS:3.1/ANONE In spring f 2022-05-1 2022-10-0 Details: https://tanzu.vmware.com/security/cve-2022-22971
GH_spigit_GH_spigit_/home/wss-scanner/.gradle/caches
b/angular/angular.min.js
b/angular/angular.min.js
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-beans/3.0.3.RELEASE/9861dee56a8d4b9344cc864404ec7
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-beans/3.0.3.RELEASE/9861dee56a8d4b9344cc864404ec7
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-core/3.0.3.RELEASE/8f7bda0ca504c1ba863676df8b79175
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-core/3.0.3.RELEASE/8f7bda0ca504c1ba863676df8b79175
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-core/3.0.3.RELEASE/8f7bda0ca504c1ba863676df8b79175
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-core/3.0.3.RELEASE/8f7bda0ca504c1ba863676df8b79175
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-core/3.0.3.RELEASE/8f7bda0ca504c1ba863676df8b79175
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-context/3.0.3.RELEASE/fbe056b0e029cd7c88d6de405ea7
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-context/3.0.3.RELEASE/fbe056b0e029cd7c88d6de405ea7
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-webapp/9.4.14.v20181114/88a04172b5e7736bc3e95eb58623aa
ss-scanner/.gradle/caches/modules-2/files-2.1/org.jasypt/jasypt/1.6/1550a512e10a517a557254f15a12392393245610/jasypt-1.6.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty.http2/http2-server/9.4.14.v20181114/a2ce60a90cbf4db91240bb5857
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty.http2/http2-common/9.4.14.v20181114/820ca2201ad531983cc3a8e2
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty.http2/http2-common/9.4.14.v20181114/820ca2201ad531983cc3a8e2
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty.http2/http2-common/9.4.14.v20181114/820ca2201ad531983cc3a8e2
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty.http2/http2-common/9.4.14.v20181114/820ca2201ad531983cc3a8e2
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty.http2/http2-common/9.4.14.v20181114/820ca2201ad531983cc3a8e2
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty.http2/http2-common/9.4.14.v20181114/820ca2201ad531983cc3a8e2
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty.http2/http2-common/9.4.14.v20181114/820ca2201ad531983cc3a8e2
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty.http2/http2-common/9.4.14.v20181114/820ca2201ad531983cc3a8e2
ss-scanner/.m2/repository/io/pebbletemplates/pebble/3.1.0/pebble-3.1.0.jar
ss-scanner/.m2/repository/io/pebbletemplates/pebble/3.1.0/pebble-3.1.0.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-expression/3.0.3.RELEASE/3c2702b873e42d2e3d905507fa
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-http/9.4.14.v20181114/6d0c8ac42e9894ae7b5032438eb4579c2
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-http/9.4.14.v20181114/6d0c8ac42e9894ae7b5032438eb4579c2
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-http/9.4.14.v20181114/6d0c8ac42e9894ae7b5032438eb4579c2
ss-scanner/.gradle/caches/modules-2/files-2.1/org.hibernate.validator/hibernate-validator/6.0.17.Final/af73055fc4a103ab347c56e7d
ss-scanner/.gradle/caches/modules-2/files-2.1/org.hibernate.validator/hibernate-validator/6.0.17.Final/af73055fc4a103ab347c56e7d
ss-scanner/.gradle/caches/modules-2/files-2.1/org.asciidoctor/asciidoctorj/1.5.3.2/1ac9c45a20d567089425d9e63f8928287c8b0860/a
modules-2/files-2.1/org.asciidoctor/asciidoctorj/1.5.3.2/1ac9c45a20d567089425d9e63f8928287c8b0860/asciidoctorj-1.5.3.2.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-servlet/9.4.14.v20181114/96f501462af425190ff7b63e387692c1
b/angular/angular-sanitize.js
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-io/9.4.14.v20181114/a8c6a705ddb9f83a75777d89b0be59fcef3f
b/angular/angular-sanitize.min.js
ss-scanner/.gradle/caches/modules-2/files-2.1/org.infinispan/infinispan-commons/8.2.4.Final/7026009af6fe8303b2e2ff3e61c122ea7a
ss-scanner/.gradle/caches/modules-2/files-2.1/commons-io/commons-io/2.6/815893df5f31da2ece4040fe0a12fd44b577afaf/common
modules-2/files-2.1/commons-io/commons-io/2.6/815893df5f31da2ece4040fe0a12fd44b577afaf/commons-io-2.6.jar
modules-2/files-2.1/org.apache.cxf/cxf-core/3.1.8/ee4ce7041b155667bd920ba19bcf861755814695/cxf-core-3.1.8.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.cxf/cxf-core/3.1.8/ee4ce7041b155667bd920ba19bcf861755814695/cxf-co
modules-2/files-2.1/org.apache.cxf/cxf-core/3.1.8/ee4ce7041b155667bd920ba19bcf861755814695/cxf-core-3.1.8.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.cxf/cxf-core/3.1.8/ee4ce7041b155667bd920ba19bcf861755814695/cxf-co
ss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.groovy/groovy/2.4.12/a43be367110c491787219f1c128b5b5fc54f1e70/g
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee0
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.uima/uimaj-core/3.0.1/c8a65f574abdffc05ddf97f9f31bf309ee3da18a/uima
ss-scanner/.gradle/caches/modules-2/files-2.1/com.google.code.gson/gson/2.8.6/9180733b7df8542621dc12e21e87557e8c99b8cb/gs
s-2/files-2.1/com.google.code.gson/gson/2.8.6/9180733b7df8542621dc12e21e87557e8c99b8cb/gson-2.8.6.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/com.google.code.gson/gson/2.8.6/9180733b7df8542621dc12e21e87557e8c99b8cb/gs
s-2/files-2.1/com.google.code.gson/gson/2.8.6/9180733b7df8542621dc12e21e87557e8c99b8cb/gson-2.8.6.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-expression/5.1.9.RELEASE/db3a2468c1b7d697ec3b3ec6e
scm/sp-odata/nginx-gateway/tableau-web-data-connector/node_modules/follow-redirects/package.json
scm/sp-odata/nginx-gateway/tableau-web-data-connector/node_modules/follow-redirects/package.json
ss-scanner/.gradle/caches/modules-2/files-2.1/ch.qos.logback/logback-core/1.1.3/e3c02049f2dbbc764681b40094ecf0dcbc99b157/lo
ss-scanner/.gradle/caches/modules-2/files-2.1/ch.qos.logback/logback-core/1.1.3/e3c02049f2dbbc764681b40094ecf0dcbc99b157/lo
ss-scanner/.gradle/caches/modules-2/files-2.1/org.infinispan/infinispan-core/8.2.4.Final/cf2d0e1558c461981b08ade2233b47eefe3bb
ss-scanner/.gradle/caches/modules-2/files-2.1/com.drewnoakes/metadata-extractor/2.11.0/5f11883f6d06a16ca5fb8a9edf7c6c1237a
ss-scanner/.gradle/caches/modules-2/files-2.1/com.drewnoakes/metadata-extractor/2.11.0/5f11883f6d06a16ca5fb8a9edf7c6c1237a
ss-scanner/.gradle/caches/modules-2/files-2.1/com.drewnoakes/metadata-extractor/2.11.0/5f11883f6d06a16ca5fb8a9edf7c6c1237a
ss-scanner/.gradle/caches/modules-2/files-2.1/org.bouncycastle/bcprov-jdk15/1.46/d726ceb2dcc711ef066cc639c12d856128ea1ef1/b
ss-scanner/.gradle/caches/modules-2/files-2.1/org.bouncycastle/bcprov-jdk15/1.46/d726ceb2dcc711ef066cc639c12d856128ea1ef1/b
ss-scanner/.gradle/caches/modules-2/files-2.1/org.bouncycastle/bcprov-jdk15/1.46/d726ceb2dcc711ef066cc639c12d856128ea1ef1/b
ss-scanner/.gradle/caches/modules-2/files-2.1/org.bouncycastle/bcprov-jdk15/1.46/d726ceb2dcc711ef066cc639c12d856128ea1ef1/b
ss-scanner/.gradle/caches/modules-2/files-2.1/org.bouncycastle/bcprov-jdk15/1.46/d726ceb2dcc711ef066cc639c12d856128ea1ef1/b
ss-scanner/.gradle/caches/modules-2/files-2.1/org.bouncycastle/bcprov-jdk15/1.46/d726ceb2dcc711ef066cc639c12d856128ea1ef1/b
ss-scanner/.gradle/caches/modules-2/files-2.1/org.bouncycastle/bcprov-jdk15/1.46/d726ceb2dcc711ef066cc639c12d856128ea1ef1/b
ss-scanner/.gradle/caches/modules-2/files-2.1/org.bouncycastle/bcprov-jdk15/1.46/d726ceb2dcc711ef066cc639c12d856128ea1ef1/b
ss-scanner/.gradle/caches/modules-2/files-2.1/org.bouncycastle/bcprov-jdk15/1.46/d726ceb2dcc711ef066cc639c12d856128ea1ef1/b
ss-scanner/.gradle/caches/modules-2/files-2.1/org.bouncycastle/bcprov-jdk15/1.46/d726ceb2dcc711ef066cc639c12d856128ea1ef1/b
ss-scanner/.gradle/caches/modules-2/files-2.1/org.bouncycastle/bcprov-jdk15/1.46/d726ceb2dcc711ef066cc639c12d856128ea1ef1/b
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tika/tika-core/1.20/85888f238720b062c551df5e2a9c943788010e33/tika-c
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tika/tika-core/1.20/85888f238720b062c551df5e2a9c943788010e33/tika-c
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tika/tika-core/1.20/85888f238720b062c551df5e2a9c943788010e33/tika-c
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tika/tika-core/1.20/85888f238720b062c551df5e2a9c943788010e33/tika-c
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tika/tika-core/1.20/85888f238720b062c551df5e2a9c943788010e33/tika-c
modules-2/files-2.1/org.apache.cxf/cxf-rt-frontend-jaxrs/3.1.8/a58499638e478c1ea26713351c3bebc7b0e9f7da/cxf-rt-frontend-jaxrs-3
modules-2/files-2.1/org.apache.poi/poi-ooxml/4.0.1/9ec84728bf4236b8f9ec7fef3fe1b705eef2b408/poi-ooxml-4.0.1.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.groovy/groovy-all/1.8.9/5396699e9d96c5c75d75ae95aa49acd5af048aac
ss-scanner/.gradle/caches/modules-2/files-2.1/org.codehaus.groovy/groovy-all/1.8.9/5396699e9d96c5c75d75ae95aa49acd5af048aac
ss-scanner/.gradle/caches/modules-2/files-2.1/xalan/xalan/2.7.1/75f1d83ce27bab5f29fff034fc74aa9f7266f22a/xalan-2.7.1.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/xalan/xalan/2.7.1/75f1d83ce27bab5f29fff034fc74aa9f7266f22a/xalan-2.7.1.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.18/1191f9f2bc0c47a8cce69193feb1ff0a8
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.18/1191f9f2bc0c47a8cce69193feb1ff0a8
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.18/1191f9f2bc0c47a8cce69193feb1ff0a8
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.18/1191f9f2bc0c47a8cce69193feb1ff0a8
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.18/1191f9f2bc0c47a8cce69193feb1ff0a8
t/node_modules/tinymce/package.json
t/node_modules/tinymce/package.json
t/node_modules/tinymce/package.json
t/node_modules/tinymce/package.json
t/node_modules/tinymce/package.json
t/node_modules/tinymce/package.json
t/node_modules/tinymce/package.json
t/node_modules/tinymce/package.json
t/node_modules/tinymce/package.json
ss-scanner/.m2/repository/org/bouncycastle/bcprov-jdk15on/1.64/bcprov-jdk15on-1.64.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/commons-fileupload/commons-fileupload/1.3.3/4ff14d809195b711fd6bcc87e6777f88
modules-2/files-2.1/commons-fileupload/commons-fileupload/1.3.3/4ff14d809195b711fd6bcc87e6777f886730ca1/commons-fileuplo
ss-scanner/.m2/repository/commons-codec/commons-codec/1.6/commons-codec-1.6.jar

