Advisories
Report advisories that are available for packages or dependencies in use
Package advisories
Filtering
You can filter the data by using the querystring, for instance:
Platform | Organisation | Repo | Package | Version | Dependency Types | Filepath | Owner | Advisory Type | Description |
---|---|---|---|---|---|---|---|---|---|
github | alphagov | di-authentication-frontend | node | 18.12.1 / 18.12.1 |
["engines"] | package.json | GDS Digital Identity | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | alphagov | di-authentication-frontend | node | 18.12.1 / 18.12.1 |
[] | .node-version | GDS Digital Identity | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | alphagov | di-authentication-frontend | node | 18.12.1-alpine3.16 / 18.12.1-alpine3.16 |
["final"] | Dockerfile | GDS Digital Identity | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | alphagov | di-authentication-frontend | node | 18.12.1-alpine3.16 / 18.12.1-alpine3.16 |
["final"] | Dockerfile-stub | GDS Digital Identity | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | alphagov | di-authentication-frontend | node | 18.12.1-alpine3.16 / 18.12.1-alpine3.16 |
["final"] | local.Dockerfile | GDS Digital Identity | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | alphagov | di-authentication-frontend | node | 18.12.1-alpine3.16 / 18.12.1-alpine3.16 |
["stage"] | Dockerfile | GDS Digital Identity | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | alphagov | di-authentication-frontend | node | v18.12.1 / v18.12.1 |
[] | .nvmrc | GDS Digital Identity | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | alphagov | di-ipv-cri-f2f-api | node | ^18.0.0 / v18.18.0 |
["engines"] | f2f-ipv-stub/package.json | GDS Digital Identity | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | alphagov | di-ipv-cri-f2f-api | node | ^18.0.0 / v18.18.0 |
["engines"] | gov-notify-stub/src/package.json | GDS Digital Identity | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | alphagov | di-ipv-cri-f2f-api | node | ^18.0.0 / v18.18.0 |
["engines"] | src/package.json | GDS Digital Identity | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | alphagov | di-ipv-cri-f2f-api | node | ^18.0.0 / v18.18.0 |
["engines"] | test-harness/src/package.json | GDS Digital Identity | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | alphagov | di-ipv-cri-f2f-api | node | ^18.0.0 / v18.18.0 |
["engines"] | yoti-stub/src/package.json | GDS Digital Identity | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | alphagov | pay-selfservice | node | 18.17.1 / 18.17.1 |
["engines"] | package.json | GDS Pay | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | alphagov | pay-selfservice | node | 18.17.1 / 18.17.1 |
[] | .nvmrc | GDS Pay | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | alphagov | pay-selfservice | node | 18.17.1-alpine3.18 / 18.17.1-alpine3.18 |
["final"] | Dockerfile | GDS Pay | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | alphagov | pay-selfservice | node | 18.17.1-alpine3.18 / 18.17.1-alpine3.18 |
["stage"] | Dockerfile | GDS Pay | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | cloud-custodian | cloud-custodian | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["require"] | tools/omnissm/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | co-cddo | api-spec-linter | node | 18.1.0 / 18.1.0 |
[] | .tool-versions | CDDO | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | deepmap | oapi-codegen | github.com/pkg/errors | 0.9.1 / 0.9.1 |
[] | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
||
github | deepmap | oapi-codegen | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | examples/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | elastic | beats | alpine | 3.15 / 3.15 |
["final"] | dev-tools/kubernetes/filebeat/Dockerfile.debug | Elastic | DEPRECATED | alpine 3.15 will be End-of-Life in 33 days |
github | elastic | beats | alpine | 3.15 / 3.15 |
["final"] | dev-tools/kubernetes/filebeat/Dockerfile.run | Elastic | DEPRECATED | alpine 3.15 will be End-of-Life in 33 days |
github | elastic | beats | alpine | 3.15 / 3.15 |
["final"] | dev-tools/kubernetes/metricbeat/Dockerfile.debug | Elastic | DEPRECATED | alpine 3.15 will be End-of-Life in 33 days |
github | elastic | beats | alpine | 3.15 / 3.15 |
["final"] | dev-tools/kubernetes/metricbeat/Dockerfile.run | Elastic | DEPRECATED | alpine 3.15 will be End-of-Life in 33 days |
github | elastic | beats | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["require"] | go.mod | Elastic | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
github | elastic | beats | python | 3.9.13 / 3.9.13 |
[] | .python-version | Elastic | DEPRECATED | python 3.9 has been unsupported (usually only receiving critical security fixes) for 499 days |
github | elastic | cloudbeat | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["require"] | go.mod | Elastic | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
github | elastic | eui | node | 18.17.1 / 18.17.1 |
[] | .nvmrc | Elastic | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | elastic | eui | node | 18.17.1-slim / 18.17.1-slim |
["final"] | scripts/docker-ci/Dockerfile | Elastic | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | elastic | kibana | node | 18.17.1 / 18.17.1 |
["engines"] | package.json | Elastic | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | elastic | kibana | node | 18.17.1 / 18.17.1 |
["final"] | .ci/Dockerfile | Elastic | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | elastic | kibana | node | 18.17.1 / 18.17.1 |
[] | .node-version | Elastic | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | elastic | kibana | node | 18.17.1 / 18.17.1 |
[] | .nvmrc | Elastic | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
github | golangci | golangci-lint | github.com/golangci/lint-1 | v0.0.0-20191013205115-297bf364a8e0 / v0.0.0-20191013205115-297bf364a8e0 |
["require"] | go.mod | DEPRECATED | Use golang.org/x/lint instead, as the golangci fork has not been updated in several years, and is behind active development and bugfixes in golang.org/x/lint |
|
github | golangci | golangci-lint | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | tools/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | gravitational | teleport | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | examples/access-plugin-minimal/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | gravitational | teleport | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | examples/api-sync-roles/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | gravitational | teleport | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | examples/service-discovery-api-client/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | gravitational | teleport | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | gravitational | teleport | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | integrations/kube-agent-updater/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | hashicorp | consul | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | api/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | hashicorp | consul | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | envoyextensions/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | hashicorp | consul | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | test-integ/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | hashicorp | consul | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | testing/deployer/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | hashicorp | consul | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["require"] | go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | hashicorp | consul | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["require"] | sdk/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | hashicorp | consul | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["require"] | test/integration/consul-container/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | hashicorp | nomad | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | hashicorp | nomad | node | >=16.x <=18.x / v18.18.0 |
["engines"] | website/package.json | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
|
github | hashicorp | packer | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | hashicorp | terraform | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["require"] | go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | hashicorp | vagrant | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["require"] | go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | hashicorp | vault | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | sdk/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | hashicorp | vault | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["require"] | go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | jamietanna | oapi-codegen-private | github.com/golangci/lint-1 | v0.0.0-20181222135242-d2cdd8c08219 / v0.0.0-20181222135242-d2cdd8c08219 |
["require"] | go.mod | Jamie Tanna | DEPRECATED | Use golang.org/x/lint instead, as the golangci fork has not been updated in several years, and is behind active development and bugfixes in golang.org/x/lint |
github | jamietanna | oapi-codegen-private | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | go.mod | Jamie Tanna | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
github | kubernetes | kubernetes | github.com/golangci/lint-1 | v0.0.0-20191013205115-297bf364a8e0 / v0.0.0-20191013205115-297bf364a8e0 |
["indirect"] | hack/tools/go.mod | DEPRECATED | Use golang.org/x/lint instead, as the golangci fork has not been updated in several years, and is behind active development and bugfixes in golang.org/x/lint |
|
github | kubernetes | kubernetes | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | hack/tools/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | kubernetes | kubernetes | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | staging/src/k8s.io/apiextensions-apiserver/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | kubernetes | kubernetes | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | staging/src/k8s.io/apimachinery/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | kubernetes | kubernetes | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | staging/src/k8s.io/apiserver/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | kubernetes | kubernetes | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | staging/src/k8s.io/cli-runtime/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | kubernetes | kubernetes | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | staging/src/k8s.io/client-go/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | kubernetes | kubernetes | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | staging/src/k8s.io/cloud-provider/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | kubernetes | kubernetes | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | staging/src/k8s.io/code-generator/examples/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | kubernetes | kubernetes | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | staging/src/k8s.io/component-helpers/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | kubernetes | kubernetes | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | staging/src/k8s.io/controller-manager/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | kubernetes | kubernetes | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | staging/src/k8s.io/dynamic-resource-allocation/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | kubernetes | kubernetes | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | staging/src/k8s.io/endpointslice/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | kubernetes | kubernetes | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | staging/src/k8s.io/kube-aggregator/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | kubernetes | kubernetes | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | staging/src/k8s.io/legacy-cloud-providers/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | kubernetes | kubernetes | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | staging/src/k8s.io/metrics/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | kubernetes | kubernetes | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | staging/src/k8s.io/pod-security-admission/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | kubernetes | kubernetes | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | staging/src/k8s.io/sample-apiserver/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | kubernetes | kubernetes | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | staging/src/k8s.io/sample-cli-plugin/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | kubernetes | kubernetes | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | staging/src/k8s.io/sample-controller/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | kubernetes | kubernetes | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["require"] | go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | kubernetes | kubernetes | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["require"] | staging/src/k8s.io/kubectl/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | monzo | egress-operator | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | opentofu | opentofu | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["require"] | go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | renovatebot | renovate | alpine | 3.15.4 / 3.15.4 |
["stage"] | lib/modules/manager/dockerfile/__fixtures__/3.Dockerfile | DEPRECATED | alpine 3.15 will be End-of-Life in 33 days | |
github | renovatebot | renovate | alpine | 3.15.4 / 3.15.4 |
["stage"] | lib/modules/manager/dockerfile/__fixtures__/4.Dockerfile | DEPRECATED | alpine 3.15 will be End-of-Life in 33 days | |
github | renovatebot | renovate | node | 18.18.0 / 18.18.0 |
[] | .nvmrc | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
|
github | tailscale | tailscale | github.com/golangci/lint-1 | v0.0.0-20191013205115-297bf364a8e0 / v0.0.0-20191013205115-297bf364a8e0 |
["indirect"] | go.mod | DEPRECATED | Use golang.org/x/lint instead, as the golangci fork has not been updated in several years, and is behind active development and bugfixes in golang.org/x/lint |
|
github | tailscale | tailscale | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["require"] | go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | tailscale | tailscale | node | 18.16.1 / 18.16.1 |
["engines"] | client/web/package.json | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
|
github | thechangelog | changelog.com | node | 18.17.0 / 18.17.0 |
[] | .tool-versions | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
|
github | tyktechnologies | tyk | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | wiremock | wiremock-extension-state | node | ^18 / v18.18.0 |
["engines"] | demo/wiremock_state_extension_demo/package.json | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
|
github | wiremock | wiremock-extension-state | node | v18 / v18.18.0 |
[] | demo/wiremock_state_extension_demo/.nvmrc | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
|
github | wiremock | wiremock-testcontainers-go | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | examples/quickstart/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | wiremock | wiremock-testcontainers-go | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | examples/using_api_client/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
github | wiremock | wiremock-testcontainers-go | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
gitlab | gitlab-org | gitlab | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | workhorse/go.mod | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
|
gitlab | gitlab-org | gitlab | node | 18.17.0 / 18.17.0 |
[] | .nvmrc | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
|
gitlab | gitlab-org | gitlab | node | 18.17.0 / 18.17.0 |
[] | .tool-versions | DEPRECATED | nodejs 18 will be unsupported (usually only receiving critical security fixes) in 19 days |
|
gitlab | jamietanna | cli | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["require"] | go.mod | Jamie Tanna | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
gitlab | tanna.dev | twilio-who-credentials | github.com/pkg/errors | v0.9.1 / v0.9.1 |
["indirect"] | go.mod | Jamie Tanna | DEPRECATED | pkg/errors is no longer necessary, as functionality exists in the Go standard library, or in better packages |
github | DDDEastMidlandsLimited | dddem-blog | liquidjs | 9.28.0 / 9.28.0 |
["dependencies","lockfile"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-45rm-2893-5f49 | |
github | DDDEastMidlandsLimited | dddem-blog | semver | 5.7.1 / 5.7.1 |
["dependencies","lockfile"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | DDDEastMidlandsLimited | dddem-web | json5 | ^0.5.1 / 0.5.1 |
["lockfile","lockfile-yarn-pinning-^0.5.1"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | DDDEastMidlandsLimited | dddem-web | json5 | ^2.1.2 / 2.2.1 |
["lockfile","lockfile-yarn-pinning-^2.1.2"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | DDDEastMidlandsLimited | dddem-web | json5 | ^2.2.0 / 2.2.1 |
["lockfile","lockfile-yarn-pinning-^2.2.0"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | DDDEastMidlandsLimited | dddem-web | json5 | ^2.2.1 / 2.2.1 |
["lockfile","lockfile-yarn-pinning-^2.2.1"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | DDDEastMidlandsLimited | dddem-web | semver | ~7.3.5 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-~7.3.5"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | DDDEastMidlandsLimited | dddem-web | yaml | ^2.1.1 / 2.1.3 |
["lockfile","lockfile-yarn-pinning-^2.1.1"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-f9xv-q969-pqx4 | |
github | DDDEastMidlandsLimited | dddem-web-----cyclone | json5 | 2.2.1 / 2.2.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | ||
github | DDDEastMidlandsLimited | dddem-web-----spdx | json5 | 2.2.1 / 2.2.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | ||
github | IndiePass | indiepass-android | com.google.code.gson:gson | 2.8.6 / 2.8.6 |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-4jrv-ppp4-jm57 | |
github | IndiePass | indiepass-android | com.google.crypto.tink:tink | 1.3.0-rc2 / 1.3.0-rc2 |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-g5vf-v6wf-7w2r | |
github | IndiePass | indiepass-android | com.google.guava:guava | 28.2-android / 28.2-android |
["dependencies","missing-data"] | app/build.gradle | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 | |
github | IndiePass | indiepass-android | com.google.guava:guava | 28.2-android / 28.2-android |
["dependencies","missing-data"] | app/build.gradle | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 | |
github | IndiePass | indiepass-android | com.google.guava:guava | 30.1-jre / 30.1-jre |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 | |
github | IndiePass | indiepass-android | com.google.guava:guava | 30.1-jre / 30.1-jre |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 | |
github | IndiePass | indiepass-android | com.google.protobuf:protobuf-java | 3.17.2 / 3.17.2 |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-4gg5-vx3j-xwc7 | |
github | IndiePass | indiepass-android | com.google.protobuf:protobuf-java | 3.17.2 / 3.17.2 |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-g5ww-5jh7-63cx | |
github | IndiePass | indiepass-android | com.google.protobuf:protobuf-java | 3.17.2 / 3.17.2 |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-h4h5-3hr4-j3g2 | |
github | IndiePass | indiepass-android | commons-io:commons-io | 2.4 / 2.4 | ["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-gwrp-pvrq-jmwv | |
github | IndiePass | indiepass-android | io.grpc:grpc-protobuf | 1.39.0 / 1.39.0 |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-6628-q6j9-w8vg | |
github | IndiePass | indiepass-android | io.grpc:grpc-protobuf | 1.39.0 / 1.39.0 |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-9hxf-ppjv-w6rq | |
github | IndiePass | indiepass-android | io.grpc:grpc-protobuf | 1.39.0 / 1.39.0 |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-cfgp-2977-2fmm | |
github | IndiePass | indiepass-android | io.netty:netty-codec | 4.1.52.Final / 4.1.52.Final |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-9vjp-v76f-g363 | |
github | IndiePass | indiepass-android | io.netty:netty-codec | 4.1.52.Final / 4.1.52.Final |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-grg4-wf29-r9vv | |
github | IndiePass | indiepass-android | io.netty:netty-codec-http | 4.1.52.Final / 4.1.52.Final |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-269q-hmxg-m83q | |
github | IndiePass | indiepass-android | io.netty:netty-codec-http | 4.1.52.Final / 4.1.52.Final |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-5mcr-gq6c-3hq2 | |
github | IndiePass | indiepass-android | io.netty:netty-codec-http | 4.1.52.Final / 4.1.52.Final |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-wx5j-54mm-rqqq | |
github | IndiePass | indiepass-android | io.netty:netty-codec-http2 | 4.1.52.Final / 4.1.52.Final |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-f256-j965-7f32 | |
github | IndiePass | indiepass-android | io.netty:netty-codec-http2 | 4.1.52.Final / 4.1.52.Final |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-wm47-8v5p-wjpj | |
github | IndiePass | indiepass-android | io.netty:netty-handler | 4.1.52.Final / 4.1.52.Final |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-6mjq-h674-j845 | |
github | IndiePass | indiepass-android | org.apache.commons:commons-compress | 1.20 / 1.20 |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-7hfm-57qf-j43q | |
github | IndiePass | indiepass-android | org.apache.commons:commons-compress | 1.20 / 1.20 |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-crv7-7245-f45f | |
github | IndiePass | indiepass-android | org.apache.commons:commons-compress | 1.20 / 1.20 |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-mc84-pj99-q6hh | |
github | IndiePass | indiepass-android | org.apache.commons:commons-compress | 1.20 / 1.20 |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-xqfj-vm6h-2x34 | |
github | IndiePass | indiepass-android | org.bitbucket.b_c:jose4j | 0.7.0 / 0.7.0 |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-jgvc-jfgh-rjvv | |
github | IndiePass | indiepass-android | org.bouncycastle:bcprov-jdk15on | 1.67 / 1.67 |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-hr8g-6v94-x4m9 | |
github | IndiePass | indiepass-android | org.jetbrains.kotlin:kotlin-stdlib | 1.4.20 / 1.4.20 |
["dependencies","missing-data"] | app/build.gradle | SECURITY | Package is vulnerable to CVE GHSA-2qp4-g3q3-f92w | |
github | IndiePass | indiepass-android | org.jetbrains.kotlin:kotlin-stdlib | 1.4.20 / 1.4.20 |
["dependencies","missing-data"] | app/build.gradle | SECURITY | Package is vulnerable to CVE GHSA-cqj8-47ch-rvvq | |
github | IndiePass | indiepass-android | org.json:json | 20180813 / 20180813 |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-3vqj-43w4-2q58 | |
github | IndiePass | indiepass-android | org.json:json | 20200518 / 20200518 |
["dependencies"] | app/build.gradle | SECURITY | Package is vulnerable to CVE GHSA-3vqj-43w4-2q58 | |
github | IndiePass | indiepass-android | org.jsoup:jsoup | 1.12.2 / 1.12.2 |
["dependencies","missing-data"] | app/build.gradle | SECURITY | Package is vulnerable to CVE GHSA-gp7f-rwcx-9369 | |
github | IndiePass | indiepass-android | org.jsoup:jsoup | 1.12.2 / 1.12.2 |
["dependencies","missing-data"] | app/build.gradle | SECURITY | Package is vulnerable to CVE GHSA-m72m-mhq2-9p6c | |
github | IndiePass | indiepass-android | xerces:xercesImpl | 2.12.0 / 2.12.0 |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-h65f-jvqw-m9fj | |
github | IndiePass | indiepass-android | xerces:xercesImpl | 2.12.0 / 2.12.0 |
["dependencies","missing-data"] | build.gradle | SECURITY | Package is vulnerable to CVE GHSA-w4jq-qh47-hvjq | |
github | IndiePass | indiepass-desktop | electron | ^19.1.1 / 19.1.9 |
["devDependencies"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-7x97-j373-85x5 | |
github | IndiePass | indiepass-desktop | electron | ^19.1.1 / 19.1.9 |
["devDependencies"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-p7v2-p9m8-qqg7 | |
github | IndiePass | indigenous-site | vite | ^4.0.0 / 4.3.1 |
["devDependencies"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-353f-5xf4-qw67 | |
github | alphagov | di-authentication-api | com.fasterxml.jackson.core:jackson-databind | 2.10.4 / 2.10.4 |
["dependencies","missing-data"] | build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-288c-cq4h-88gq |
github | alphagov | di-authentication-api | com.fasterxml.jackson.core:jackson-databind | 2.10.4 / 2.10.4 |
["dependencies","missing-data"] | build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-3x8x-79m2-3w2w |
github | alphagov | di-authentication-api | com.fasterxml.jackson.core:jackson-databind | 2.10.4 / 2.10.4 |
["dependencies","missing-data"] | build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-57j2-w4cx-62h2 |
github | alphagov | di-authentication-api | com.fasterxml.jackson.core:jackson-databind | 2.10.4 / 2.10.4 |
["dependencies","missing-data"] | build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-jjjh-jjxp-wpff |
github | alphagov | di-authentication-api | com.fasterxml.jackson.core:jackson-databind | 2.10.4 / 2.10.4 |
["dependencies","missing-data"] | build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-rgv9-q543-rqg4 |
github | alphagov | di-authentication-api | io.netty:netty-handler | 4.1.86.Final / 4.1.86.Final |
["dependencies","missing-data"] | build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-6mjq-h674-j845 |
github | alphagov | di-authentication-api | org.bitbucket.b_c:jose4j | 0.7.7 / 0.7.7 |
["dependencies","missing-data"] | build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-jgvc-jfgh-rjvv |
github | alphagov | di-authentication-api | org.bouncycastle:bcprov-jdk15on | 1.70 / 1.70 |
["dependencies","missing-data"] | build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-hr8g-6v94-x4m9 |
github | alphagov | di-authentication-api | org.eclipse.jetty:jetty-http | 11.0.13 / 11.0.13 |
["dependencies","missing-data"] | shared-test/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-hmr7-m48g-48f6 |
github | alphagov | di-authentication-api | org.eclipse.jetty:jetty-server | 11.0.13 / 11.0.13 |
["dependencies"] | shared-test/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-p26g-97m4-6q7c |
github | alphagov | di-authentication-api | org.eclipse.jetty:jetty-server | 11.0.13 / 11.0.13 |
["dependencies"] | shared-test/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-qw69-rqj8-6qw8 |
github | alphagov | di-authentication-frontend | semver | ~7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-~7.0.0"] | package.json | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | alphagov | di-ipv-core-back | com.fasterxml.jackson.core:jackson-databind | 2.12.6.1 / 2.12.6.1 |
["dependencies","missing-data"] | build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-jjjh-jjxp-wpff |
github | alphagov | di-ipv-core-back | com.fasterxml.jackson.core:jackson-databind | 2.12.6.1 / 2.12.6.1 |
["dependencies","missing-data"] | build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-rgv9-q543-rqg4 |
github | alphagov | di-ipv-core-back | com.github.tomakehurst:wiremock-jre8 | 2.35.0 / 2.35.0 |
["dependencies"] | integration-test/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-pmxq-pj47-j8j4 |
github | alphagov | di-ipv-core-back | com.github.tomakehurst:wiremock-jre8 | 2.35.0 / 2.35.0 |
["dependencies"] | lambdas/process-async-cri-credential/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-pmxq-pj47-j8j4 |
github | alphagov | di-ipv-core-back | com.github.tomakehurst:wiremock-jre8 | 2.35.0 / 2.35.0 |
["dependencies"] | lambdas/retrieve-cri-credential/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-pmxq-pj47-j8j4 |
github | alphagov | di-ipv-core-back | com.github.tomakehurst:wiremock-jre8 | 2.35.0 / 2.35.0 |
["dependencies"] | lambdas/retrieve-cri-oauth-access-token/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-pmxq-pj47-j8j4 |
github | alphagov | di-ipv-core-back | com.github.tomakehurst:wiremock-jre8 | 2.35.0 / 2.35.0 |
["dependencies"] | libs/common-services/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-pmxq-pj47-j8j4 |
github | alphagov | di-ipv-core-back | com.github.tomakehurst:wiremock-jre8 | 2.35.0 / 2.35.0 |
["dependencies"] | libs/credential-issuer-config-service/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-pmxq-pj47-j8j4 |
github | alphagov | di-ipv-core-back | com.github.tomakehurst:wiremock-jre8 | 2.35.0 / 2.35.0 |
["dependencies"] | libs/kms-es256-signer/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-pmxq-pj47-j8j4 |
github | alphagov | di-ipv-core-back | com.github.tomakehurst:wiremock-jre8 | 2.35.0 / 2.35.0 |
["dependencies"] | libs/verifiable-credentials/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-pmxq-pj47-j8j4 |
github | alphagov | di-ipv-core-back | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies","missing-data"] | integration-test/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | alphagov | di-ipv-core-back | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies","missing-data"] | integration-test/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | alphagov | di-ipv-core-back | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies","missing-data"] | lambdas/process-async-cri-credential/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | alphagov | di-ipv-core-back | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies","missing-data"] | lambdas/process-async-cri-credential/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | alphagov | di-ipv-core-back | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies","missing-data"] | lambdas/retrieve-cri-credential/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | alphagov | di-ipv-core-back | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies","missing-data"] | lambdas/retrieve-cri-credential/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | alphagov | di-ipv-core-back | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies","missing-data"] | lambdas/retrieve-cri-oauth-access-token/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | alphagov | di-ipv-core-back | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies","missing-data"] | lambdas/retrieve-cri-oauth-access-token/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | alphagov | di-ipv-core-back | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies","missing-data"] | libs/common-services/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | alphagov | di-ipv-core-back | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies","missing-data"] | libs/common-services/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | alphagov | di-ipv-core-back | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies","missing-data"] | libs/credential-issuer-config-service/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | alphagov | di-ipv-core-back | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies","missing-data"] | libs/credential-issuer-config-service/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | alphagov | di-ipv-core-back | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies","missing-data"] | libs/kms-es256-signer/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | alphagov | di-ipv-core-back | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies","missing-data"] | libs/kms-es256-signer/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | alphagov | di-ipv-core-back | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies","missing-data"] | libs/verifiable-credentials/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | alphagov | di-ipv-core-back | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies","missing-data"] | libs/verifiable-credentials/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | alphagov | di-ipv-core-back | commons-fileupload:commons-fileupload | 1.4 / 1.4 | ["dependencies","missing-data"] | integration-test/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-hfrx-6qgj-fp6c |
github | alphagov | di-ipv-core-back | commons-fileupload:commons-fileupload | 1.4 / 1.4 | ["dependencies","missing-data"] | lambdas/process-async-cri-credential/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-hfrx-6qgj-fp6c |
github | alphagov | di-ipv-core-back | commons-fileupload:commons-fileupload | 1.4 / 1.4 | ["dependencies","missing-data"] | lambdas/retrieve-cri-credential/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-hfrx-6qgj-fp6c |
github | alphagov | di-ipv-core-back | commons-fileupload:commons-fileupload | 1.4 / 1.4 | ["dependencies","missing-data"] | lambdas/retrieve-cri-oauth-access-token/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-hfrx-6qgj-fp6c |
github | alphagov | di-ipv-core-back | commons-fileupload:commons-fileupload | 1.4 / 1.4 | ["dependencies","missing-data"] | libs/common-services/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-hfrx-6qgj-fp6c |
github | alphagov | di-ipv-core-back | commons-fileupload:commons-fileupload | 1.4 / 1.4 | ["dependencies","missing-data"] | libs/credential-issuer-config-service/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-hfrx-6qgj-fp6c |
github | alphagov | di-ipv-core-back | commons-fileupload:commons-fileupload | 1.4 / 1.4 | ["dependencies","missing-data"] | libs/kms-es256-signer/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-hfrx-6qgj-fp6c |
github | alphagov | di-ipv-core-back | commons-fileupload:commons-fileupload | 1.4 / 1.4 | ["dependencies","missing-data"] | libs/verifiable-credentials/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-hfrx-6qgj-fp6c |
github | alphagov | di-ipv-core-back | io.netty:netty-codec-http | 4.1.68.Final / 4.1.68.Final |
["dependencies","missing-data"] | build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-269q-hmxg-m83q |
github | alphagov | di-ipv-core-back | io.netty:netty-codec-http | 4.1.68.Final / 4.1.68.Final |
["dependencies","missing-data"] | build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-wx5j-54mm-rqqq |
github | alphagov | di-ipv-core-back | io.netty:netty-handler | 4.1.68.Final / 4.1.68.Final |
["dependencies","missing-data"] | build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-6mjq-h674-j845 |
github | alphagov | di-ipv-core-back | net.minidev:json-smart | 2.4.7 / 2.4.7 |
["dependencies","missing-data"] | build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-493p-pfq6-5258 |
github | alphagov | di-ipv-core-back | net.minidev:json-smart | 2.4.8 / 2.4.8 |
["dependencies","missing-data"] | integration-test/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-493p-pfq6-5258 |
github | alphagov | di-ipv-core-back | net.minidev:json-smart | 2.4.8 / 2.4.8 |
["dependencies","missing-data"] | lambdas/process-async-cri-credential/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-493p-pfq6-5258 |
github | alphagov | di-ipv-core-back | net.minidev:json-smart | 2.4.8 / 2.4.8 |
["dependencies","missing-data"] | lambdas/retrieve-cri-credential/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-493p-pfq6-5258 |
github | alphagov | di-ipv-core-back | net.minidev:json-smart | 2.4.8 / 2.4.8 |
["dependencies","missing-data"] | lambdas/retrieve-cri-oauth-access-token/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-493p-pfq6-5258 |
github | alphagov | di-ipv-core-back | net.minidev:json-smart | 2.4.8 / 2.4.8 |
["dependencies","missing-data"] | libs/common-services/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-493p-pfq6-5258 |
github | alphagov | di-ipv-core-back | net.minidev:json-smart | 2.4.8 / 2.4.8 |
["dependencies","missing-data"] | libs/credential-issuer-config-service/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-493p-pfq6-5258 |