scm/sp-odata/utils/dynamodb_csv/node_modules/ansi-regex/package.json
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-beans/5.1.9.RELEASE/5a03b3983108d73978aec2fa3e681a
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-beans/5.1.9.RELEASE/5a03b3983108d73978aec2fa3e681a
modules-2/files-2.1/org.apache.cxf/cxf-rt-ws-security/3.1.8/b6acfde85e6e22b662054ee23de59635b8d7be51/cxf-rt-ws-security-3.1.8.j
ss-scanner/.m2/repository/ch/qos/logback/logback-core/1.2.3/logback-core-1.2.3.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/ch.qos.logback/logback-core/1.2.3/864344400c3d4d92dfeb0a305dc87d953677c03c/lo
ss-scanner/.gradle/caches/modules-2/files-2.1/com.beust/jcommander/1.35/47592e181b0bdbbeb63029e08c5e74f6803c4edd/jcomm
ss-scanner/.m2/repository/ch/qos/logback/logback-classic/1.2.3/logback-classic-1.2.3.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/ch.qos.logback/logback-classic/1.2.3/7c4f3c474fb2c041d8028740440937705ebb473a/
ootstrap/js/bootstrap.js
ootstrap/js/bootstrap.js
ootstrap/js/bootstrap.js
ootstrap/js/bootstrap.js
ootstrap/js/bootstrap.js
ootstrap/js/bootstrap.js
t/node_modules/moment/package.json
t/node_modules/moment/package.json
ss-scanner/.nuget/packages/microsoft.aspnetcore.authentication.jwtbearer/3.1.3/microsoft.aspnetcore.authentication.jwtbearer.3.1.
kages/microsoft.aspnetcore.authentication.jwtbearer/3.1.3/microsoft.aspnetcore.authentication.jwtbearer.3.1.3.nupkg
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.santuario/xmlsec/1.5.6/586cd437eaf166640b632eb6cfcfec2ebf52474/xml
query/jquery-3.4.1.min.js
ml/api/../../js/jquery/jquery-3.4.1.min.js
query/jquery-3.4.1.min.js
ml/api/../../js/jquery/jquery-3.4.1.min.js
modules-2/files-2.1/com.spigit.dependencies/xercesImpl/2.8.0/cfd3ebe2f8034e660344f9108c3e2daf78c29cc3/xercesImpl-2.8.0.jar
modules-2/files-2.1/com.spigit.dependencies/xercesImpl/2.8.0/cfd3ebe2f8034e660344f9108c3e2daf78c29cc3/xercesImpl-2.8.0.jar
modules-2/files-2.1/com.spigit.dependencies/xercesImpl/2.8.0/cfd3ebe2f8034e660344f9108c3e2daf78c29cc3/xercesImpl-2.8.0.jar
modules-2/files-2.1/com.spigit.dependencies/xercesImpl/2.8.0/cfd3ebe2f8034e660344f9108c3e2daf78c29cc3/xercesImpl-2.8.0.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.httpcomponents/httpclient/4.5.9/a25c1be5ce99d0ce99aa43eb982868c796
ss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.10.0/jackson-databind-2.10.0.jar
ss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.10.0/jackson-databind-2.10.0.jar
ss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.10.0/jackson-databind-2.10.0.jar
ss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.10.0/jackson-databind-2.10.0.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-hdfs-client/3.2.0/c56a99b3043755b5506cfd85f11d53bd61
ss-scanner/.gradle/caches/modules-2/files-2.1/jdom/jdom/1.0/a2ac1cd690ab4c80defe7f9bce14d35934c35cec/jdom-1.0.jar
ory/org/postgresql/postgresql/42.2.12/postgresql-42.2.12.jar
ory/org/postgresql/postgresql/42.2.12/postgresql-42.2.12.jar
ory/org/postgresql/postgresql/42.2.12/postgresql-42.2.12.jar
ory/org/postgresql/postgresql/42.2.12/postgresql-42.2.12.jar
ory/org/postgresql/postgresql/42.2.12/postgresql-42.2.12.jar
ory/org/postgresql/postgresql/42.2.12/postgresql-42.2.12.jar
modules-2/files-2.1/org.apache.activemq/activemq-core/5.4.2/66b94d7473a3e80379f99527cf5187f5042041/activemq-core-5.4.2.jar
modules-2/files-2.1/org.apache.activemq/activemq-core/5.4.2/66b94d7473a3e80379f99527cf5187f5042041/activemq-core-5.4.2.jar
modules-2/files-2.1/org.apache.activemq/activemq-core/5.4.2/66b94d7473a3e80379f99527cf5187f5042041/activemq-core-5.4.2.jar
modules-2/files-2.1/org.apache.activemq/activemq-core/5.4.2/66b94d7473a3e80379f99527cf5187f5042041/activemq-core-5.4.2.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/ant/ant/1.5/dcab88fc2a043c2479a6de676a2f8179e9ea2167/ant-1.5.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/ant/ant/1.5/dcab88fc2a043c2479a6de676a2f8179e9ea2167/ant-1.5.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/ant/ant/1.5/dcab88fc2a043c2479a6de676a2f8179e9ea2167/ant-1.5.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/ant/ant/1.5/dcab88fc2a043c2479a6de676a2f8179e9ea2167/ant-1.5.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/ant/ant/1.5/dcab88fc2a043c2479a6de676a2f8179e9ea2167/ant-1.5.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-core/5.1.9.RELEASE/dc3815439579b4fa0c19970e6b8e5d7
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-core/5.1.9.RELEASE/dc3815439579b4fa0c19970e6b8e5d7
ss-scanner/.gradle/caches/modules-2/files-2.1/ca.juliusdavies/not-yet-commons-ssl/0.3.9/e20f0960c000681c91d00de846a43cf2051b
t/node_modules/bootstrap/package.json
t/node_modules/bootstrap/package.json
t/node_modules/bootstrap/package.json
t/node_modules/bootstrap/package.json
t/node_modules/bootstrap/package.json
t/node_modules/bootstrap/package.json
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-web/5.1.9.RELEASE/9fe4390420fdd0b63dc4ed90d9027da
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-web/5.1.9.RELEASE/9fe4390420fdd0b63dc4ed90d9027da
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-web/5.1.9.RELEASE/9fe4390420fdd0b63dc4ed90d9027da
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-web/5.1.9.RELEASE/9fe4390420fdd0b63dc4ed90d9027da
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-webmvc/5.1.9.RELEASE/b9d4a2140488f0e6f9aa231e7938
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
om/fasterxml/jackson/core/jackson-databind/2.1.2/jackson-databind-2.1.2.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.cxf/cxf-rt-security/3.1.8/a31591e3a3a88ef0b2246c051753b909ca8b4edb/c
kages/microsoft.visualstudio.azure.containers.tools.targets/1.9.10/microsoft.visualstudio.azure.containers.tools.targets.1.9.10.nupkg
ss-scanner/.nuget/packages/microsoft.visualstudio.azure.containers.tools.targets/1.9.10/microsoft.visualstudio.azure.containers.tools
ss-scanner/.nuget/packages/microsoft.visualstudio.web.codegenerators.mvc/3.1.0/microsoft.visualstudio.web.codegenerators.mvc.3
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.pdfbox/pdfbox/2.0.13/389abca354e682d65e500c57856b75130d015e77/p
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.pdfbox/pdfbox/2.0.13/389abca354e682d65e500c57856b75130d015e77/p
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.pdfbox/pdfbox/2.0.13/389abca354e682d65e500c57856b75130d015e77/p
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.pdfbox/pdfbox/2.0.13/389abca354e682d65e500c57856b75130d015e77/p
modules-2/files-2.1/org.springframework/spring-web/5.2.20.RELEASE/1627626a75b4ea71b0b2881ebed8b56729ba621b/spring-web-5
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-web/5.2.20.RELEASE/1627626a75b4ea71b0b2881ebed8b
om/fasterxml/jackson/core/jackson-core/2.1.2/jackson-core-2.1.2.jar
om/fasterxml/jackson/core/jackson-core/2.1.2/jackson-core-2.1.2.jar
peui/jquery.validate.min.js
scm/spigit_engage/cypress-ui-tests/node_modules/jsonpointer/package.json
scm/spigit_engage/cypress-ui-tests/node_modules/jsonpointer/package.json
ss-scanner/.gradle/caches/modules-2/files-2.1/org.infinispan/infinispan-client-hotrod/8.2.4.Final/343f41e8410be0a233e752ef5ed874
ss-scanner/.gradle/caches/modules-2/files-2.1/org.infinispan/infinispan-client-hotrod/8.2.4.Final/343f41e8410be0a233e752ef5ed874
ss-scanner/.gradle/caches/modules-2/files-2.1/org.jsoup/jsoup/1.11.3/36da09a8f68484523fa2aaa100399d612b247d67/jsoup-1.11.3.
ss-scanner/.gradle/caches/modules-2/files-2.1/org.jsoup/jsoup/1.11.3/36da09a8f68484523fa2aaa100399d612b247d67/jsoup-1.11.3.

modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8cac79275b9c8ff4a/jackson-da
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8ca
modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8cac79275b9c8ff4a/jackson-da
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8ca
modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8cac79275b9c8ff4a/jackson-da
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8ca
modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8cac79275b9c8ff4a/jackson-da
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8ca
modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8cac79275b9c8ff4a/jackson-da
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8ca
modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8cac79275b9c8ff4a/jackson-da
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8ca
modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8cac79275b9c8ff4a/jackson-da
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8ca
modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8cac79275b9c8ff4a/jackson-da
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8ca
modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8cac79275b9c8ff4a/jackson-da
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8ca
modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8cac79275b9c8ff4a/jackson-da
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8ca
modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8cac79275b9c8ff4a/jackson-da
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8ca
modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8cac79275b9c8ff4a/jackson-da
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8ca
modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8cac79275b9c8ff4a/jackson-da
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8ca
modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8cac79275b9c8ff4a/jackson-da
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8ca
modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8cac79275b9c8ff4a/jackson-da
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8ca
modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8cac79275b9c8ff4a/jackson-da
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8ca
modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8cac79275b9c8ff4a/jackson-da
ss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.10.6/fbe40c0535b836082be7e3f8ca
modules-2/files-2.1/org.springframework/spring-core/5.2.20.RELEASE/dc30db13da2fbed2fd6a710a431c252c48aed682/spring-core-5.2
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-core/5.2.20.RELEASE/dc30db13da2fbed2fd6a710a431c25
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-client/9.4.14.v20181114/1c46b088e1119928d54ff704fe38fe1b6
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-util/9.4.14.v20181114/5bb3d7a38f7ea54138336591d89dd5867b
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-server/9.4.14.v20181114/b36a3d52d78a1df6406f6fa236a6eeff4
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-server/9.4.14.v20181114/b36a3d52d78a1df6406f6fa236a6eeff4
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-server/9.4.14.v20181114/b36a3d52d78a1df6406f6fa236a6eeff4
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-server/9.4.14.v20181114/b36a3d52d78a1df6406f6fa236a6eeff4
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-server/9.4.14.v20181114/b36a3d52d78a1df6406f6fa236a6eeff4
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-server/9.4.14.v20181114/b36a3d52d78a1df6406f6fa236a6eeff4
ss-scanner/.m2/repository/io/netty/netty-handler/4.1.42.Final/netty-handler-4.1.42.Final.jar
ss-scanner/.m2/repository/io/netty/netty-handler/4.1.42.Final/netty-handler-4.1.42.Final.jar
rements.txt
scm/sp-odata/etl/requirements.txt
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-websocket/9.0.22/45974d3443cc15ad9d10
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.velocity/velocity/1.7/2ceb567b8f3f21118ecdec129fe1271dbc09aa7a/veloc
ss-scanner/.gradle/caches/modules-2/files-2.1/org.jdom/jdom2/2.0.6/6f14738ec2e9dd0011e343717fa624a10f8aab64/jdom2-2.0.6.ja
peui/tinymce/tinymce.min.js
peui/tinymce/tinymce.min.js
peui/tinymce/tinymce.min.js
peui/tinymce/tinymce.min.js
peui/tinymce/tinymce.min.js
peui/tinymce/tinymce.min.js
peui/tinymce/tinymce.min.js
peui/tinymce/tinymce.min.js
peui/tinymce/tinymce.min.js
peui/tinymce/tinymce.min.js
peui/tinymce/jquery.tinymce.min.js
peui/tinymce/jquery.tinymce.min.js
peui/tinymce/jquery.tinymce.min.js
peui/tinymce/jquery.tinymce.min.js
peui/tinymce/jquery.tinymce.min.js
peui/tinymce/jquery.tinymce.min.js
peui/tinymce/jquery.tinymce.min.js
ss-scanner/.m2/repository/io/netty/netty-common/4.1.42.Final/netty-common-4.1.42.Final.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/commons-httpclient/commons-httpclient/3.1/964cd74171f427720480efdec40a7c7f6e
ce/EmbeddedService/Planview.PowerBIEmbedded.Web/wwwroot/lib/jquery/dist/jquery.js
ce/EmbeddedService/Planview.PowerBIEmbedded.Web/wwwroot/lib/jquery/dist/jquery.js
ce/EmbeddedService/Planview.PowerBIEmbedded.Web/wwwroot/lib/jquery/dist/jquery.js
ss-scanner/.m2/repository/io/netty/netty-codec-http2/4.1.42.Final/netty-codec-http2-4.1.42.Final.jar
ss-scanner/.m2/repository/io/netty/netty-codec-http2/4.1.42.Final/netty-codec-http2-4.1.42.Final.jar
ce/EmbeddedService/Planview.PowerBIEmbedded.Web/wwwroot/lib/jquery/dist/jquery.min.js
ce/EmbeddedService/Planview.PowerBIEmbedded.Web/wwwroot/lib/jquery/dist/jquery.min.js
ce/EmbeddedService/Planview.PowerBIEmbedded.Web/wwwroot/lib/jquery/dist/jquery.min.js
ss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.42.Final/netty-codec-http-4.1.42.Final.jar
ss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.42.Final/netty-codec-http-4.1.42.Final.jar
ss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.42.Final/netty-codec-http-4.1.42.Final.jar