github | alphagov | di-ipv-core-back | net.minidev:json-smart | 2.4.8 / 2.4.8 |
["dependencies","missing-data"] | libs/kms-es256-signer/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-493p-pfq6-5258 |
github | alphagov | di-ipv-core-back | net.minidev:json-smart | 2.4.8 / 2.4.8 |
["dependencies","missing-data"] | libs/verifiable-credentials/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-493p-pfq6-5258 |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-http | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | integration-test/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-hmr7-m48g-48f6 |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-http | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | lambdas/process-async-cri-credential/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-hmr7-m48g-48f6 |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-http | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | lambdas/retrieve-cri-credential/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-hmr7-m48g-48f6 |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-http | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | lambdas/retrieve-cri-oauth-access-token/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-hmr7-m48g-48f6 |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-http | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | libs/common-services/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-hmr7-m48g-48f6 |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-http | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | libs/credential-issuer-config-service/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-hmr7-m48g-48f6 |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-http | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | libs/kms-es256-signer/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-hmr7-m48g-48f6 |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-http | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | libs/verifiable-credentials/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-hmr7-m48g-48f6 |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | integration-test/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-p26g-97m4-6q7c |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | integration-test/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-qw69-rqj8-6qw8 |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | lambdas/process-async-cri-credential/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-p26g-97m4-6q7c |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | lambdas/process-async-cri-credential/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-qw69-rqj8-6qw8 |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | lambdas/retrieve-cri-credential/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-p26g-97m4-6q7c |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | lambdas/retrieve-cri-credential/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-qw69-rqj8-6qw8 |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | lambdas/retrieve-cri-oauth-access-token/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-p26g-97m4-6q7c |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | lambdas/retrieve-cri-oauth-access-token/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-qw69-rqj8-6qw8 |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | libs/common-services/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-p26g-97m4-6q7c |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | libs/common-services/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-qw69-rqj8-6qw8 |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | libs/credential-issuer-config-service/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-p26g-97m4-6q7c |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | libs/credential-issuer-config-service/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-qw69-rqj8-6qw8 |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | libs/kms-es256-signer/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-p26g-97m4-6q7c |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | libs/kms-es256-signer/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-qw69-rqj8-6qw8 |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | libs/verifiable-credentials/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-p26g-97m4-6q7c |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | libs/verifiable-credentials/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-qw69-rqj8-6qw8 |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-servlets | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | integration-test/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-3gh6-v5v9-6v9j |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-servlets | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | lambdas/process-async-cri-credential/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-3gh6-v5v9-6v9j |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-servlets | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | lambdas/retrieve-cri-credential/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-3gh6-v5v9-6v9j |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-servlets | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | lambdas/retrieve-cri-oauth-access-token/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-3gh6-v5v9-6v9j |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-servlets | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | libs/common-services/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-3gh6-v5v9-6v9j |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-servlets | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | libs/credential-issuer-config-service/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-3gh6-v5v9-6v9j |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-servlets | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | libs/kms-es256-signer/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-3gh6-v5v9-6v9j |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-servlets | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | libs/verifiable-credentials/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-3gh6-v5v9-6v9j |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-xml | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | integration-test/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-58qw-p7qm-5rvh |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-xml | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | lambdas/process-async-cri-credential/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-58qw-p7qm-5rvh |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-xml | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | lambdas/retrieve-cri-credential/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-58qw-p7qm-5rvh |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-xml | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | lambdas/retrieve-cri-oauth-access-token/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-58qw-p7qm-5rvh |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-xml | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | libs/common-services/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-58qw-p7qm-5rvh |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-xml | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | libs/credential-issuer-config-service/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-58qw-p7qm-5rvh |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-xml | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | libs/kms-es256-signer/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-58qw-p7qm-5rvh |
github | alphagov | di-ipv-core-back | org.eclipse.jetty:jetty-xml | 9.4.49.v20220914 / 9.4.49.v20220914 |
["dependencies","missing-data"] | libs/verifiable-credentials/build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-58qw-p7qm-5rvh |
github | alphagov | di-ipv-core-back | org.yaml:snakeyaml | 1.30 / 1.30 |
["dependencies","missing-data"] | build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-3mc7-4q67-w48m |
github | alphagov | di-ipv-core-back | org.yaml:snakeyaml | 1.30 / 1.30 |
["dependencies","missing-data"] | build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-98wm-3w3q-mw94 |
github | alphagov | di-ipv-core-back | org.yaml:snakeyaml | 1.30 / 1.30 |
["dependencies","missing-data"] | build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-9w3m-gqgf-c4p9 |
github | alphagov | di-ipv-core-back | org.yaml:snakeyaml | 1.30 / 1.30 |
["dependencies","missing-data"] | build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-c4r9-r8fh-9vj2 |
github | alphagov | di-ipv-core-back | org.yaml:snakeyaml | 1.30 / 1.30 |
["dependencies","missing-data"] | build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-hhhw-99gj-p3c3 |
github | alphagov | di-ipv-core-back | org.yaml:snakeyaml | 1.30 / 1.30 |
["dependencies","missing-data"] | build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-mjmj-j48q-9wg2 |
github | alphagov | di-ipv-core-back | org.yaml:snakeyaml | 1.30 / 1.30 |
["dependencies","missing-data"] | build.gradle | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-w37g-rhq8-7m4j |
github | alphagov | di-ipv-cri-f2f-api | semver | 6.3.0 / 6.3.0 |
["dependencies","lockfile"] | infra-l2-dynamo/package.json | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | alphagov | di-ipv-cri-f2f-api | semver | 6.3.0 / 6.3.0 |
["dependencies","lockfile"] | infra-l2-kms/package.json | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | alphagov | di-ipv-cri-f2f-api | semver | 7.3.8 / 7.3.8 |
["dependencies","lockfile"] | src/package.json | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | alphagov | di-ipv-cri-f2f-api | word-wrap | 1.2.3 / 1.2.3 |
["dependencies","lockfile"] | src/package.json | GDS Digital Identity | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 |
github | alphagov | pay-connector | com.amazonaws:aws-java-sdk-s3 | 1.11.587 / 1.11.587 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-c28r-hw5m-5gv3 |
github | alphagov | pay-connector | com.amazonaws:aws-java-sdk-s3 | 1.11.587 / 1.11.587 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-c28r-hw5m-5gv3 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.12.6.1 / 2.12.6.1 |
["runtime","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-jjjh-jjxp-wpff |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.12.6.1 / 2.12.6.1 |
["runtime","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-rgv9-q543-rqg4 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-288c-cq4h-88gq |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-4gq5-ch57-c2mg |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-4w82-r329-3q67 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-57j2-w4cx-62h2 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5949-rw7g-wx7w |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5ww9-j83m-q7qx |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-645p-88qh-w398 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-6fpp-rgj9-8rwc |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-85cw-hj65-qqv9 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-89qr-369f-5m5x |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-8c4j-34r4-xr8g |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-8w26-6f25-cm9x |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-9gph-22xh-8x98 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-9m6f-7xcq-8vf8 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-cf6r-3wgc-h863 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-cggj-fvv3-cqwv |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-cjjf-94ff-43w7 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-cmfg-87vq-g5g4 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-cvm9-fjm9-3572 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-f3j5-rmmp-3fc5 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-f9xh-2qgp-cq57 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-fmmc-742q-jg75 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-fqwf-pjwf-7vqv |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-gjmw-vf9h-g25v |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-gwp4-hfv6-p7hw |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-gww7-p5w4-wrfv |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-h3cw-g4mq-c5x2 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-h822-r4r5-v8jg |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-jjjh-jjxp-wpff |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-m6x4-97wx-4q27 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mph4-vhrx-mv67 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mx7p-6679-8g3q |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-p43x-xfjf-5jhr |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-q93h-jc49-78gg |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-qjw2-hr98-qgfh |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-qr7j-h6gg-jmgc |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-r3gr-cxrf-hg25 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-r695-7vr9-jgc2 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-rfx6-vp9g-rh7v |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-rgv9-q543-rqg4 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-rpr3-cw39-3pxh |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-v585-23hc-c647 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-vfqx-33qm-g869 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-w3f4-3q6j-rh82 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.6.7.2 / 2.6.7.2 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-wh8g-3j2c-rqj5 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-27xj-rqx5-2255 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-288c-cq4h-88gq |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-4w82-r329-3q67 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-57j2-w4cx-62h2 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-58pp-9c76-5625 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5949-rw7g-wx7w |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5p34-5m6p-p58g |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5ww9-j83m-q7qx |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-6fpp-rgj9-8rwc |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-758m-v56v-grj4 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-85cw-hj65-qqv9 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-89qr-369f-5m5x |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-8c4j-34r4-xr8g |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-8w26-6f25-cm9x |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-95cm-88f5-f2c7 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-9gph-22xh-8x98 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-9m6f-7xcq-8vf8 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-9vvp-fxw6-jcxr |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-c265-37vj-cwcc |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-c2q3-4qrh-fm48 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-cf6r-3wgc-h863 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-cmfg-87vq-g5g4 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-cvm9-fjm9-3572 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-f3j5-rmmp-3fc5 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-f9xh-2qgp-cq57 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-fmmc-742q-jg75 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-fqwf-pjwf-7vqv |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-gjmw-vf9h-g25v |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-gwp4-hfv6-p7hw |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-gww7-p5w4-wrfv |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-h3cw-g4mq-c5x2 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-h4rc-386g-6m85 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-h822-r4r5-v8jg |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-j823-4qch-3rgm |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-jjjh-jjxp-wpff |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-m6x4-97wx-4q27 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mc6h-4qgp-37qh |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mph4-vhrx-mv67 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mx7p-6679-8g3q |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-p43x-xfjf-5jhr |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-q93h-jc49-78gg |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-qjw2-hr98-qgfh |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-qmqc-x3r4-6v39 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-r3gr-cxrf-hg25 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-r695-7vr9-jgc2 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-rf6r-2c4q-2vwg |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-rgv9-q543-rqg4 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-rpr3-cw39-3pxh |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-v3xw-c963-f5hc |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-v585-23hc-c647 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-vfqx-33qm-g869 |
github | alphagov | pay-connector | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-wh8g-3j2c-rqj5 |
github | alphagov | pay-connector | com.google.code.gson:gson | 2.8.6 / 2.8.6 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-4jrv-ppp4-jm57 |
github | alphagov | pay-connector | com.google.code.gson:gson | 2.8.6 / 2.8.6 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-4jrv-ppp4-jm57 |
github | alphagov | pay-connector | com.google.guava:guava | 16.0.1 / 16.0.1 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | alphagov | pay-connector | com.google.guava:guava | 16.0.1 / 16.0.1 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | alphagov | pay-connector | com.google.guava:guava | 16.0.1 / 16.0.1 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mvr2-9pj6-7w5j |