ss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.42.Final/netty-codec-http-4.1.42.Final.jar
ss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.42.Final/netty-codec-http-4.1.42.Final.jar
ss-scanner/.m2/repository/io/netty/netty-codec-http/4.1.42.Final/netty-codec-http-4.1.42.Final.jar
t/node_modules/@angular/core/package.json
ss-scanner/.m2/repository/io/netty/netty-codec/4.1.42.Final/netty-codec-4.1.42.Final.jar
ss-scanner/.m2/repository/io/netty/netty-codec/4.1.42.Final/netty-codec-4.1.42.Final.jar
ss-scanner/.m2/repository/io/netty/netty-codec/4.1.42.Final/netty-codec-4.1.42.Final.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/com.google.protobuf/protobuf-java/3.6.1/d06d46ecfd92ec6d0f3b423b4cd81cb38d8b9
ss-scanner/.gradle/caches/modules-2/files-2.1/com.google.protobuf/protobuf-java/3.6.1/d06d46ecfd92ec6d0f3b423b4cd81cb38d8b9
ss-scanner/.gradle/caches/modules-2/files-2.1/com.google.protobuf/protobuf-java/3.6.1/d06d46ecfd92ec6d0f3b423b4cd81cb38d8b9
kages/newtonsoft.json/12.0.3/newtonsoft.json.12.0.3.nupkg
ss-scanner/.nuget/packages/newtonsoft.json/12.0.3/newtonsoft.json.12.0.3.nupkg
t/node_modules/chart.js/package.json
ss-scanner/.gradle/caches/modules-2/files-2.1/org.owasp.esapi/esapi/2.0.1/2ea3b87c948dbc0c77a17fe24fda961ecc38c6f2/esapi-2.0
ss-scanner/.gradle/caches/modules-2/files-2.1/org.owasp.esapi/esapi/2.0.1/2ea3b87c948dbc0c77a17fe24fda961ecc38c6f2/esapi-2.0
ss-scanner/.gradle/caches/modules-2/files-2.1/org.owasp.esapi/esapi/2.0.1/2ea3b87c948dbc0c77a17fe24fda961ecc38c6f2/esapi-2.0
ss-scanner/.gradle/caches/modules-2/files-2.1/org.owasp.esapi/esapi/2.0.1/2ea3b87c948dbc0c77a17fe24fda961ecc38c6f2/esapi-2.0
ootstrap/js/bootstrap.min.js
ootstrap/js/bootstrap.min.js
ootstrap/js/bootstrap.min.js
ootstrap/js/bootstrap.min.js
ootstrap/js/bootstrap.min.js
ootstrap/js/bootstrap.min.js
scm/spigit_engage/src/mobile/bower_components/angular/.bower.json (Matched by filename)
scm/spigit_engage/src/mobile/bower_components/angular/.bower.json (Matched by filename)
ss-scanner/.gradle/caches/modules-2/files-2.1/com.github.junrar/junrar/2.0.0/db1f89ba102d1375c6a9d481ebc0e8cd880ab16d/junra
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework.boot/spring-boot/2.1.7.RELEASE/1599a2ad1fc6d36dbfc2a7c0dd5
modules-2/files-2.1/org.apache.solr/solr-core/8.1.0/bdb0d0f7b26a64e48283fa32edca874020f634f6/solr-core-8.1.0.jar
modules-2/files-2.1/org.apache.solr/solr-core/8.1.0/bdb0d0f7b26a64e48283fa32edca874020f634f6/solr-core-8.1.0.jar
modules-2/files-2.1/org.apache.solr/solr-core/8.1.0/bdb0d0f7b26a64e48283fa32edca874020f634f6/solr-core-8.1.0.jar
modules-2/files-2.1/org.apache.solr/solr-core/8.1.0/bdb0d0f7b26a64e48283fa32edca874020f634f6/solr-core-8.1.0.jar
modules-2/files-2.1/org.apache.solr/solr-core/8.1.0/bdb0d0f7b26a64e48283fa32edca874020f634f6/solr-core-8.1.0.jar
modules-2/files-2.1/org.apache.solr/solr-core/8.1.0/bdb0d0f7b26a64e48283fa32edca874020f634f6/solr-core-8.1.0.jar
g/apache/httpcomponents/httpclient/4.2.2/httpclient-4.2.2.jar
g/apache/httpcomponents/httpclient/4.2.2/httpclient-4.2.2.jar
g/apache/httpcomponents/httpclient/4.2.2/httpclient-4.2.2.jar
g/apache/httpcomponents/httpclient/4.2.2/httpclient-4.2.2.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/org.simpleframework/simple-xml/2.7.1/dd91fb744c2ff921407475cb29a1e3fee397d41
ss-scanner/.nuget/packages/system.text.encodings.web/4.5.0/system.text.encodings.web.4.5.0.nupkg
ss-scanner/.nuget/packages/system.text.regularexpressions/4.3.0/system.text.regularexpressions.4.3.0.nupkg
modules-2/files-2.1/org.apache.cxf/cxf-rt-transports-http/3.1.8/2452ff461b93f99c5e971d6e14c99f277c353919/cxf-rt-transports-http-3
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.cxf/cxf-rt-transports-http/3.1.8/2452ff461b93f99c5e971d6e14c99f277c353
modules-2/files-2.1/org.apache.cxf/cxf-rt-transports-http/3.1.8/2452ff461b93f99c5e971d6e14c99f277c353919/cxf-rt-transports-http-3
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.cxf/cxf-rt-transports-http/3.1.8/2452ff461b93f99c5e971d6e14c99f277c353
modules-2/files-2.1/org.apache.cxf/cxf-rt-transports-http/3.1.8/2452ff461b93f99c5e971d6e14c99f277c353919/cxf-rt-transports-http-3
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.cxf/cxf-rt-transports-http/3.1.8/2452ff461b93f99c5e971d6e14c99f277c353
ss-scanner/.gradle/caches/modules-2/files-2.1/org.eclipse.jetty/jetty-servlets/9.4.14.v20181114/38cfc07b53e5d285bb2fca78bb25315
modules-2/files-2.1/com.google.guava/guava/25.1-jre/6c57e4b22b44e89e548b5c9f70f0c45fe10fb0b4/guava-25.1-jre.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/com.google.guava/guava/25.1-jre/6c57e4b22b44e89e548b5c9f70f0c45fe10fb0b4/gua
peui/underscore-min.js
amodb_csv/node_modules/async/package.json
modules-2/files-2.1/com.google.code.gson/gson/2.8.5/f645ed69d595b24d4cf8b3fbb64cc505bede8829/gson-2.8.5.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/com.google.code.gson/gson/2.8.5/f645ed69d595b24d4cf8b3fbb64cc505bede8829/gso
modules-2/files-2.1/com.google.code.gson/gson/2.8.5/f645ed69d595b24d4cf8b3fbb64cc505bede8829/gson-2.8.5.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/com.google.code.gson/gson/2.8.5/f645ed69d595b24d4cf8b3fbb64cc505bede8829/gso
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.calcite.avatica/avatica-core/1.13.0/bae68362b6020d6da93ad9abfa6a44ed
ss-scanner/.gradle/caches/modules-2/files-2.1/org.json/json/20171018/36ced462c97f0845b4a7b266a25cebe95d18baa3/json-201710
ss-scanner/.nuget/packages/newtonsoft.json/11.0.2/newtonsoft.json.11.0.2.nupkg
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.calcite/calcite-core/1.18.0/814f5395cb0af71d6d7eb304a94a2c5365e4929c
scm/spigit_engage/cypress-ui-tests/node_modules/ramda/package.json
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.httpcomponents/httpclient/4.5.6/1afe5621985efe90a92d0fbc9be86271efb
teway/tableau-web-data-connector/node_modules/axios/package.json
modules-2/files-2.1/org.apache.tika/tika-parsers/1.20/942229f0753f74b29d34ac1850e71fc0b99386c3/tika-parsers-1.20.jar
modules-2/files-2.1/org.apache.tika/tika-parsers/1.20/942229f0753f74b29d34ac1850e71fc0b99386c3/tika-parsers-1.20.jar
modules-2/files-2.1/org.apache.tika/tika-parsers/1.20/942229f0753f74b29d34ac1850e71fc0b99386c3/tika-parsers-1.20.jar
modules-2/files-2.1/org.apache.tika/tika-parsers/1.20/942229f0753f74b29d34ac1850e71fc0b99386c3/tika-parsers-1.20.jar
modules-2/files-2.1/org.apache.tika/tika-parsers/1.20/942229f0753f74b29d34ac1850e71fc0b99386c3/tika-parsers-1.20.jar
modules-2/files-2.1/org.apache.tika/tika-parsers/1.20/942229f0753f74b29d34ac1850e71fc0b99386c3/tika-parsers-1.20.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/net.minidev/json-smart/2.3/7396407491352ce4fa30de92efb158adb76b5b/json-smart
ss-scanner/.gradle/caches/modules-2/files-2.1/net.minidev/json-smart/2.3/7396407491352ce4fa30de92efb158adb76b5b/json-smart
amodb_csv/node_modules/aws-sdk/package.json
ory/org/hsqldb/hsqldb/2.5.1/hsqldb-2.5.1.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/3.2.0/e47a88c42c450e6e4b23bf951356c203cae
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.hadoop/hadoop-common/3.2.0/e47a88c42c450e6e4b23bf951356c203cae
ce/EmbeddedService/Planview.PowerBIEmbedded.Web/wwwroot/lib/jquery-validation/dist/jquery.validate.min.js
ss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.23/ec62d74fe50689c28c0ff5b35d3aebcaa8b5be68/snakeyaml-
ss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.23/ec62d74fe50689c28c0ff5b35d3aebcaa8b5be68/snakeyaml-
ss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.23/ec62d74fe50689c28c0ff5b35d3aebcaa8b5be68/snakeyaml-
ss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.23/ec62d74fe50689c28c0ff5b35d3aebcaa8b5be68/snakeyaml-
ss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.23/ec62d74fe50689c28c0ff5b35d3aebcaa8b5be68/snakeyaml-
ss-scanner/.gradle/caches/modules-2/files-2.1/org.yaml/snakeyaml/1.23/ec62d74fe50689c28c0ff5b35d3aebcaa8b5be68/snakeyaml-
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/9.0.22/79f39903498b28adacb18fe2ea
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/9.0.22/79f39903498b28adacb18fe2ea
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/9.0.22/79f39903498b28adacb18fe2ea
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/9.0.22/79f39903498b28adacb18fe2ea
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/9.0.22/79f39903498b28adacb18fe2ea
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/9.0.22/79f39903498b28adacb18fe2ea
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/9.0.22/79f39903498b28adacb18fe2ea
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/9.0.22/79f39903498b28adacb18fe2ea
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/9.0.22/79f39903498b28adacb18fe2ea
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/9.0.22/79f39903498b28adacb18fe2ea
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/9.0.22/79f39903498b28adacb18fe2ea
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/9.0.22/79f39903498b28adacb18fe2ea
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/9.0.22/79f39903498b28adacb18fe2ea
ss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-text/1.6/ba72cf0c40cf701e972fe7720ae844629f4ecc
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-beans/5.2.20.RELEASE/c8fe5b917bb711c390dd826beb95
modules-2/files-2.1/org.springframework/spring-beans/5.2.20.RELEASE/c8fe5b917bb711c390dd826beb953c3cead5407b/spring-beans
modules-2/files-2.1/org.opensaml/opensaml/2.6.1/66992ce167f18e4552b79bc38d412f53ad2d80a1/opensaml-2.6.1.jar
modules-2/files-2.1/org.opensaml/opensaml/2.6.1/66992ce167f18e4552b79bc38d412f53ad2d80a1/opensaml-2.6.1.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/commons-codec/commons-codec/1.11/3acb4705652e16236558f0f4f2192cc33c3bd18
modules-2/files-2.1/commons-codec/commons-codec/1.11/3acb4705652e16236558f0f4f2192cc33c3bd189/commons-codec-1.11.jar
ss-scanner/.gradle/caches/modules-2/files-2.1/commons-codec/commons-codec/1.11/3acb4705652e16236558f0f4f2192cc33c3bd18
ss-scanner/.gradle/caches/modules-2/files-2.1/org.jgroups/jgroups/3.6.7.Final/86e692356d69903715f615f168060fad21e1e70d/jgrou
scm/sp-odata/etl-scheduler/requirements.txt
duler/requirements.txt
t/node_modules/ajv/package.json
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-context/5.2.20.RELEASE/9bee402974a41fdf2c8e93f63a42
ss-scanner/.gradle/caches/modules-2/files-2.1/org.springframework/spring-messaging/5.2.20.RELEASE/d7cfaab9bfc0a5a140301672a5
6a8d4b9344cc864404ec7062bb3cab/spring-beans-3.0.3.RELEASE.jar
6a8d4b9344cc864404ec7062bb3cab/spring-beans-3.0.3.RELEASE.jar
504c1ba863676df8b79175cf77a084a/spring-core-3.0.3.RELEASE.jar
504c1ba863676df8b79175cf77a084a/spring-core-3.0.3.RELEASE.jar
504c1ba863676df8b79175cf77a084a/spring-core-3.0.3.RELEASE.jar
504c1ba863676df8b79175cf77a084a/spring-core-3.0.3.RELEASE.jar
504c1ba863676df8b79175cf77a084a/spring-core-3.0.3.RELEASE.jar
0e029cd7c88d6de405ea7114e075d09d9/spring-context-3.0.3.RELEASE.jar
0e029cd7c88d6de405ea7114e075d09d9/spring-context-3.0.3.RELEASE.jar
b5e7736bc3e95eb58623aa9ccdb475/jetty-webapp-9.4.14.v20181114.jar
93245610/jasypt-1.6.jar
60a90cbf4db91240bb585733e33b1a55110f/http2-server-9.4.14.v20181114.jar
0ca2201ad531983cc3a8e2a82153268828d025/http2-common-9.4.14.v20181114.jar
0ca2201ad531983cc3a8e2a82153268828d025/http2-common-9.4.14.v20181114.jar
0ca2201ad531983cc3a8e2a82153268828d025/http2-common-9.4.14.v20181114.jar
0ca2201ad531983cc3a8e2a82153268828d025/http2-common-9.4.14.v20181114.jar
0ca2201ad531983cc3a8e2a82153268828d025/http2-common-9.4.14.v20181114.jar
0ca2201ad531983cc3a8e2a82153268828d025/http2-common-9.4.14.v20181114.jar
0ca2201ad531983cc3a8e2a82153268828d025/http2-common-9.4.14.v20181114.jar
0ca2201ad531983cc3a8e2a82153268828d025/http2-common-9.4.14.v20181114.jar