github | alphagov | pay-connector | com.google.guava:guava | 18.0 / 18.0 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | alphagov | pay-connector | com.google.guava:guava | 18.0 / 18.0 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | alphagov | pay-connector | com.google.guava:guava | 18.0 / 18.0 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mvr2-9pj6-7w5j |
github | alphagov | pay-connector | com.google.guava:guava | 31.1-jre / 31.1-jre |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | alphagov | pay-connector | com.google.guava:guava | 31.1-jre / 31.1-jre |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | alphagov | pay-connector | commons-beanutils:commons-beanutils | 1.7.0 / 1.7.0 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-6phf-73q6-gh87 |
github | alphagov | pay-connector | commons-fileupload:commons-fileupload | 1.4 / 1.4 | ["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-hfrx-6qgj-fp6c |
github | alphagov | pay-connector | commons-io:commons-io | 2.5 / 2.5 | ["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-gwrp-pvrq-jmwv |
github | alphagov | pay-connector | commons-io:commons-io | 2.6 / 2.6 | ["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-gwrp-pvrq-jmwv |
github | alphagov | pay-connector | dom4j:dom4j | 1.1 / 1.1 | ["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-6pcc-3rfx-4gpm |
github | alphagov | pay-connector | dom4j:dom4j | 1.1 / 1.1 | ["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-hwj3-m3p6-hj38 |
github | alphagov | pay-connector | io.netty:netty-codec | 4.1.30.Final / 4.1.30.Final |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-9vjp-v76f-g363 |
github | alphagov | pay-connector | io.netty:netty-codec | 4.1.30.Final / 4.1.30.Final |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-grg4-wf29-r9vv |
github | alphagov | pay-connector | io.netty:netty-codec-http | 4.1.9.Final / 4.1.9.Final |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-269q-hmxg-m83q |
github | alphagov | pay-connector | io.netty:netty-codec-http | 4.1.9.Final / 4.1.9.Final |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5mcr-gq6c-3hq2 |
github | alphagov | pay-connector | io.netty:netty-codec-http | 4.1.9.Final / 4.1.9.Final |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-cqqj-4p63-rrmm |
github | alphagov | pay-connector | io.netty:netty-codec-http | 4.1.9.Final / 4.1.9.Final |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-wx5j-54mm-rqqq |
github | alphagov | pay-connector | io.netty:netty-handler | 4.1.30.Final / 4.1.30.Final |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-6mjq-h674-j845 |
github | alphagov | pay-connector | io.netty:netty-handler | 4.1.30.Final / 4.1.30.Final |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mm9x-g8pc-w292 |
github | alphagov | pay-connector | io.netty:netty-handler | 4.1.30.Final / 4.1.30.Final |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-p2v9-g2qv-p635 |
github | alphagov | pay-connector | junit:junit | 4.12 / 4.12 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-269g-pwp5-87pp |
github | alphagov | pay-connector | net.minidev:json-smart | 2.4.8 / 2.4.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-493p-pfq6-5258 |
github | alphagov | pay-connector | org.apache.commons:commons-compress | 1.18 / 1.18 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-53x6-4x5p-rrvv |
github | alphagov | pay-connector | org.apache.commons:commons-compress | 1.18 / 1.18 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-7hfm-57qf-j43q |
github | alphagov | pay-connector | org.apache.commons:commons-compress | 1.18 / 1.18 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-crv7-7245-f45f |
github | alphagov | pay-connector | org.apache.commons:commons-compress | 1.18 / 1.18 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mc84-pj99-q6hh |
github | alphagov | pay-connector | org.apache.commons:commons-compress | 1.18 / 1.18 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-xqfj-vm6h-2x34 |
github | alphagov | pay-connector | org.apache.httpcomponents:httpclient | 4.5.5 / 4.5.5 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-7r82-7xv7-xcpj |
github | alphagov | pay-connector | org.apache.maven:maven-core | 3.2.5 / 3.2.5 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-2f88-5hg8-9x2x |
github | alphagov | pay-connector | org.apache.velocity:velocity | 1.7 / 1.7 | ["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-59j4-wjwp-mw9m |
github | alphagov | pay-connector | org.apache.velocity:velocity-tools | 2.0 / 2.0 | ["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-fh63-4r66-jc7v |
github | alphagov | pay-connector | org.bitbucket.b_c:jose4j | 0.7.7 / 0.7.7 |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-jgvc-jfgh-rjvv |
github | alphagov | pay-connector | org.bouncycastle:bcprov-jdk15on | 1.60 / 1.60 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-6xx3-rg99-gc3p |
github | alphagov | pay-connector | org.bouncycastle:bcprov-jdk15on | 1.60 / 1.60 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-hr8g-6v94-x4m9 |
github | alphagov | pay-connector | org.codehaus.groovy:groovy | 2.5.6 / 2.5.6 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-rcjj-h6gh-jf3r |
github | alphagov | pay-connector | org.codehaus.groovy:groovy | 2.5.6 / 2.5.6 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-rcjj-h6gh-jf3r |
github | alphagov | pay-connector | org.codehaus.plexus:plexus-archiver | 4.6.0 / 4.6.0 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-wh3p-fphp-9h2m |
github | alphagov | pay-connector | org.eclipse.jetty:jetty-http | 9.4.51.v20230217 / 9.4.51.v20230217 |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-hmr7-m48g-48f6 |
github | alphagov | pay-connector | org.eclipse.jetty:jetty-http | 9.4.51.v20230217 / 9.4.51.v20230217 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-hmr7-m48g-48f6 |
github | alphagov | pay-connector | org.eclipse.jetty:jetty-servlets | 9.4.48.v20220622 / 9.4.48.v20220622 |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-3gh6-v5v9-6v9j |
github | alphagov | pay-connector | org.eclipse.jetty:jetty-servlets | 9.4.51.v20230217 / 9.4.51.v20230217 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-3gh6-v5v9-6v9j |
github | alphagov | pay-connector | org.eclipse.jetty:jetty-xml | 9.4.49.v20220914 / 9.4.49.v20220914 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-58qw-p7qm-5rvh |
github | alphagov | pay-connector | org.jetbrains.kotlin:kotlin-stdlib | 1.3.71 / 1.3.71 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-2qp4-g3q3-f92w |
github | alphagov | pay-connector | org.jetbrains.kotlin:kotlin-stdlib | 1.3.71 / 1.3.71 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-cqj8-47ch-rvvq |
github | alphagov | pay-connector | org.jetbrains.kotlin:kotlin-stdlib | 1.3.71 / 1.3.71 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-2qp4-g3q3-f92w |
github | alphagov | pay-connector | org.jetbrains.kotlin:kotlin-stdlib | 1.3.71 / 1.3.71 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-cqj8-47ch-rvvq |
github | alphagov | pay-connector | org.json:json | 20160212 / 20160212 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-3vqj-43w4-2q58 |
github | alphagov | pay-connector | org.json:json | 20180813 / 20180813 |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-3vqj-43w4-2q58 |
github | alphagov | pay-connector | org.yaml:snakeyaml | 1.31 / 1.31 |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-9w3m-gqgf-c4p9 |
github | alphagov | pay-connector | org.yaml:snakeyaml | 1.31 / 1.31 |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mjmj-j48q-9wg2 |
github | alphagov | pay-connector | org.yaml:snakeyaml | 1.31 / 1.31 |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-w37g-rhq8-7m4j |
github | alphagov | pay-connector | org.yaml:snakeyaml | 1.31 / 1.31 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-9w3m-gqgf-c4p9 |
github | alphagov | pay-connector | org.yaml:snakeyaml | 1.31 / 1.31 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mjmj-j48q-9wg2 |
github | alphagov | pay-connector | org.yaml:snakeyaml | 1.31 / 1.31 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-w37g-rhq8-7m4j |
github | alphagov | pay-connector | xerces:xercesImpl | 2.12.0 / 2.12.0 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-h65f-jvqw-m9fj |
github | alphagov | pay-connector | xerces:xercesImpl | 2.12.0 / 2.12.0 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-w4jq-qh47-hvjq |
github | alphagov | pay-publicapi | com.amazonaws:aws-java-sdk-s3 | 1.11.587 / 1.11.587 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-c28r-hw5m-5gv3 |
github | alphagov | pay-publicapi | com.amazonaws:aws-java-sdk-s3 | 1.11.587 / 1.11.587 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-c28r-hw5m-5gv3 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-27xj-rqx5-2255 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-288c-cq4h-88gq |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-4w82-r329-3q67 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-57j2-w4cx-62h2 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-58pp-9c76-5625 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5949-rw7g-wx7w |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5p34-5m6p-p58g |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5ww9-j83m-q7qx |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-6fpp-rgj9-8rwc |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-758m-v56v-grj4 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-85cw-hj65-qqv9 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-89qr-369f-5m5x |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-8c4j-34r4-xr8g |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-8w26-6f25-cm9x |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-95cm-88f5-f2c7 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-9gph-22xh-8x98 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-9m6f-7xcq-8vf8 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-9vvp-fxw6-jcxr |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-c265-37vj-cwcc |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-c2q3-4qrh-fm48 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-cf6r-3wgc-h863 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-cmfg-87vq-g5g4 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-cvm9-fjm9-3572 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-f3j5-rmmp-3fc5 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-f9xh-2qgp-cq57 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-fmmc-742q-jg75 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-fqwf-pjwf-7vqv |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-gjmw-vf9h-g25v |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-gwp4-hfv6-p7hw |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-gww7-p5w4-wrfv |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-h3cw-g4mq-c5x2 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-h4rc-386g-6m85 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-h822-r4r5-v8jg |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-j823-4qch-3rgm |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-jjjh-jjxp-wpff |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-m6x4-97wx-4q27 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mc6h-4qgp-37qh |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mph4-vhrx-mv67 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mx7p-6679-8g3q |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-p43x-xfjf-5jhr |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-q93h-jc49-78gg |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-qjw2-hr98-qgfh |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-qmqc-x3r4-6v39 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-r3gr-cxrf-hg25 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-r695-7vr9-jgc2 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-rf6r-2c4q-2vwg |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-rgv9-q543-rqg4 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-rpr3-cw39-3pxh |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-v3xw-c963-f5hc |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-v585-23hc-c647 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-vfqx-33qm-g869 |
github | alphagov | pay-publicapi | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-wh8g-3j2c-rqj5 |
github | alphagov | pay-publicapi | com.google.code.gson:gson | 2.8.6 / 2.8.6 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-4jrv-ppp4-jm57 |
github | alphagov | pay-publicapi | com.google.code.gson:gson | 2.8.6 / 2.8.6 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-4jrv-ppp4-jm57 |
github | alphagov | pay-publicapi | com.google.guava:guava | 16.0.1 / 16.0.1 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | alphagov | pay-publicapi | com.google.guava:guava | 16.0.1 / 16.0.1 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | alphagov | pay-publicapi | com.google.guava:guava | 16.0.1 / 16.0.1 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mvr2-9pj6-7w5j |
github | alphagov | pay-publicapi | com.google.guava:guava | 18.0 / 18.0 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | alphagov | pay-publicapi | com.google.guava:guava | 18.0 / 18.0 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | alphagov | pay-publicapi | com.google.guava:guava | 18.0 / 18.0 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mvr2-9pj6-7w5j |
github | alphagov | pay-publicapi | com.google.guava:guava | 31.1-jre / 31.1-jre |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | alphagov | pay-publicapi | com.google.guava:guava | 31.1-jre / 31.1-jre |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | alphagov | pay-publicapi | commons-beanutils:commons-beanutils | 1.7.0 / 1.7.0 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-6phf-73q6-gh87 |
github | alphagov | pay-publicapi | commons-fileupload:commons-fileupload | 1.4 / 1.4 | ["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-hfrx-6qgj-fp6c |
github | alphagov | pay-publicapi | commons-io:commons-io | 2.5 / 2.5 | ["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-gwrp-pvrq-jmwv |
github | alphagov | pay-publicapi | dom4j:dom4j | 1.1 / 1.1 | ["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-6pcc-3rfx-4gpm |
github | alphagov | pay-publicapi | dom4j:dom4j | 1.1 / 1.1 | ["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-hwj3-m3p6-hj38 |
github | alphagov | pay-publicapi | io.netty:netty-codec | 4.1.30.Final / 4.1.30.Final |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-9vjp-v76f-g363 |
github | alphagov | pay-publicapi | io.netty:netty-codec | 4.1.30.Final / 4.1.30.Final |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-grg4-wf29-r9vv |
github | alphagov | pay-publicapi | io.netty:netty-codec-http | 4.1.9.Final / 4.1.9.Final |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-269q-hmxg-m83q |
github | alphagov | pay-publicapi | io.netty:netty-codec-http | 4.1.9.Final / 4.1.9.Final |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5mcr-gq6c-3hq2 |
github | alphagov | pay-publicapi | io.netty:netty-codec-http | 4.1.9.Final / 4.1.9.Final |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-cqqj-4p63-rrmm |
github | alphagov | pay-publicapi | io.netty:netty-codec-http | 4.1.9.Final / 4.1.9.Final |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-wx5j-54mm-rqqq |
github | alphagov | pay-publicapi | io.netty:netty-handler | 4.1.30.Final / 4.1.30.Final |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-6mjq-h674-j845 |
github | alphagov | pay-publicapi | io.netty:netty-handler | 4.1.30.Final / 4.1.30.Final |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mm9x-g8pc-w292 |
github | alphagov | pay-publicapi | io.netty:netty-handler | 4.1.30.Final / 4.1.30.Final |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-p2v9-g2qv-p635 |
github | alphagov | pay-publicapi | junit:junit | 4.12 / 4.12 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-269g-pwp5-87pp |
github | alphagov | pay-publicapi | net.minidev:json-smart | 2.4.8 / 2.4.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-493p-pfq6-5258 |
github | alphagov | pay-publicapi | org.apache.commons:commons-compress | 1.18 / 1.18 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-53x6-4x5p-rrvv |
github | alphagov | pay-publicapi | org.apache.commons:commons-compress | 1.18 / 1.18 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-7hfm-57qf-j43q |
github | alphagov | pay-publicapi | org.apache.commons:commons-compress | 1.18 / 1.18 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-crv7-7245-f45f |
github | alphagov | pay-publicapi | org.apache.commons:commons-compress | 1.18 / 1.18 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mc84-pj99-q6hh |
github | alphagov | pay-publicapi | org.apache.commons:commons-compress | 1.18 / 1.18 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-xqfj-vm6h-2x34 |
github | alphagov | pay-publicapi | org.apache.commons:commons-compress | 1.23.0 / 1.23.0 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-cgwf-w82q-5jrr |
github | alphagov | pay-publicapi | org.apache.httpcomponents:httpclient | 4.5.5 / 4.5.5 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-7r82-7xv7-xcpj |
github | alphagov | pay-publicapi | org.apache.httpcomponents:httpclient | 4.5.5 / 4.5.5 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-7r82-7xv7-xcpj |
github | alphagov | pay-publicapi | org.apache.maven:maven-core | 3.2.5 / 3.2.5 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-2f88-5hg8-9x2x |
github | alphagov | pay-publicapi | org.apache.velocity:velocity | 1.7 / 1.7 | ["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-59j4-wjwp-mw9m |
github | alphagov | pay-publicapi | org.apache.velocity:velocity-tools | 2.0 / 2.0 | ["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-fh63-4r66-jc7v |
github | alphagov | pay-publicapi | org.bouncycastle:bcprov-jdk15on | 1.60 / 1.60 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-6xx3-rg99-gc3p |