02b873e42d2e3d905507fa6a7b25d834579f/spring-expression-3.0.3.RELEASE.jar
94ae7b5032438eb4579c2a47f4fe/jetty-http-9.4.14.v20181114.jar
94ae7b5032438eb4579c2a47f4fe/jetty-http-9.4.14.v20181114.jar
94ae7b5032438eb4579c2a47f4fe/jetty-http-9.4.14.v20181114.jar
3055fc4a103ab347c56e7da5a143d68a0170/hibernate-validator-6.0.17.Final.jar
3055fc4a103ab347c56e7da5a143d68a0170/hibernate-validator-6.0.17.Final.jar
d9e63f8928287c8b0860/asciidoctorj-1.5.3.2.jar
ciidoctorj-1.5.3.2.jar
f425190ff7b63e387692c1aa3af2c8/jetty-servlet-9.4.14.v20181114.jar

3a75777d89b0be59fcef3f7637/jetty-io-9.4.14.v20181114.jar

e8303b2e2ff3e61c122ea7a268705/infinispan-commons-8.2.4.Final.jar
a12fd44b577afaf/commons-io-2.6.jar
-io-2.6.jar
-3.1.8.jar
9bcf861755814695/cxf-core-3.1.8.jar
-3.1.8.jar
9bcf861755814695/cxf-core-3.1.8.jar
19f1c128b5b5fc54f1e70/groovy-2.4.12.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
17d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar
f9f31bf309ee3da18a/uimaj-core-3.0.1.jar
2e21e87557e8c99b8cb/gson-2.8.6.jar
.jar
2e21e87557e8c99b8cb/gson-2.8.6.jar
.jar
2468c1b7d697ec3b3ec6e5652dc282994fe3/spring-expression-5.1.9.RELEASE.jar

40094ecf0dcbc99b157/logback-core-1.1.3.jar
40094ecf0dcbc99b157/logback-core-1.1.3.jar
1b08ade2233b47eefe3bbe07/infinispan-core-8.2.4.Final.jar
a16ca5fb8a9edf7c6c1237a92da0/metadata-extractor-2.11.0.jar
a16ca5fb8a9edf7c6c1237a92da0/metadata-extractor-2.11.0.jar
a16ca5fb8a9edf7c6c1237a92da0/metadata-extractor-2.11.0.jar
cc639c12d856128ea1ef1/bcprov-jdk15-1.46.jar
cc639c12d856128ea1ef1/bcprov-jdk15-1.46.jar
cc639c12d856128ea1ef1/bcprov-jdk15-1.46.jar
cc639c12d856128ea1ef1/bcprov-jdk15-1.46.jar
cc639c12d856128ea1ef1/bcprov-jdk15-1.46.jar
cc639c12d856128ea1ef1/bcprov-jdk15-1.46.jar
cc639c12d856128ea1ef1/bcprov-jdk15-1.46.jar
cc639c12d856128ea1ef1/bcprov-jdk15-1.46.jar
cc639c12d856128ea1ef1/bcprov-jdk15-1.46.jar
cc639c12d856128ea1ef1/bcprov-jdk15-1.46.jar
cc639c12d856128ea1ef1/bcprov-jdk15-1.46.jar
2a9c943788010e33/tika-core-1.20.jar
2a9c943788010e33/tika-core-1.20.jar
2a9c943788010e33/tika-core-1.20.jar
2a9c943788010e33/tika-core-1.20.jar
2a9c943788010e33/tika-core-1.20.jar
7da/cxf-rt-frontend-jaxrs-3.1.8.jar

75ae95aa49acd5af048aac/groovy-all-1.8.9.jar
75ae95aa49acd5af048aac/groovy-all-1.8.9.jar
22a/xalan-2.7.1.jar
22a/xalan-2.7.1.jar
0c47a8cce69193feb1ff0a8bcb37d5/commons-compress-1.18.jar
0c47a8cce69193feb1ff0a8bcb37d5/commons-compress-1.18.jar
0c47a8cce69193feb1ff0a8bcb37d5/commons-compress-1.18.jar
0c47a8cce69193feb1ff0a8bcb37d5/commons-compress-1.18.jar
0c47a8cce69193feb1ff0a8bcb37d5/commons-compress-1.18.jar

95b711fd6bcc87e6777f886730ca1/commons-fileupload-1.3.3.jar
730ca1/commons-fileupload-1.3.3.jar

3108d73978aec2fa3e681aedad6782c/spring-beans-5.1.9.RELEASE.jar
3108d73978aec2fa3e681aedad6782c/spring-beans-5.1.9.RELEASE.jar
1/cxf-rt-ws-security-3.1.8.jar

0a305dc87d953677c03c/logback-core-1.2.3.jar
8c5e74f6803c4edd/jcommander-1.35.jar

8740440937705ebb473a/logback-classic-1.2.3.jar

hentication.jwtbearer.3.1.3.nupkg
3.1.3.nupkg
2eb6cfcfec2ebf52474/xmlsec-1.5.6.jar

c3/xercesImpl-2.8.0.jar
c3/xercesImpl-2.8.0.jar
c3/xercesImpl-2.8.0.jar
c3/xercesImpl-2.8.0.jar
d0ce99aa43eb982868c796dd0775/httpclient-4.5.9.jar

755b5506cfd85f11d53bd61652f3d/hadoop-hdfs-client-3.2.0.jar
cec/jdom-1.0.jar

1/activemq-core-5.4.2.jar
1/activemq-core-5.4.2.jar
1/activemq-core-5.4.2.jar
1/activemq-core-5.4.2.jar
/ant-1.5.jar
/ant-1.5.jar
/ant-1.5.jar
/ant-1.5.jar
/ant-1.5.jar
579b4fa0c19970e6b8e5d774af8d988/spring-core-5.1.9.RELEASE.jar
579b4fa0c19970e6b8e5d774af8d988/spring-core-5.1.9.RELEASE.jar
1c91d00de846a43cf2051b8f69/not-yet-commons-ssl-0.3.9.jar
0fdd0b63dc4ed90d9027dafa9f74f80/spring-web-5.1.9.RELEASE.jar
0fdd0b63dc4ed90d9027dafa9f74f80/spring-web-5.1.9.RELEASE.jar
0fdd0b63dc4ed90d9027dafa9f74f80/spring-web-5.1.9.RELEASE.jar
0fdd0b63dc4ed90d9027dafa9f74f80/spring-web-5.1.9.RELEASE.jar
140488f0e6f9aa231e7938ae18da77b637/spring-webmvc-5.1.9.RELEASE.jar
6c051753b909ca8b4edb/cxf-rt-security-3.1.8.jar
ools.targets.1.9.10.nupkg
udio.azure.containers.tools.targets.1.9.10.nupkg
eb.codegenerators.mvc.3.1.0.nupkg
c57856b75130d015e77/pdfbox-2.0.13.jar
c57856b75130d015e77/pdfbox-2.0.13.jar
c57856b75130d015e77/pdfbox-2.0.13.jar
c57856b75130d015e77/pdfbox-2.0.13.jar
6729ba621b/spring-web-5.2.20.RELEASE.jar
75b4ea71b0b2881ebed8b56729ba621b/spring-web-5.2.20.RELEASE.jar

410be0a233e752ef5ed8742941d17363/infinispan-client-hotrod-8.2.4.Final.jar
410be0a233e752ef5ed8742941d17363/infinispan-client-hotrod-8.2.4.Final.jar
612b247d67/jsoup-1.11.3.jar
612b247d67/jsoup-1.11.3.jar