github | alphagov | pay-publicapi | org.bouncycastle:bcprov-jdk15on | 1.60 / 1.60 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-hr8g-6v94-x4m9 |
github | alphagov | pay-publicapi | org.codehaus.groovy:groovy | 2.5.6 / 2.5.6 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-rcjj-h6gh-jf3r |
github | alphagov | pay-publicapi | org.codehaus.groovy:groovy | 2.5.6 / 2.5.6 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-rcjj-h6gh-jf3r |
github | alphagov | pay-publicapi | org.codehaus.plexus:plexus-archiver | 4.7.1 / 4.7.1 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-wh3p-fphp-9h2m |
github | alphagov | pay-publicapi | org.eclipse.jetty:jetty-http | 9.4.49.v20220914 / 9.4.49.v20220914 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-hmr7-m48g-48f6 |
github | alphagov | pay-publicapi | org.eclipse.jetty:jetty-http | 9.4.51.v20230217 / 9.4.51.v20230217 |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-hmr7-m48g-48f6 |
github | alphagov | pay-publicapi | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-p26g-97m4-6q7c |
github | alphagov | pay-publicapi | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-qw69-rqj8-6qw8 |
github | alphagov | pay-publicapi | org.eclipse.jetty:jetty-servlets | 9.4.49.v20220914 / 9.4.49.v20220914 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-3gh6-v5v9-6v9j |
github | alphagov | pay-publicapi | org.eclipse.jetty:jetty-servlets | 9.4.51.v20230217 / 9.4.51.v20230217 |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-3gh6-v5v9-6v9j |
github | alphagov | pay-publicapi | org.eclipse.jetty:jetty-xml | 9.4.49.v20220914 / 9.4.49.v20220914 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-58qw-p7qm-5rvh |
github | alphagov | pay-publicapi | org.jetbrains.kotlin:kotlin-stdlib | 1.3.71 / 1.3.71 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-2qp4-g3q3-f92w |
github | alphagov | pay-publicapi | org.jetbrains.kotlin:kotlin-stdlib | 1.3.71 / 1.3.71 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-cqj8-47ch-rvvq |
github | alphagov | pay-publicapi | org.jetbrains.kotlin:kotlin-stdlib | 1.3.71 / 1.3.71 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-2qp4-g3q3-f92w |
github | alphagov | pay-publicapi | org.jetbrains.kotlin:kotlin-stdlib | 1.3.71 / 1.3.71 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-cqj8-47ch-rvvq |
github | alphagov | pay-publicapi | org.json:json | 20160212 / 20160212 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-3vqj-43w4-2q58 |
github | alphagov | pay-publicapi | org.yaml:snakeyaml | 1.31 / 1.31 |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-9w3m-gqgf-c4p9 |
github | alphagov | pay-publicapi | org.yaml:snakeyaml | 1.31 / 1.31 |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mjmj-j48q-9wg2 |
github | alphagov | pay-publicapi | org.yaml:snakeyaml | 1.31 / 1.31 |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-w37g-rhq8-7m4j |
github | alphagov | pay-publicapi | org.yaml:snakeyaml | 1.31 / 1.31 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-9w3m-gqgf-c4p9 |
github | alphagov | pay-publicapi | org.yaml:snakeyaml | 1.31 / 1.31 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mjmj-j48q-9wg2 |
github | alphagov | pay-publicapi | org.yaml:snakeyaml | 1.31 / 1.31 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-w37g-rhq8-7m4j |
github | alphagov | pay-selfservice | @cypress/request | 2.88.11 / 2.88.11 |
["dependencies","lockfile"] | package.json | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-p8p7-x288-28g6 |
github | alphagov | pay-selfservice | @cypress/request | 2.88.11 / 2.88.11 |
["overrides"] | package.json | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-p8p7-x288-28g6 |
github | alphagov | pay-selfservice | passport | 0.5.3 / 0.5.3 |
["dependencies","lockfile"] | package.json | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-v923-w3x8-wh69 |
github | alphagov | pay-selfservice | passport | 0.5.x / 0.5.3 |
["dependencies"] | package.json | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-v923-w3x8-wh69 |
github | alphagov | pay-selfservice | request | 2.88.2 / 2.88.2 |
["dependencies","lockfile"] | package.json | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-p8p7-x288-28g6 |
github | alphagov | pay-selfservice | request | 2.88.2 / 2.88.2 |
["dependencies"] | package.json | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-p8p7-x288-28g6 |
github | alphagov | pay-selfservice | tough-cookie | 2.5.0 / 2.5.0 |
["dependencies","lockfile"] | package.json | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 |
github | alphagov | pay-webhooks | com.amazonaws:aws-java-sdk-s3 | 1.11.587 / 1.11.587 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-c28r-hw5m-5gv3 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-27xj-rqx5-2255 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-288c-cq4h-88gq |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-4w82-r329-3q67 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-57j2-w4cx-62h2 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-58pp-9c76-5625 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5949-rw7g-wx7w |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5p34-5m6p-p58g |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5ww9-j83m-q7qx |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-6fpp-rgj9-8rwc |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-758m-v56v-grj4 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-85cw-hj65-qqv9 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-89qr-369f-5m5x |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-8c4j-34r4-xr8g |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-8w26-6f25-cm9x |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-95cm-88f5-f2c7 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-9gph-22xh-8x98 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-9m6f-7xcq-8vf8 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-9vvp-fxw6-jcxr |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-c265-37vj-cwcc |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-c2q3-4qrh-fm48 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-cf6r-3wgc-h863 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-cmfg-87vq-g5g4 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-cvm9-fjm9-3572 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-f3j5-rmmp-3fc5 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-f9xh-2qgp-cq57 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-fmmc-742q-jg75 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-fqwf-pjwf-7vqv |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-gjmw-vf9h-g25v |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-gwp4-hfv6-p7hw |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-gww7-p5w4-wrfv |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-h3cw-g4mq-c5x2 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-h4rc-386g-6m85 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-h822-r4r5-v8jg |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-j823-4qch-3rgm |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-jjjh-jjxp-wpff |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-m6x4-97wx-4q27 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mc6h-4qgp-37qh |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mph4-vhrx-mv67 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mx7p-6679-8g3q |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-p43x-xfjf-5jhr |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-q93h-jc49-78gg |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-qjw2-hr98-qgfh |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-qmqc-x3r4-6v39 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-r3gr-cxrf-hg25 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-r695-7vr9-jgc2 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-rf6r-2c4q-2vwg |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-rgv9-q543-rqg4 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-rpr3-cw39-3pxh |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-v3xw-c963-f5hc |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-v585-23hc-c647 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-vfqx-33qm-g869 |
github | alphagov | pay-webhooks | com.fasterxml.jackson.core:jackson-databind | 2.9.8 / 2.9.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-wh8g-3j2c-rqj5 |
github | alphagov | pay-webhooks | com.google.code.gson:gson | 2.8.1 / 2.8.1 |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-4jrv-ppp4-jm57 |
github | alphagov | pay-webhooks | com.google.code.gson:gson | 2.8.1 / 2.8.1 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-4jrv-ppp4-jm57 |
github | alphagov | pay-webhooks | com.google.guava:guava | 18.0 / 18.0 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | alphagov | pay-webhooks | com.google.guava:guava | 18.0 / 18.0 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | alphagov | pay-webhooks | com.google.guava:guava | 18.0 / 18.0 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mvr2-9pj6-7w5j |
github | alphagov | pay-webhooks | com.google.guava:guava | 31.1-jre / 31.1-jre |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | alphagov | pay-webhooks | com.google.guava:guava | 31.1-jre / 31.1-jre |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | alphagov | pay-webhooks | com.google.guava:guava | 31.1-jre / 31.1-jre |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | alphagov | pay-webhooks | com.google.guava:guava | 31.1-jre / 31.1-jre |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | alphagov | pay-webhooks | commons-fileupload:commons-fileupload | 1.4 / 1.4 | ["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-hfrx-6qgj-fp6c |
github | alphagov | pay-webhooks | io.netty:netty-handler | 4.1.86.Final / 4.1.86.Final |
["build","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-6mjq-h674-j845 |
github | alphagov | pay-webhooks | io.netty:netty-handler | 4.1.86.Final / 4.1.86.Final |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-6mjq-h674-j845 |
github | alphagov | pay-webhooks | net.minidev:json-smart | 2.4.8 / 2.4.8 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-493p-pfq6-5258 |
github | alphagov | pay-webhooks | org.apache.commons:commons-text | 1.9 / 1.9 | ["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-599f-7c49-w659 |
github | alphagov | pay-webhooks | org.apache.httpcomponents:httpclient | 4.5.5 / 4.5.5 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-7r82-7xv7-xcpj |
github | alphagov | pay-webhooks | org.bouncycastle:bcprov-jdk15on | 1.60 / 1.60 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-6xx3-rg99-gc3p |
github | alphagov | pay-webhooks | org.bouncycastle:bcprov-jdk15on | 1.60 / 1.60 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-hr8g-6v94-x4m9 |
github | alphagov | pay-webhooks | org.codehaus.groovy:groovy | 2.5.6 / 2.5.6 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-rcjj-h6gh-jf3r |
github | alphagov | pay-webhooks | org.eclipse.jetty:jetty-http | 9.4.48.v20220622 / 9.4.48.v20220622 |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-hmr7-m48g-48f6 |
github | alphagov | pay-webhooks | org.eclipse.jetty:jetty-http | 9.4.49.v20220914 / 9.4.49.v20220914 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-hmr7-m48g-48f6 |
github | alphagov | pay-webhooks | org.eclipse.jetty:jetty-server | 9.4.48.v20220622 / 9.4.48.v20220622 |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-p26g-97m4-6q7c |
github | alphagov | pay-webhooks | org.eclipse.jetty:jetty-server | 9.4.48.v20220622 / 9.4.48.v20220622 |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-qw69-rqj8-6qw8 |
github | alphagov | pay-webhooks | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-p26g-97m4-6q7c |
github | alphagov | pay-webhooks | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-qw69-rqj8-6qw8 |
github | alphagov | pay-webhooks | org.eclipse.jetty:jetty-servlets | 9.4.48.v20220622 / 9.4.48.v20220622 |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-3gh6-v5v9-6v9j |
github | alphagov | pay-webhooks | org.eclipse.jetty:jetty-servlets | 9.4.49.v20220914 / 9.4.49.v20220914 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-3gh6-v5v9-6v9j |
github | alphagov | pay-webhooks | org.eclipse.jetty:jetty-xml | 9.4.49.v20220914 / 9.4.49.v20220914 |
["test","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-58qw-p7qm-5rvh |
github | alphagov | pay-webhooks | org.yaml:snakeyaml | 1.31 / 1.31 |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-9w3m-gqgf-c4p9 |
github | alphagov | pay-webhooks | org.yaml:snakeyaml | 1.31 / 1.31 |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-mjmj-j48q-9wg2 |
github | alphagov | pay-webhooks | org.yaml:snakeyaml | 1.31 / 1.31 |
["compile","missing-data"] | pom.xml | GDS Pay | SECURITY | Package is vulnerable to CVE GHSA-w37g-rhq8-7m4j |
github | alphagov | pay-webhooks-----cyclone | com.google.guava:guava | 31.1-jre / 31.1-jre |
[] | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 | ||
github | alphagov | pay-webhooks-----cyclone | com.google.guava:guava | 31.1-jre / 31.1-jre |
[] | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 | ||
github | alphagov | pay-webhooks-----cyclone | log4j:log4j | 1.2.16 / 1.2.16 |
[] | SECURITY | Package is vulnerable to CVE GHSA-2qrg-x229-3v8q | ||
github | alphagov | pay-webhooks-----cyclone | log4j:log4j | 1.2.16 / 1.2.16 |
[] | SECURITY | Package is vulnerable to CVE GHSA-65fg-84f6-3jq3 | ||
github | alphagov | pay-webhooks-----cyclone | log4j:log4j | 1.2.16 / 1.2.16 |
[] | SECURITY | Package is vulnerable to CVE GHSA-f7vh-qwp3-x37m | ||
github | alphagov | pay-webhooks-----cyclone | log4j:log4j | 1.2.16 / 1.2.16 |
[] | SECURITY | Package is vulnerable to CVE GHSA-fp5r-v3w9-4333 | ||
github | alphagov | pay-webhooks-----cyclone | log4j:log4j | 1.2.16 / 1.2.16 |
[] | SECURITY | Package is vulnerable to CVE GHSA-w9p3-5cr8-m3jj | ||
github | alphagov | pay-webhooks-----cyclone | org.apache.ant:ant | 1.7.0 / 1.7.0 |
[] | SECURITY | Package is vulnerable to CVE GHSA-4p6w-m9wc-c9c9 | ||
github | alphagov | pay-webhooks-----cyclone | org.apache.ant:ant | 1.7.0 / 1.7.0 |
[] | SECURITY | Package is vulnerable to CVE GHSA-5v34-g2px-j4fw | ||
github | alphagov | pay-webhooks-----cyclone | org.apache.ant:ant | 1.7.0 / 1.7.0 |
[] | SECURITY | Package is vulnerable to CVE GHSA-f62v-xpxf-3v68 | ||
github | alphagov | pay-webhooks-----cyclone | org.apache.ant:ant | 1.7.0 / 1.7.0 |
[] | SECURITY | Package is vulnerable to CVE GHSA-q5r4-cfpx-h6fh | ||
github | alphagov | pay-webhooks-----cyclone | org.eclipse.jetty:jetty-http | 9.4.49.v20220914 / 9.4.49.v20220914 |
[] | SECURITY | Package is vulnerable to CVE GHSA-hmr7-m48g-48f6 | ||
github | alphagov | pay-webhooks-----cyclone | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
[] | SECURITY | Package is vulnerable to CVE GHSA-p26g-97m4-6q7c | ||
github | alphagov | pay-webhooks-----cyclone | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
[] | SECURITY | Package is vulnerable to CVE GHSA-qw69-rqj8-6qw8 | ||
github | alphagov | pay-webhooks-----cyclone | org.eclipse.jetty:jetty-servlets | 9.4.49.v20220914 / 9.4.49.v20220914 |
[] | SECURITY | Package is vulnerable to CVE GHSA-3gh6-v5v9-6v9j | ||
github | alphagov | pay-webhooks-----cyclone | org.eclipse.jetty:jetty-xml | 9.4.49.v20220914 / 9.4.49.v20220914 |
[] | SECURITY | Package is vulnerable to CVE GHSA-58qw-p7qm-5rvh | ||
github | alphagov | pay-webhooks-----cyclone | org.yaml:snakeyaml | 1.31 / 1.31 |
[] | SECURITY | Package is vulnerable to CVE GHSA-9w3m-gqgf-c4p9 | ||
github | alphagov | pay-webhooks-----cyclone | org.yaml:snakeyaml | 1.31 / 1.31 |
[] | SECURITY | Package is vulnerable to CVE GHSA-mjmj-j48q-9wg2 | ||
github | alphagov | pay-webhooks-----cyclone | org.yaml:snakeyaml | 1.31 / 1.31 |
[] | SECURITY | Package is vulnerable to CVE GHSA-w37g-rhq8-7m4j | ||
github | alphagov | pay-webhooks-----spdx | com.google.guava:guava | 31.1-jre / 31.1-jre |
[] | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 | ||
github | alphagov | pay-webhooks-----spdx | com.google.guava:guava | 31.1-jre / 31.1-jre |
[] | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 | ||
github | alphagov | pay-webhooks-----spdx | log4j:log4j | 1.2.16 / 1.2.16 |
[] | SECURITY | Package is vulnerable to CVE GHSA-2qrg-x229-3v8q | ||
github | alphagov | pay-webhooks-----spdx | log4j:log4j | 1.2.16 / 1.2.16 |
[] | SECURITY | Package is vulnerable to CVE GHSA-65fg-84f6-3jq3 | ||
github | alphagov | pay-webhooks-----spdx | log4j:log4j | 1.2.16 / 1.2.16 |
[] | SECURITY | Package is vulnerable to CVE GHSA-f7vh-qwp3-x37m | ||
github | alphagov | pay-webhooks-----spdx | log4j:log4j | 1.2.16 / 1.2.16 |
[] | SECURITY | Package is vulnerable to CVE GHSA-fp5r-v3w9-4333 | ||
github | alphagov | pay-webhooks-----spdx | log4j:log4j | 1.2.16 / 1.2.16 |
[] | SECURITY | Package is vulnerable to CVE GHSA-w9p3-5cr8-m3jj | ||
github | alphagov | pay-webhooks-----spdx | org.apache.ant:ant | 1.7.0 / 1.7.0 |
[] | SECURITY | Package is vulnerable to CVE GHSA-4p6w-m9wc-c9c9 | ||
github | alphagov | pay-webhooks-----spdx | org.apache.ant:ant | 1.7.0 / 1.7.0 |
[] | SECURITY | Package is vulnerable to CVE GHSA-5v34-g2px-j4fw | ||
github | alphagov | pay-webhooks-----spdx | org.apache.ant:ant | 1.7.0 / 1.7.0 |
[] | SECURITY | Package is vulnerable to CVE GHSA-f62v-xpxf-3v68 | ||
github | alphagov | pay-webhooks-----spdx | org.apache.ant:ant | 1.7.0 / 1.7.0 |
[] | SECURITY | Package is vulnerable to CVE GHSA-q5r4-cfpx-h6fh | ||
github | alphagov | pay-webhooks-----spdx | org.eclipse.jetty:jetty-http | 9.4.49.v20220914 / 9.4.49.v20220914 |
[] | SECURITY | Package is vulnerable to CVE GHSA-hmr7-m48g-48f6 | ||
github | alphagov | pay-webhooks-----spdx | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
[] | SECURITY | Package is vulnerable to CVE GHSA-p26g-97m4-6q7c | ||
github | alphagov | pay-webhooks-----spdx | org.eclipse.jetty:jetty-server | 9.4.49.v20220914 / 9.4.49.v20220914 |