79275b9c8ff4a/jackson-databind-2.9.10.6.jar
0c0535b836082be7e3f8cac79275b9c8ff4a/jackson-databind-2.9.10.6.jar
79275b9c8ff4a/jackson-databind-2.9.10.6.jar
0c0535b836082be7e3f8cac79275b9c8ff4a/jackson-databind-2.9.10.6.jar
79275b9c8ff4a/jackson-databind-2.9.10.6.jar
0c0535b836082be7e3f8cac79275b9c8ff4a/jackson-databind-2.9.10.6.jar
79275b9c8ff4a/jackson-databind-2.9.10.6.jar
0c0535b836082be7e3f8cac79275b9c8ff4a/jackson-databind-2.9.10.6.jar
79275b9c8ff4a/jackson-databind-2.9.10.6.jar
0c0535b836082be7e3f8cac79275b9c8ff4a/jackson-databind-2.9.10.6.jar
79275b9c8ff4a/jackson-databind-2.9.10.6.jar
0c0535b836082be7e3f8cac79275b9c8ff4a/jackson-databind-2.9.10.6.jar
79275b9c8ff4a/jackson-databind-2.9.10.6.jar
0c0535b836082be7e3f8cac79275b9c8ff4a/jackson-databind-2.9.10.6.jar
79275b9c8ff4a/jackson-databind-2.9.10.6.jar
0c0535b836082be7e3f8cac79275b9c8ff4a/jackson-databind-2.9.10.6.jar
79275b9c8ff4a/jackson-databind-2.9.10.6.jar
0c0535b836082be7e3f8cac79275b9c8ff4a/jackson-databind-2.9.10.6.jar
79275b9c8ff4a/jackson-databind-2.9.10.6.jar
0c0535b836082be7e3f8cac79275b9c8ff4a/jackson-databind-2.9.10.6.jar
79275b9c8ff4a/jackson-databind-2.9.10.6.jar
0c0535b836082be7e3f8cac79275b9c8ff4a/jackson-databind-2.9.10.6.jar
79275b9c8ff4a/jackson-databind-2.9.10.6.jar
0c0535b836082be7e3f8cac79275b9c8ff4a/jackson-databind-2.9.10.6.jar
79275b9c8ff4a/jackson-databind-2.9.10.6.jar
0c0535b836082be7e3f8cac79275b9c8ff4a/jackson-databind-2.9.10.6.jar
79275b9c8ff4a/jackson-databind-2.9.10.6.jar
0c0535b836082be7e3f8cac79275b9c8ff4a/jackson-databind-2.9.10.6.jar
79275b9c8ff4a/jackson-databind-2.9.10.6.jar
0c0535b836082be7e3f8cac79275b9c8ff4a/jackson-databind-2.9.10.6.jar
79275b9c8ff4a/jackson-databind-2.9.10.6.jar
0c0535b836082be7e3f8cac79275b9c8ff4a/jackson-databind-2.9.10.6.jar
79275b9c8ff4a/jackson-databind-2.9.10.6.jar
0c0535b836082be7e3f8cac79275b9c8ff4a/jackson-databind-2.9.10.6.jar
c48aed682/spring-core-5.2.20.RELEASE.jar
da2fbed2fd6a710a431c252c48aed682/spring-core-5.2.20.RELEASE.jar
119928d54ff704fe38fe1b6b6700d0/jetty-client-9.4.14.v20181114.jar
54138336591d89dd5867b806c02/jetty-util-9.4.14.v20181114.jar
8a1df6406f6fa236a6eeff48cbfef6/jetty-server-9.4.14.v20181114.jar
8a1df6406f6fa236a6eeff48cbfef6/jetty-server-9.4.14.v20181114.jar
8a1df6406f6fa236a6eeff48cbfef6/jetty-server-9.4.14.v20181114.jar
8a1df6406f6fa236a6eeff48cbfef6/jetty-server-9.4.14.v20181114.jar
8a1df6406f6fa236a6eeff48cbfef6/jetty-server-9.4.14.v20181114.jar
8a1df6406f6fa236a6eeff48cbfef6/jetty-server-9.4.14.v20181114.jar

2/45974d3443cc15ad9d10239d762d5e15759e6364/tomcat-embed-websocket-9.0.22.jar
29fe1271dbc09aa7a/velocity-1.7.jar
10f8aab64/jdom2-2.0.6.jar

27720480efdec40a7c7f6e58426a/commons-httpclient-3.1.jar
d0f3b423b4cd81cb38d8b924/protobuf-java-3.6.1.jar
d0f3b423b4cd81cb38d8b924/protobuf-java-3.6.1.jar
d0f3b423b4cd81cb38d8b924/protobuf-java-3.6.1.jar

da961ecc38c6f2/esapi-2.0.1.jar
da961ecc38c6f2/esapi-2.0.1.jar
da961ecc38c6f2/esapi-2.0.1.jar
da961ecc38c6f2/esapi-2.0.1.jar

1ebc0e8cd880ab16d/junrar-2.0.0.jar
a2ad1fc6d36dbfc2a7c0dd5dab3a0bb27c61/spring-boot-2.1.7.RELEASE.jar

07475cb29a1e3fee397d411/simple-xml-2.7.1.jar

19/cxf-rt-transports-http-3.1.8.jar
9c5e971d6e14c99f277c353919/cxf-rt-transports-http-3.1.8.jar
19/cxf-rt-transports-http-3.1.8.jar
9c5e971d6e14c99f277c353919/cxf-rt-transports-http-3.1.8.jar
19/cxf-rt-transports-http-3.1.8.jar
9c5e971d6e14c99f277c353919/cxf-rt-transports-http-3.1.8.jar
3e5d285bb2fca78bb2531565ed9c9e5/jetty-servlets-9.4.14.v20181114.jar
a-25.1-jre.jar
c9f70f0c45fe10fb0b4/guava-25.1-jre.jar
n-2.8.5.jar
3fbb64cc505bede8829/gson-2.8.5.jar
n-2.8.5.jar
3fbb64cc505bede8829/gson-2.8.5.jar
020d6da93ad9abfa6a44edffb2b952/avatica-core-1.13.0.jar
be95d18baa3/json-20171018.jar

7eb304a94a2c5365e4929c/calcite-core-1.18.0.jar

fe90a92d0fbc9be86271efbe796f/httpclient-4.5.6.jar

parsers-1.20.jar
parsers-1.20.jar
parsers-1.20.jar
parsers-1.20.jar
parsers-1.20.jar
parsers-1.20.jar
fb158adb76b5b/json-smart-2.3.jar
fb158adb76b5b/json-smart-2.3.jar

e6e4b23bf951356c203cae2db24/hadoop-common-3.2.0.jar
e6e4b23bf951356c203cae2db24/hadoop-common-3.2.0.jar

bcaa8b5be68/snakeyaml-1.23.jar
bcaa8b5be68/snakeyaml-1.23.jar
bcaa8b5be68/snakeyaml-1.23.jar
bcaa8b5be68/snakeyaml-1.23.jar
bcaa8b5be68/snakeyaml-1.23.jar
bcaa8b5be68/snakeyaml-1.23.jar
9903498b28adacb18fe2ea046edd306295a6/tomcat-embed-core-9.0.22.jar
9903498b28adacb18fe2ea046edd306295a6/tomcat-embed-core-9.0.22.jar
9903498b28adacb18fe2ea046edd306295a6/tomcat-embed-core-9.0.22.jar
9903498b28adacb18fe2ea046edd306295a6/tomcat-embed-core-9.0.22.jar
9903498b28adacb18fe2ea046edd306295a6/tomcat-embed-core-9.0.22.jar
9903498b28adacb18fe2ea046edd306295a6/tomcat-embed-core-9.0.22.jar
9903498b28adacb18fe2ea046edd306295a6/tomcat-embed-core-9.0.22.jar
9903498b28adacb18fe2ea046edd306295a6/tomcat-embed-core-9.0.22.jar
9903498b28adacb18fe2ea046edd306295a6/tomcat-embed-core-9.0.22.jar
9903498b28adacb18fe2ea046edd306295a6/tomcat-embed-core-9.0.22.jar
9903498b28adacb18fe2ea046edd306295a6/tomcat-embed-core-9.0.22.jar
9903498b28adacb18fe2ea046edd306295a6/tomcat-embed-core-9.0.22.jar
9903498b28adacb18fe2ea046edd306295a6/tomcat-embed-core-9.0.22.jar
972fe7720ae844629f4ecca2/commons-text-1.6.jar
17bb711c390dd826beb953c3cead5407b/spring-beans-5.2.20.RELEASE.jar
3cead5407b/spring-beans-5.2.20.RELEASE.jar
ml-2.6.1.jar
ml-2.6.1.jar
6558f0f4f2192cc33c3bd189/commons-codec-1.11.jar
/commons-codec-1.11.jar
6558f0f4f2192cc33c3bd189/commons-codec-1.11.jar
168060fad21e1e70d/jgroups-3.6.7.Final.jar
02974a41fdf2c8e93f63a42d56544a96ed6/spring-context-5.2.20.RELEASE.jar
aab9bfc0a5a140301672a56f45edf8f3c8a0/spring-messaging-5.2.20.RELEASE.jar

You might also like