[] | SECURITY | Package is vulnerable to CVE GHSA-qw69-rqj8-6qw8 | ||
github | alphagov | pay-webhooks-----spdx | org.eclipse.jetty:jetty-servlets | 9.4.49.v20220914 / 9.4.49.v20220914 |
[] | SECURITY | Package is vulnerable to CVE GHSA-3gh6-v5v9-6v9j | ||
github | alphagov | pay-webhooks-----spdx | org.eclipse.jetty:jetty-xml | 9.4.49.v20220914 / 9.4.49.v20220914 |
[] | SECURITY | Package is vulnerable to CVE GHSA-58qw-p7qm-5rvh | ||
github | alphagov | pay-webhooks-----spdx | org.yaml:snakeyaml | 1.31 / 1.31 |
[] | SECURITY | Package is vulnerable to CVE GHSA-9w3m-gqgf-c4p9 | ||
github | alphagov | pay-webhooks-----spdx | org.yaml:snakeyaml | 1.31 / 1.31 |
[] | SECURITY | Package is vulnerable to CVE GHSA-mjmj-j48q-9wg2 | ||
github | alphagov | pay-webhooks-----spdx | org.yaml:snakeyaml | 1.31 / 1.31 |
[] | SECURITY | Package is vulnerable to CVE GHSA-w37g-rhq8-7m4j | ||
github | cloud-custodian | cloud-custodian | github.com/aws/aws-sdk-go | v1.34.0 / v1.34.0 |
["require"] | tools/omnissm/go.mod | SECURITY | Package is vulnerable to CVE GO-2022-0646 | |
github | cloud-custodian | cloud-custodian | golang.org/x/net | v0.7.0 / v0.7.0 |
["indirect"] | tools/cask/go.mod | SECURITY | Package is vulnerable to CVE GO-2023-1988 | |
github | cloud-custodian | cloud-custodian | golang.org/x/net | v0.7.0 / v0.7.0 |
["indirect"] | tools/omnissm/go.mod | SECURITY | Package is vulnerable to CVE GO-2023-1988 | |
github | co-cddo | api-spec-linter | vm2 | ^3.9.8 / 3.9.13 |
["lockfile","lockfile-yarn-pinning-^3.9.8"] | package.json | CDDO | SECURITY | Package is vulnerable to CVE GHSA-7jxr-cg7f-gpgv |
github | co-cddo | api-spec-linter | vm2 | ^3.9.8 / 3.9.13 |
["lockfile","lockfile-yarn-pinning-^3.9.8"] | package.json | CDDO | SECURITY | Package is vulnerable to CVE GHSA-cchq-frgv-rjh5 |
github | co-cddo | api-spec-linter | vm2 | ^3.9.8 / 3.9.13 |
["lockfile","lockfile-yarn-pinning-^3.9.8"] | package.json | CDDO | SECURITY | Package is vulnerable to CVE GHSA-ch3r-j5x3-6q2m |
github | co-cddo | api-spec-linter | vm2 | ^3.9.8 / 3.9.13 |
["lockfile","lockfile-yarn-pinning-^3.9.8"] | package.json | CDDO | SECURITY | Package is vulnerable to CVE GHSA-g644-9gfx-q4q4 |
github | co-cddo | api-spec-linter | vm2 | ^3.9.8 / 3.9.13 |
["lockfile","lockfile-yarn-pinning-^3.9.8"] | package.json | CDDO | SECURITY | Package is vulnerable to CVE GHSA-p5gc-c584-jj6v |
github | co-cddo | api-spec-linter | vm2 | ^3.9.8 / 3.9.13 |
["lockfile","lockfile-yarn-pinning-^3.9.8"] | package.json | CDDO | SECURITY | Package is vulnerable to CVE GHSA-whpj-8f3w-67p5 |
github | co-cddo | api-spec-linter | vm2 | ^3.9.8 / 3.9.13 |
["lockfile","lockfile-yarn-pinning-^3.9.8"] | package.json | CDDO | SECURITY | Package is vulnerable to CVE GHSA-xj72-wvfv-8985 |
github | co-cddo | api-spec-linter | word-wrap | ~1.2.3 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-~1.2.3"] | package.json | CDDO | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 |
github | co-cddo | federated-api-model | com.fasterxml.jackson.core:jackson-databind | 2.13.2 / 2.13.2 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-57j2-w4cx-62h2 |
github | co-cddo | federated-api-model | com.fasterxml.jackson.core:jackson-databind | 2.13.2 / 2.13.2 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-jjjh-jjxp-wpff |
github | co-cddo | federated-api-model | com.fasterxml.jackson.core:jackson-databind | 2.13.2 / 2.13.2 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-rgv9-q543-rqg4 |
github | co-cddo | federated-api-model | com.google.code.gson:gson | 2.8.6 / 2.8.6 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-4jrv-ppp4-jm57 |
github | co-cddo | federated-api-model | com.google.guava:guava | 28.2-android / 28.2-android |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | co-cddo | federated-api-model | com.google.guava:guava | 28.2-android / 28.2-android |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | co-cddo | federated-api-model | fast-json-patch | 2.2.1 / 2.2.1 |
["dependencies","lockfile"] | schemas/package.json | CDDO | SECURITY | Package is vulnerable to CVE GHSA-8gh8-hqwg-xf34 |
github | co-cddo | federated-api-model | junit:junit | 4.13 / 4.13 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-269g-pwp5-87pp |
github | co-cddo | federated-api-model | org.codehaus.groovy:groovy | 2.5.4 / 2.5.4 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-rcjj-h6gh-jf3r |
github | co-cddo | federated-api-model | org.eclipse.jgit:org.eclipse.jgit | 5.13.1.202206130422-r / 5.13.1.202206130422-r |
["dependencies","missing-data"] | examples/java/buildSrc/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-3p86-9955-h393 |
github | co-cddo | federated-api-model | org.springframework.boot:spring-boot-autoconfigure | 2.6.3 / 2.6.3 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-xf96-w227-r7c4 |
github | co-cddo | federated-api-model | org.springframework.boot:spring-boot-starter-web | 2.6.3 / 2.6.3 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-36p3-wjmg-h94x |
github | co-cddo | federated-api-model | org.springframework:spring-beans | 5.3.15 / 5.3.15 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-36p3-wjmg-h94x |
github | co-cddo | federated-api-model | org.springframework:spring-core | 5.3.19 / 5.3.19 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-564r-hj7v-mcr5 |
github | co-cddo | federated-api-model | org.springframework:spring-core | 5.3.19 / 5.3.19 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-hh26-6xwr-ggv7 |
github | co-cddo | federated-api-model | org.springframework:spring-core | 5.3.19 / 5.3.19 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-rqph-vqwm-22vc |
github | co-cddo | federated-api-model | org.springframework:spring-core | 5.3.19 / 5.3.19 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-wxqc-pxw9-g2p8 |
github | co-cddo | federated-api-model | org.springframework:spring-core | 5.3.23 / 5.3.23 |
["dependencies","missing-data"] | examples/java/buildSrc/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-564r-hj7v-mcr5 |
github | co-cddo | federated-api-model | org.springframework:spring-core | 5.3.23 / 5.3.23 |
["dependencies","missing-data"] | examples/java/buildSrc/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-wxqc-pxw9-g2p8 |
github | co-cddo | federated-api-model | org.springframework:spring-expression | 5.3.15 / 5.3.15 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-558x-2xjg-6232 |
github | co-cddo | federated-api-model | org.springframework:spring-web | 5.3.15 / 5.3.15 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-4wrc-f8pq-fpqp |
github | co-cddo | federated-api-model | org.springframework:spring-webmvc | 5.3.15 / 5.3.15 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-36p3-wjmg-h94x |
github | co-cddo | federated-api-model | org.yaml:snakeyaml | 1.29 / 1.29 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-3mc7-4q67-w48m |
github | co-cddo | federated-api-model | org.yaml:snakeyaml | 1.29 / 1.29 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-98wm-3w3q-mw94 |
github | co-cddo | federated-api-model | org.yaml:snakeyaml | 1.29 / 1.29 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-9w3m-gqgf-c4p9 |
github | co-cddo | federated-api-model | org.yaml:snakeyaml | 1.29 / 1.29 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-c4r9-r8fh-9vj2 |
github | co-cddo | federated-api-model | org.yaml:snakeyaml | 1.29 / 1.29 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-hhhw-99gj-p3c3 |
github | co-cddo | federated-api-model | org.yaml:snakeyaml | 1.29 / 1.29 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-mjmj-j48q-9wg2 |
github | co-cddo | federated-api-model | org.yaml:snakeyaml | 1.29 / 1.29 |
["dependencies","missing-data"] | examples/java/spring-boot/build.gradle | CDDO | SECURITY | Package is vulnerable to CVE GHSA-w37g-rhq8-7m4j |
github | co-cddo | federated-api-model | vm2 | 3.9.11 / 3.9.11 |
["dependencies","lockfile"] | schemas/package.json | CDDO | SECURITY | Package is vulnerable to CVE GHSA-7jxr-cg7f-gpgv |
github | co-cddo | federated-api-model | vm2 | 3.9.11 / 3.9.11 |
["dependencies","lockfile"] | schemas/package.json | CDDO | SECURITY | Package is vulnerable to CVE GHSA-cchq-frgv-rjh5 |
github | co-cddo | federated-api-model | vm2 | 3.9.11 / 3.9.11 |
["dependencies","lockfile"] | schemas/package.json | CDDO | SECURITY | Package is vulnerable to CVE GHSA-ch3r-j5x3-6q2m |
github | co-cddo | federated-api-model | vm2 | 3.9.11 / 3.9.11 |
["dependencies","lockfile"] | schemas/package.json | CDDO | SECURITY | Package is vulnerable to CVE GHSA-g644-9gfx-q4q4 |
github | co-cddo | federated-api-model | vm2 | 3.9.11 / 3.9.11 |
["dependencies","lockfile"] | schemas/package.json | CDDO | SECURITY | Package is vulnerable to CVE GHSA-p5gc-c584-jj6v |
github | co-cddo | federated-api-model | vm2 | 3.9.11 / 3.9.11 |
["dependencies","lockfile"] | schemas/package.json | CDDO | SECURITY | Package is vulnerable to CVE GHSA-whpj-8f3w-67p5 |
github | co-cddo | federated-api-model | vm2 | 3.9.11 / 3.9.11 |
["dependencies","lockfile"] | schemas/package.json | CDDO | SECURITY | Package is vulnerable to CVE GHSA-xj72-wvfv-8985 |
github | co-cddo | federated-api-model | word-wrap | 1.2.3 / 1.2.3 |
["dependencies","lockfile"] | schemas/package.json | CDDO | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 |
github | cucumber | cucumber-jvm | ch.qos.logback:logback-core | 1.2.5 / 1.2.5 |
["compile","missing-data"] | examples/wicket-java-junit4/wicket-main/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-668q-qrv7-99fm | |
github | cucumber | cucumber-jvm | com.fasterxml.jackson.core:jackson-databind | 2.10.4 / 2.10.4 |
["build","missing-data"] | pom.xml | SECURITY | Package is vulnerable to CVE GHSA-288c-cq4h-88gq | |
github | cucumber | cucumber-jvm | com.fasterxml.jackson.core:jackson-databind | 2.10.4 / 2.10.4 |
["build","missing-data"] | pom.xml | SECURITY | Package is vulnerable to CVE GHSA-3x8x-79m2-3w2w | |
github | cucumber | cucumber-jvm | com.fasterxml.jackson.core:jackson-databind | 2.10.4 / 2.10.4 |
["build","missing-data"] | pom.xml | SECURITY | Package is vulnerable to CVE GHSA-57j2-w4cx-62h2 | |
github | cucumber | cucumber-jvm | com.fasterxml.jackson.core:jackson-databind | 2.10.4 / 2.10.4 |
["build","missing-data"] | pom.xml | SECURITY | Package is vulnerable to CVE GHSA-jjjh-jjxp-wpff | |
github | cucumber | cucumber-jvm | com.fasterxml.jackson.core:jackson-databind | 2.10.4 / 2.10.4 |
["build","missing-data"] | pom.xml | SECURITY | Package is vulnerable to CVE GHSA-rgv9-q543-rqg4 | |
github | cucumber | cucumber-jvm | com.google.guava:guava | 13.0.1 / 13.0.1 |
["test","missing-data"] | cucumber-deltaspike/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 | |
github | cucumber | cucumber-jvm | com.google.guava:guava | 13.0.1 / 13.0.1 |
["test","missing-data"] | cucumber-deltaspike/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 | |
github | cucumber | cucumber-jvm | com.google.guava:guava | 13.0.1 / 13.0.1 |
["test","missing-data"] | cucumber-deltaspike/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-mvr2-9pj6-7w5j | |
github | cucumber | cucumber-jvm | com.google.guava:guava | 16.0.1 / 16.0.1 |
["build","missing-data"] | cucumber-archetype/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 | |
github | cucumber | cucumber-jvm | com.google.guava:guava | 16.0.1 / 16.0.1 |
["build","missing-data"] | cucumber-archetype/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 | |
github | cucumber | cucumber-jvm | com.google.guava:guava | 16.0.1 / 16.0.1 |
["build","missing-data"] | cucumber-archetype/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-mvr2-9pj6-7w5j | |
github | cucumber | cucumber-jvm | com.google.guava:guava | 16.0.1 / 16.0.1 |
["build","missing-data"] | cucumber-java/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 | |
github | cucumber | cucumber-jvm | com.google.guava:guava | 16.0.1 / 16.0.1 |
["build","missing-data"] | cucumber-java/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 | |
github | cucumber | cucumber-jvm | com.google.guava:guava | 16.0.1 / 16.0.1 |
["build","missing-data"] | cucumber-java/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-mvr2-9pj6-7w5j | |
github | cucumber | cucumber-jvm | com.google.guava:guava | 16.0.1 / 16.0.1 |
["build","missing-data"] | cucumber-java8/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 | |
github | cucumber | cucumber-jvm | com.google.guava:guava | 16.0.1 / 16.0.1 |
["build","missing-data"] | cucumber-java8/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 | |
github | cucumber | cucumber-jvm | com.google.guava:guava | 16.0.1 / 16.0.1 |
["build","missing-data"] | cucumber-java8/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-mvr2-9pj6-7w5j | |
github | cucumber | cucumber-jvm | com.google.guava:guava | 25.0-jre / 25.0-jre |
["test","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 | |
github | cucumber | cucumber-jvm | com.google.guava:guava | 25.0-jre / 25.0-jre |
["test","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 | |
github | cucumber | cucumber-jvm | com.google.guava:guava | 25.1-android / 25.1-android |
["build","missing-data"] | cucumber-kotlin-java8/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 | |
github | cucumber | cucumber-jvm | com.google.guava:guava | 25.1-android / 25.1-android |
["build","missing-data"] | cucumber-kotlin-java8/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 | |
github | cucumber | cucumber-jvm | com.google.guava:guava | 31.0.1-jre / 31.0.1-jre |
["provided","missing-data"] | cucumber-guice/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 | |
github | cucumber | cucumber-jvm | com.google.guava:guava | 31.0.1-jre / 31.0.1-jre |
["provided","missing-data"] | cucumber-guice/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 | |
github | cucumber | cucumber-jvm | com.squareup.okio:okio | 1.14.0 / 1.14.0 |
["test","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-w33c-445m-f8w7 | |
github | cucumber | cucumber-jvm | commons-fileupload:commons-fileupload | 1.4 / 1.4 | ["compile","missing-data"] | examples/wicket-java-junit4/wicket-main/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-hfrx-6qgj-fp6c | |
github | cucumber | cucumber-jvm | commons-io:commons-io | 2.5 / 2.5 | ["build","missing-data"] | examples/spring-java-junit5/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-gwrp-pvrq-jmwv | |
github | cucumber | cucumber-jvm | commons-io:commons-io | 2.5 / 2.5 | ["build","missing-data"] | pom.xml | SECURITY | Package is vulnerable to CVE GHSA-gwrp-pvrq-jmwv | |
github | cucumber | cucumber-jvm | commons-io:commons-io | 2.6 / 2.6 | ["build","missing-data"] | cucumber-kotlin-java8/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-gwrp-pvrq-jmwv | |
github | cucumber | cucumber-jvm | commons-net:commons-net | 3.8.0 / 3.8.0 |
["test","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-cgp8-4m63-fhh5 | |
github | cucumber | cucumber-jvm | dom4j:dom4j | 1.1 / 1.1 | ["build","missing-data"] | pom.xml | SECURITY | Package is vulnerable to CVE GHSA-6pcc-3rfx-4gpm | |
github | cucumber | cucumber-jvm | dom4j:dom4j | 1.1 / 1.1 | ["build","missing-data"] | pom.xml | SECURITY | Package is vulnerable to CVE GHSA-hwj3-m3p6-hj38 | |
github | cucumber | cucumber-jvm | log4j:log4j | 1.2.17 / 1.2.17 |
["provided","missing-data"] | cucumber-jakarta-openejb/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-2qrg-x229-3v8q | |
github | cucumber | cucumber-jvm | log4j:log4j | 1.2.17 / 1.2.17 |
["provided","missing-data"] | cucumber-jakarta-openejb/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-65fg-84f6-3jq3 | |
github | cucumber | cucumber-jvm | log4j:log4j | 1.2.17 / 1.2.17 |
["provided","missing-data"] | cucumber-jakarta-openejb/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-f7vh-qwp3-x37m | |
github | cucumber | cucumber-jvm | log4j:log4j | 1.2.17 / 1.2.17 |
["provided","missing-data"] | cucumber-jakarta-openejb/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-fp5r-v3w9-4333 | |
github | cucumber | cucumber-jvm | log4j:log4j | 1.2.17 / 1.2.17 |
["provided","missing-data"] | cucumber-jakarta-openejb/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-w9p3-5cr8-m3jj | |
github | cucumber | cucumber-jvm | log4j:log4j | 1.2.17 / 1.2.17 |
["provided","missing-data"] | cucumber-openejb/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-2qrg-x229-3v8q | |
github | cucumber | cucumber-jvm | log4j:log4j | 1.2.17 / 1.2.17 |
["provided","missing-data"] | cucumber-openejb/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-65fg-84f6-3jq3 | |
github | cucumber | cucumber-jvm | log4j:log4j | 1.2.17 / 1.2.17 |
["provided","missing-data"] | cucumber-openejb/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-f7vh-qwp3-x37m | |
github | cucumber | cucumber-jvm | log4j:log4j | 1.2.17 / 1.2.17 |
["provided","missing-data"] | cucumber-openejb/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-fp5r-v3w9-4333 | |
github | cucumber | cucumber-jvm | log4j:log4j | 1.2.17 / 1.2.17 |
["provided","missing-data"] | cucumber-openejb/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-w9p3-5cr8-m3jj | |
github | cucumber | cucumber-jvm | net.sourceforge.htmlunit:htmlunit | 2.52.0 / 2.52.0 |
["test","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-3xrr-7m6p-p7xh | |
github | cucumber | cucumber-jvm | net.sourceforge.htmlunit:neko-htmlunit | 2.52.0 / 2.52.0 |
["test","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-6jmm-mp6w-4rrg | |
github | cucumber | cucumber-jvm | org.apache.ant:ant | 1.7.0 / 1.7.0 |
["build","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-4p6w-m9wc-c9c9 | |
github | cucumber | cucumber-jvm | org.apache.ant:ant | 1.7.0 / 1.7.0 |
["build","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-5v34-g2px-j4fw | |
github | cucumber | cucumber-jvm | org.apache.ant:ant | 1.7.0 / 1.7.0 |
["build","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-f62v-xpxf-3v68 | |
github | cucumber | cucumber-jvm | org.apache.ant:ant | 1.7.0 / 1.7.0 |
["build","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-q5r4-cfpx-h6fh | |
github | cucumber | cucumber-jvm | org.apache.commons:commons-compress | 1.19 / 1.19 |
["build","missing-data"] | examples/spring-java-junit5/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7hfm-57qf-j43q | |
github | cucumber | cucumber-jvm | org.apache.commons:commons-compress | 1.19 / 1.19 |
["build","missing-data"] | examples/spring-java-junit5/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-crv7-7245-f45f | |
github | cucumber | cucumber-jvm | org.apache.commons:commons-compress | 1.19 / 1.19 |
["build","missing-data"] | examples/spring-java-junit5/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-mc84-pj99-q6hh | |
github | cucumber | cucumber-jvm | org.apache.commons:commons-compress | 1.19 / 1.19 |
["build","missing-data"] | examples/spring-java-junit5/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-xqfj-vm6h-2x34 | |
github | cucumber | cucumber-jvm | org.apache.commons:commons-text | 1.9 / 1.9 | ["test","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-599f-7c49-w659 | |
github | cucumber | cucumber-jvm | org.apache.maven.shared:maven-shared-utils | 3.2.0 / 3.2.0 |
["build","missing-data"] | pom.xml | SECURITY | Package is vulnerable to CVE GHSA-rhgr-952r-6p8q | |
github | cucumber | cucumber-jvm | org.apache.maven.shared:maven-shared-utils | 3.2.1 / 3.2.1 |
["build","missing-data"] | examples/spring-java-junit5/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-rhgr-952r-6p8q | |
github | cucumber | cucumber-jvm | org.apache.maven:maven-core | 3.0 / 3.0 | ["build","missing-data"] | examples/spring-java-junit5/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-2f88-5hg8-9x2x | |
github | cucumber | cucumber-jvm | org.apache.maven:maven-core | 3.2.5 / 3.2.5 |
["build","missing-data"] | cucumber-archetype/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-2f88-5hg8-9x2x | |
github | cucumber | cucumber-jvm | org.apache.maven:maven-core | 3.2.5 / 3.2.5 |
["build","missing-data"] | cucumber-java/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-2f88-5hg8-9x2x | |
github | cucumber | cucumber-jvm | org.apache.maven:maven-core | 3.2.5 / 3.2.5 |
["build","missing-data"] | cucumber-java8/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-2f88-5hg8-9x2x | |
github | cucumber | cucumber-jvm | org.apache.maven:maven-core | 3.2.5 / 3.2.5 |
["build","missing-data"] | pom.xml | SECURITY | Package is vulnerable to CVE GHSA-2f88-5hg8-9x2x | |
github | cucumber | cucumber-jvm | org.apache.velocity:velocity | 1.7 / 1.7 | ["build","missing-data"] | pom.xml | SECURITY | Package is vulnerable to CVE GHSA-59j4-wjwp-mw9m | |
github | cucumber | cucumber-jvm | org.apache.velocity:velocity-tools | 2.0 / 2.0 | ["build","missing-data"] | pom.xml | SECURITY | Package is vulnerable to CVE GHSA-fh63-4r66-jc7v | |
github | cucumber | cucumber-jvm | org.codehaus.plexus:plexus-archiver | 1.0 / 1.0 | ["build","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-hcxq-x77q-3469 | |
github | cucumber | cucumber-jvm | org.codehaus.plexus:plexus-archiver | 1.0 / 1.0 | ["build","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-wh3p-fphp-9h2m | |
github | cucumber | cucumber-jvm | org.codehaus.plexus:plexus-archiver | 4.2.1 / 4.2.1 |
["build","missing-data"] | examples/spring-java-junit5/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-wh3p-fphp-9h2m | |
github | cucumber | cucumber-jvm | org.codehaus.plexus:plexus-utils | 2.0.0 / 2.0.0 |
["build","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-8vhq-qq4p-grq3 | |
github | cucumber | cucumber-jvm | org.codehaus.plexus:plexus-utils | 2.0.0 / 2.0.0 |
["build","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-g6ph-x5wf-g337 | |
github | cucumber | cucumber-jvm | org.codehaus.plexus:plexus-utils | 2.0.0 / 2.0.0 |
["build","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-jcwr-x25h-x5fh | |
github | cucumber | cucumber-jvm | org.codehaus.plexus:plexus-utils | 2.0.4 / 2.0.4 |
["test","missing-data"] | cucumber-deltaspike/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-8vhq-qq4p-grq3 | |
github | cucumber | cucumber-jvm | org.codehaus.plexus:plexus-utils | 2.0.4 / 2.0.4 |
["test","missing-data"] | cucumber-deltaspike/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-g6ph-x5wf-g337 | |
github | cucumber | cucumber-jvm | org.codehaus.plexus:plexus-utils | 2.0.4 / 2.0.4 |
["test","missing-data"] | cucumber-deltaspike/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-jcwr-x25h-x5fh | |
github | cucumber | cucumber-jvm | org.eclipse.jetty:jetty-http | 9.4.43.v20210629 / 9.4.43.v20210629 |
["test","missing-data"] | examples/wicket-java-junit4/wicket-main/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-cj7v-27pg-wf7q | |
github | cucumber | cucumber-jvm | org.eclipse.jetty:jetty-http | 9.4.43.v20210629 / 9.4.43.v20210629 |
["test","missing-data"] | examples/wicket-java-junit4/wicket-main/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-hmr7-m48g-48f6 | |
github | cucumber | cucumber-jvm | org.eclipse.jetty:jetty-http | 9.4.43.v20210629 / 9.4.43.v20210629 |
["test","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-cj7v-27pg-wf7q | |
github | cucumber | cucumber-jvm | org.eclipse.jetty:jetty-http | 9.4.43.v20210629 / 9.4.43.v20210629 |
["test","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-hmr7-m48g-48f6 | |
github | cucumber | cucumber-jvm | org.eclipse.jetty:jetty-server | 9.4.43.v20210629 / 9.4.43.v20210629 |
["test","missing-data"] | examples/wicket-java-junit4/wicket-main/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-p26g-97m4-6q7c | |
github | cucumber | cucumber-jvm | org.eclipse.jetty:jetty-server | 9.4.43.v20210629 / 9.4.43.v20210629 |
["test","missing-data"] | examples/wicket-java-junit4/wicket-main/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-qw69-rqj8-6qw8 | |
github | cucumber | cucumber-jvm | org.jdom:jdom | 1.1.3 / 1.1.3 |
["build","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-2363-cqg2-863c | |
github | cucumber | cucumber-jvm | org.slf4j:slf4j-ext | 1.7.2 / 1.7.2 |
["test","missing-data"] | cucumber-deltaspike/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-w77p-8cfg-2x43 | |
github | cucumber | cucumber-jvm | org.springframework:spring-core | 6.0.3 / 6.0.3 |
["build","missing-data"] | examples/spring-java-junit5/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-564r-hj7v-mcr5 | |
github | cucumber | cucumber-jvm | org.springframework:spring-core | 6.0.3 / 6.0.3 |
["build","missing-data"] | examples/spring-java-junit5/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-wxqc-pxw9-g2p8 | |
github | cucumber | cucumber-jvm | org.testng:testng | 7.5 / 7.5 | ["provided","missing-data"] | cucumber-jakarta-openejb/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-rc2q-x9mf-w3vf | |
github | cucumber | cucumber-jvm | xalan:xalan | 2.7.2 / 2.7.2 |
["test","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-9339-86wc-4qgf | |
github | cucumber | cucumber-jvm | xerces:xercesImpl | 2.12.0 / 2.12.0 |
["test","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-h65f-jvqw-m9fj | |
github | cucumber | cucumber-jvm | xerces:xercesImpl | 2.12.0 / 2.12.0 |
["test","missing-data"] | examples/wicket-java-junit4/wicket-test/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-w4jq-qh47-hvjq | |
github | deepmap | oapi-codegen | github.com/gofiber/fiber/v2 | v2.49.1 / v2.49.1 |
["require"] | examples/go.mod | SECURITY | Package is vulnerable to CVE GHSA-3q5p-3558-364f | |
github | deepmap | oapi-codegen | github.com/gofiber/fiber/v2 | v2.49.1 / v2.49.1 |
["require"] | examples/go.mod | SECURITY | Package is vulnerable to CVE GO-2023-2052 | |
github | deepmap | oapi-codegen | github.com/gofiber/fiber/v2 | v2.49.1 / v2.49.1 |
["require"] | go.mod | SECURITY | Package is vulnerable to CVE GHSA-3q5p-3558-364f | |
github | deepmap | oapi-codegen | github.com/gofiber/fiber/v2 | v2.49.1 / v2.49.1 |
["require"] | go.mod | SECURITY | Package is vulnerable to CVE GO-2023-2052 | |
github | deepmap | oapi-codegen | github.com/gofiber/fiber/v2 | v2.49.1 / v2.49.1 |
["require"] | internal/test/go.mod | SECURITY | Package is vulnerable to CVE GHSA-3q5p-3558-364f | |
github | deepmap | oapi-codegen | github.com/gofiber/fiber/v2 | v2.49.1 / v2.49.1 |
["require"] | internal/test/go.mod | SECURITY | Package is vulnerable to CVE GO-2023-2052 | |
github | deepmap | oapi-codegen | github.com/gomarkdown/markdown | v0.0.0-20230716120725-531d2d74bc12 / v0.0.0-20230716120725-531d2d74bc12 |
["indirect"] | examples/go.mod | SECURITY | Package is vulnerable to CVE GHSA-m9xq-6h2j-65r2 | |
github | deepmap | oapi-codegen | github.com/gomarkdown/markdown | v0.0.0-20230716120725-531d2d74bc12 / v0.0.0-20230716120725-531d2d74bc12 |
["indirect"] | examples/go.mod | SECURITY | Package is vulnerable to CVE GO-2023-2074 | |
github | deepmap | oapi-codegen | github.com/gomarkdown/markdown | v0.0.0-20230716120725-531d2d74bc12 / v0.0.0-20230716120725-531d2d74bc12 |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE GHSA-m9xq-6h2j-65r2 | |
github | deepmap | oapi-codegen | github.com/gomarkdown/markdown | v0.0.0-20230716120725-531d2d74bc12 / v0.0.0-20230716120725-531d2d74bc12 |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE GO-2023-2074 | |
github | deepmap | oapi-codegen | github.com/gomarkdown/markdown | v0.0.0-20230716120725-531d2d74bc12 / v0.0.0-20230716120725-531d2d74bc12 |
["indirect"] | internal/test/go.mod | SECURITY | Package is vulnerable to CVE GHSA-m9xq-6h2j-65r2 | |
github | deepmap | oapi-codegen | github.com/gomarkdown/markdown | v0.0.0-20230716120725-531d2d74bc12 / v0.0.0-20230716120725-531d2d74bc12 |
["indirect"] | internal/test/go.mod | SECURITY | Package is vulnerable to CVE GO-2023-2074 | |
github | elastic | beats | PyYAML | ==5.3.1 / 5.3.1 |
[] | libbeat/tests/system/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8q59-q68h-6hv4 |
github | elastic | beats | PyYAML | ==5.3.1 / 5.3.1 |
[] | libbeat/tests/system/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-142 |
github | elastic | beats | PyYAML | ==5.3.1 / 5.3.1 |
[] | metricbeat/module/kubernetes/_meta/terraform/eks/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8q59-q68h-6hv4 |
github | elastic | beats | PyYAML | ==5.3.1 / 5.3.1 |
[] | metricbeat/module/kubernetes/_meta/terraform/eks/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-142 |
github | elastic | beats | certifi | ==2022.12.7 / 2022.12.7 |
[] | libbeat/tests/system/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-xqr8-7jwr-rhp7 |
github | elastic | beats | certifi | ==2022.12.7 / 2022.12.7 |
[] | libbeat/tests/system/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2023-135 |
github | elastic | beats | github.com/aws/aws-sdk-go | v1.38.60 / v1.38.60 |
["indirect"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE GO-2022-0646 |
github | elastic | beats | github.com/cyphar/filepath-securejoin | v0.2.3 / v0.2.3 |
["indirect"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6xv5-86q9-7xr8 |
github | elastic | beats | github.com/cyphar/filepath-securejoin | v0.2.3 / v0.2.3 |
["indirect"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE GO-2023-2048 |
github | elastic | beats | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["require"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-1229 |
github | elastic | beats | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["require"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-1249 |
github | elastic | beats | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["require"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-1314 |
github | elastic | beats | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["require"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-1678 |
github | elastic | beats | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["require"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-1695 |
github | elastic | beats | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["require"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-281 |
github | elastic | beats | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["require"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-308 |
github | elastic | beats | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["require"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-333 |
github | elastic | beats | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["require"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-347 |
github | elastic | beats | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["require"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-349 |
github | elastic | beats | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["require"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-520 |
github | elastic | beats | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["require"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-541 |
github | elastic | beats | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["require"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-581 |
github | elastic | beats | golang.org/x/net | v0.10.0 / v0.10.0 |
["require"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE GO-2023-1988 |
github | elastic | beats | protobuf | ==3.19.4 / 3.19.4 |
[] | auditbeat/tests/system/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8gq9-2x98-w8hf |
github | elastic | beats | protobuf | ==3.19.4 / 3.19.4 |
[] | dev-tools/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8gq9-2x98-w8hf |
github | elastic | beats | protobuf | ==3.19.4 / 3.19.4 |
[] | heartbeat/tests/system/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8gq9-2x98-w8hf |
github | elastic | beats | protobuf | ==3.19.4 / 3.19.4 |
[] | libbeat/tests/system/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8gq9-2x98-w8hf |
github | elastic | beats | protobuf | ==3.19.4 / 3.19.4 |
[] | metricbeat/module/kubernetes/_meta/terraform/eks/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8gq9-2x98-w8hf |
github | elastic | beats | protobuf | ==3.19.4 / 3.19.4 |
[] | metricbeat/tests/system/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8gq9-2x98-w8hf |
github | elastic | beats | protobuf | ==3.19.4 / 3.19.4 |
[] | packetbeat/tests/system/gen/memcache/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8gq9-2x98-w8hf |
github | elastic | beats | protobuf | ==3.19.4 / 3.19.4 |
[] | x-pack/functionbeat/tests/system/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8gq9-2x98-w8hf |
github | elastic | beats | py | ==1.11.0 / 1.11.0 |
[] | libbeat/tests/system/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-w596-4wvx-j9j6 |
github | elastic | beats | py | ==1.11.0 / 1.11.0 |
[] | libbeat/tests/system/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2022-42969 |
github | elastic | cloudbeat | github.com/aws/aws-sdk-go | v1.45.5 / v1.45.5 |
["require"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE GO-2022-0646 |
github | elastic | cloudbeat | github.com/cyphar/filepath-securejoin | v0.2.3 / v0.2.3 |
["indirect"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6xv5-86q9-7xr8 |
github | elastic | cloudbeat | github.com/cyphar/filepath-securejoin | v0.2.3 / v0.2.3 |
["indirect"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE GO-2023-2048 |
github | elastic | cloudbeat | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["indirect"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-1229 |
github | elastic | cloudbeat | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["indirect"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-1249 |
github | elastic | cloudbeat | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["indirect"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-1314 |
github | elastic | cloudbeat | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["indirect"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-1678 |
github | elastic | cloudbeat | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["indirect"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-1695 |
github | elastic | cloudbeat | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["indirect"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-281 |
github | elastic | cloudbeat | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["indirect"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-308 |
github | elastic | cloudbeat | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["indirect"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-333 |
github | elastic | cloudbeat | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["indirect"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-347 |
github | elastic | cloudbeat | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["indirect"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-349 |
github | elastic | cloudbeat | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["indirect"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-520 |
github | elastic | cloudbeat | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["indirect"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-541 |
github | elastic | cloudbeat | github.com/google/flatbuffers | v23.3.3+incompatible / v23.3.3+incompatible |
["indirect"] | go.mod | Elastic | SECURITY | Package is vulnerable to CVE OSV-2021-581 |
github | elastic | elasticsearch | com.fasterxml.jackson.core:jackson-databind | 2.10.5.1 / 2.10.5.1 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3x8x-79m2-3w2w |
github | elastic | elasticsearch | com.fasterxml.jackson.core:jackson-databind | 2.10.5.1 / 2.10.5.1 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-57j2-w4cx-62h2 |
github | elastic | elasticsearch | com.fasterxml.jackson.core:jackson-databind | 2.10.5.1 / 2.10.5.1 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-jjjh-jjxp-wpff |
github | elastic | elasticsearch | com.fasterxml.jackson.core:jackson-databind | 2.10.5.1 / 2.10.5.1 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-rgv9-q543-rqg4 |
github | elastic | elasticsearch | com.fasterxml.jackson.core:jackson-databind | 2.12.3 / 2.12.3 |
["dependencies"] | plugins/examples/security-authorization-engine/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3x8x-79m2-3w2w |
github | elastic | elasticsearch | com.fasterxml.jackson.core:jackson-databind | 2.12.3 / 2.12.3 |
["dependencies"] | plugins/examples/security-authorization-engine/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-57j2-w4cx-62h2 |
github | elastic | elasticsearch | com.fasterxml.jackson.core:jackson-databind | 2.12.3 / 2.12.3 |
["dependencies"] | plugins/examples/security-authorization-engine/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-jjjh-jjxp-wpff |
github | elastic | elasticsearch | com.fasterxml.jackson.core:jackson-databind | 2.12.3 / 2.12.3 |
["dependencies"] | plugins/examples/security-authorization-engine/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-rgv9-q543-rqg4 |
github | elastic | elasticsearch | com.fasterxml.jackson.dataformat:jackson-dataformat-cbor | 2.8.1 / 2.8.1 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-xmc8-26q4-qjhx |
github | elastic | elasticsearch | com.fasterxml.woodstox:woodstox-core | 5.3.0 / 5.3.0 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3f7h-mf4q-vrm4 |
github | elastic | elasticsearch | com.fasterxml.woodstox:woodstox-core | 6.2.6 / 6.2.6 |
["dependencies","missing-data"] | x-pack/plugin/identity-provider/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3f7h-mf4q-vrm4 |
github | elastic | elasticsearch | com.fasterxml.woodstox:woodstox-core | 6.2.6 / 6.2.6 |
["dependencies","missing-data"] | x-pack/plugin/security/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3f7h-mf4q-vrm4 |
github | elastic | elasticsearch | com.github.tomakehurst:wiremock-jre8-standalone | 2.23.2 / 2.23.2 |
["dependencies"] | gradle/build.versions.toml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pmxq-pj47-j8j4 |
github | elastic | elasticsearch | com.google.code.gson:gson | 2.2.4 / 2.2.4 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4jrv-ppp4-jm57 |
github | elastic | elasticsearch | com.google.code.gson:gson | 2.2.4 / 2.2.4 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4jrv-ppp4-jm57 |
github | elastic | elasticsearch | com.google.guava:guava | 11.0.2 / 11.0.2 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | elastic | elasticsearch | com.google.guava:guava | 11.0.2 / 11.0.2 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | elastic | elasticsearch | com.google.guava:guava | 11.0.2 / 11.0.2 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mvr2-9pj6-7w5j |
github | elastic | elasticsearch | com.google.guava:guava | 18.0 / 18.0 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | elastic | elasticsearch | com.google.guava:guava | 18.0 / 18.0 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | elastic | elasticsearch | com.google.guava:guava | 18.0 / 18.0 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mvr2-9pj6-7w5j |
github | elastic | elasticsearch | com.google.guava:guava | 27.0-jre / 27.0-jre |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | elastic | elasticsearch | com.google.guava:guava | 27.0-jre / 27.0-jre |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | elastic | elasticsearch | com.google.guava:guava | 28.0-jre / 28.0-jre |
["dependencies","missing-data"] | modules/legacy-geo/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | elastic | elasticsearch | com.google.guava:guava | 28.0-jre / 28.0-jre |
["dependencies","missing-data"] | modules/legacy-geo/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | elastic | elasticsearch | com.google.guava:guava | 29.0-android / 29.0-android |
["dependencies","missing-data"] | plugins/discovery-gce/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | elastic | elasticsearch | com.google.guava:guava | 29.0-android / 29.0-android |
["dependencies","missing-data"] | plugins/discovery-gce/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | elastic | elasticsearch | com.google.guava:guava | 30.1-jre / 30.1-jre |
["dependencies","missing-data"] | x-pack/plugin/watcher/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | elastic | elasticsearch | com.google.guava:guava | 30.1-jre / 30.1-jre |
["dependencies","missing-data"] | x-pack/plugin/watcher/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | elastic | elasticsearch | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies","missing-data"] | gradle/build.versions.toml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | elastic | elasticsearch | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies","missing-data"] | gradle/build.versions.toml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | elastic | elasticsearch | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies","missing-data"] | modules/repository-gcs/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | elastic | elasticsearch | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies","missing-data"] | modules/repository-gcs/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | elastic | elasticsearch | com.google.protobuf:protobuf-java | 2.5.0 / 2.5.0 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4gg5-vx3j-xwc7 |
github | elastic | elasticsearch | com.google.protobuf:protobuf-java | 2.5.0 / 2.5.0 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-77rm-9x9h-xj3g |
github | elastic | elasticsearch | com.google.protobuf:protobuf-java | 2.5.0 / 2.5.0 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-g5ww-5jh7-63cx |
github | elastic | elasticsearch | com.google.protobuf:protobuf-java | 2.5.0 / 2.5.0 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-h4h5-3hr4-j3g2 |
github | elastic | elasticsearch | com.google.protobuf:protobuf-java | 2.5.0 / 2.5.0 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wrvw-hg22-4m67 |
github | elastic | elasticsearch | com.google.protobuf:protobuf-java | 2.5.0 / 2.5.0 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4gg5-vx3j-xwc7 |
github | elastic | elasticsearch | com.google.protobuf:protobuf-java | 2.5.0 / 2.5.0 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-77rm-9x9h-xj3g |
github | elastic | elasticsearch | com.google.protobuf:protobuf-java | 2.5.0 / 2.5.0 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-g5ww-5jh7-63cx |
github | elastic | elasticsearch | com.google.protobuf:protobuf-java | 2.5.0 / 2.5.0 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-h4h5-3hr4-j3g2 |
github | elastic | elasticsearch | com.google.protobuf:protobuf-java | 2.5.0 / 2.5.0 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wrvw-hg22-4m67 |
github | elastic | elasticsearch | com.google.protobuf:protobuf-java | 3.5.1 / 3.5.1 |
["dependencies","missing-data"] | x-pack/plugin/vector-tile/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4gg5-vx3j-xwc7 |
github | elastic | elasticsearch | com.google.protobuf:protobuf-java | 3.5.1 / 3.5.1 |
["dependencies","missing-data"] | x-pack/plugin/vector-tile/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-77rm-9x9h-xj3g |
github | elastic | elasticsearch | com.google.protobuf:protobuf-java | 3.5.1 / 3.5.1 |
["dependencies","missing-data"] | x-pack/plugin/vector-tile/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-g5ww-5jh7-63cx |
github | elastic | elasticsearch | com.google.protobuf:protobuf-java | 3.5.1 / 3.5.1 |
["dependencies","missing-data"] | x-pack/plugin/vector-tile/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-h4h5-3hr4-j3g2 |
github | elastic | elasticsearch | com.google.protobuf:protobuf-java | 3.5.1 / 3.5.1 |
["dependencies","missing-data"] | x-pack/plugin/vector-tile/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wrvw-hg22-4m67 |
github | elastic | elasticsearch | com.h2database:h2 | 1.4.197 / 1.4.197 |
["dependencies","missing-data"] | x-pack/plugin/sql/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-22wj-vf5f-wrvj |
github | elastic | elasticsearch | com.h2database:h2 | 1.4.197 / 1.4.197 |
["dependencies","missing-data"] | x-pack/plugin/sql/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-45hx-wfhj-473x |
github | elastic | elasticsearch | com.h2database:h2 | 1.4.197 / 1.4.197 |
["dependencies","missing-data"] | x-pack/plugin/sql/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-h376-j262-vhq6 |
github | elastic | elasticsearch | com.h2database:h2 | 1.4.197 / 1.4.197 |
["dependencies"] | x-pack/plugin/sql/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-22wj-vf5f-wrvj |
github | elastic | elasticsearch | com.h2database:h2 | 1.4.197 / 1.4.197 |
["dependencies"] | x-pack/plugin/sql/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-45hx-wfhj-473x |
github | elastic | elasticsearch | com.h2database:h2 | 1.4.197 / 1.4.197 |
["dependencies"] | x-pack/plugin/sql/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-h376-j262-vhq6 |
github | elastic | elasticsearch | com.jamesmurty.utils:java-xmlbuilder | 0.4 / 0.4 | ["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3vrc-rrpw-r5pw |
github | elastic | elasticsearch | com.nimbusds:nimbus-jose-jwt | 4.41.1 / 4.41.1 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f6vf-pq8c-69m4 |
github | elastic | elasticsearch | com.nimbusds:nimbus-jose-jwt | 4.41.2 / 4.41.2 |
["dependencies","missing-data"] | x-pack/plugin/security/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f6vf-pq8c-69m4 |
github | elastic | elasticsearch | com.nimbusds:nimbus-jose-jwt | 4.41.2 / 4.41.2 |
["dependencies","missing-data"] | x-pack/qa/evil-tests/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f6vf-pq8c-69m4 |
github | elastic | elasticsearch | com.squareup.okio:okio | 1.4.0 / 1.4.0 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-w33c-445m-f8w7 |
github | elastic | elasticsearch | com.squareup.okio:okio | 1.6.0 / 1.6.0 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-w33c-445m-f8w7 |
github | elastic | elasticsearch | commons-beanutils:commons-beanutils | 1.7.0 / 1.7.0 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6phf-73q6-gh87 |
github | elastic | elasticsearch | commons-io:commons-io | 2.2 / 2.2 | ["dependencies","missing-data"] | gradle/build.versions.toml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-gwrp-pvrq-jmwv |
github | elastic | elasticsearch | commons-io:commons-io | 2.2 / 2.2 | ["dependencies"] | gradle/build.versions.toml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-gwrp-pvrq-jmwv |
github | elastic | elasticsearch | commons-io:commons-io | 2.4 / 2.4 | ["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-gwrp-pvrq-jmwv |
github | elastic | elasticsearch | commons-io:commons-io | 2.5 / 2.5 | ["dependencies"] | x-pack/plugin/security/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-gwrp-pvrq-jmwv |
github | elastic | elasticsearch | commons-io:commons-io | 2.6 / 2.6 | ["dependencies","missing-data"] | x-pack/plugin/security/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-gwrp-pvrq-jmwv |
github | elastic | elasticsearch | commons-io:commons-io | 2.6 / 2.6 | ["dependencies","missing-data"] | x-pack/qa/evil-tests/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-gwrp-pvrq-jmwv |
github | elastic | elasticsearch | commons-net:commons-net | 3.1 / 3.1 | ["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cgp8-4m63-fhh5 |
github | elastic | elasticsearch | commons-net:commons-net | 3.6 / 3.6 | ["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cgp8-4m63-fhh5 |
github | elastic | elasticsearch | io.netty:netty | 3.10.6.Final / 3.10.6.Final |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5mcr-gq6c-3hq2 |
github | elastic | elasticsearch | io.netty:netty | 3.10.6.Final / 3.10.6.Final |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9vjp-v76f-g363 |
github | elastic | elasticsearch | io.netty:netty | 3.10.6.Final / 3.10.6.Final |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cqqj-4p63-rrmm |
github | elastic | elasticsearch | io.netty:netty | 3.10.6.Final / 3.10.6.Final |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f256-j965-7f32 |
github | elastic | elasticsearch | io.netty:netty | 3.10.6.Final / 3.10.6.Final |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-grg4-wf29-r9vv |
github | elastic | elasticsearch | io.netty:netty | 3.10.6.Final / 3.10.6.Final |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p2v9-g2qv-p635 |
github | elastic | elasticsearch | io.netty:netty | 3.10.6.Final / 3.10.6.Final |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wm47-8v5p-wjpj |
github | elastic | elasticsearch | io.netty:netty | 3.10.6.Final / 3.10.6.Final |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wx5j-54mm-rqqq |
github | elastic | elasticsearch | io.netty:netty | 3.10.6.Final / 3.10.6.Final |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5mcr-gq6c-3hq2 |
github | elastic | elasticsearch | io.netty:netty | 3.10.6.Final / 3.10.6.Final |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9vjp-v76f-g363 |
github | elastic | elasticsearch | io.netty:netty | 3.10.6.Final / 3.10.6.Final |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cqqj-4p63-rrmm |
github | elastic | elasticsearch | io.netty:netty | 3.10.6.Final / 3.10.6.Final |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f256-j965-7f32 |
github | elastic | elasticsearch | io.netty:netty | 3.10.6.Final / 3.10.6.Final |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-grg4-wf29-r9vv |
github | elastic | elasticsearch | io.netty:netty | 3.10.6.Final / 3.10.6.Final |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p2v9-g2qv-p635 |
github | elastic | elasticsearch | io.netty:netty | 3.10.6.Final / 3.10.6.Final |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wm47-8v5p-wjpj |
github | elastic | elasticsearch | io.netty:netty | 3.10.6.Final / 3.10.6.Final |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wx5j-54mm-rqqq |
github | elastic | elasticsearch | io.netty:netty | 3.6.2.Final / 3.6.2.Final |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5mcr-gq6c-3hq2 |
github | elastic | elasticsearch | io.netty:netty | 3.6.2.Final / 3.6.2.Final |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7vpq-g998-qpv7 |
github | elastic | elasticsearch | io.netty:netty | 3.6.2.Final / 3.6.2.Final |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9vjp-v76f-g363 |
github | elastic | elasticsearch | io.netty:netty | 3.6.2.Final / 3.6.2.Final |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cqqj-4p63-rrmm |
github | elastic | elasticsearch | io.netty:netty | 3.6.2.Final / 3.6.2.Final |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f256-j965-7f32 |
github | elastic | elasticsearch | io.netty:netty | 3.6.2.Final / 3.6.2.Final |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-grg4-wf29-r9vv |
github | elastic | elasticsearch | io.netty:netty | 3.6.2.Final / 3.6.2.Final |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p2v9-g2qv-p635 |
github | elastic | elasticsearch | io.netty:netty | 3.6.2.Final / 3.6.2.Final |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wm47-8v5p-wjpj |
github | elastic | elasticsearch | io.netty:netty | 3.6.2.Final / 3.6.2.Final |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wx5j-54mm-rqqq |
github | elastic | elasticsearch | io.netty:netty | 3.6.2.Final / 3.6.2.Final |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-xfv3-rrfm-f2rv |
github | elastic | elasticsearch | io.netty:netty-all | 4.0.23.Final / 4.0.23.Final |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p979-4mfw-53vg |
github | elastic | elasticsearch | io.netty:netty-all | 4.0.23.Final / 4.0.23.Final |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-rv63-gqm8-9w8q |
github | elastic | elasticsearch | io.netty:netty-codec | 4.1.42.Final / 4.1.42.Final |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9vjp-v76f-g363 |
github | elastic | elasticsearch | io.netty:netty-codec | 4.1.42.Final / 4.1.42.Final |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-grg4-wf29-r9vv |
github | elastic | elasticsearch | io.netty:netty-handler | 4.1.42.Final / 4.1.42.Final |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6mjq-h674-j845 |
github | elastic | elasticsearch | io.netty:netty-handler | 4.1.42.Final / 4.1.42.Final |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mm9x-g8pc-w292 |
github | elastic | elasticsearch | io.netty:netty-handler | 4.1.42.Final / 4.1.42.Final |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p2v9-g2qv-p635 |
github | elastic | elasticsearch | junit:junit | 4.12 / 4.12 |
["dependencies","missing-data"] | x-pack/plugin/security/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-269g-pwp5-87pp |
github | elastic | elasticsearch | log4j:log4j | 1.2.17 / 1.2.17 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-2qrg-x229-3v8q |
github | elastic | elasticsearch | log4j:log4j | 1.2.17 / 1.2.17 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-65fg-84f6-3jq3 |
github | elastic | elasticsearch | log4j:log4j | 1.2.17 / 1.2.17 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f7vh-qwp3-x37m |
github | elastic | elasticsearch | log4j:log4j | 1.2.17 / 1.2.17 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fp5r-v3w9-4333 |
github | elastic | elasticsearch | log4j:log4j | 1.2.17 / 1.2.17 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-w9p3-5cr8-m3jj |
github | elastic | elasticsearch | log4j:log4j | 1.2.17 / 1.2.17 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-2qrg-x229-3v8q |
github | elastic | elasticsearch | log4j:log4j | 1.2.17 / 1.2.17 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-65fg-84f6-3jq3 |
github | elastic | elasticsearch | log4j:log4j | 1.2.17 / 1.2.17 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f7vh-qwp3-x37m |
github | elastic | elasticsearch | log4j:log4j | 1.2.17 / 1.2.17 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fp5r-v3w9-4333 |
github | elastic | elasticsearch | log4j:log4j | 1.2.17 / 1.2.17 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-w9p3-5cr8-m3jj |
github | elastic | elasticsearch | log4j:log4j | 1.2.17 / 1.2.17 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-2qrg-x229-3v8q |
github | elastic | elasticsearch | log4j:log4j | 1.2.17 / 1.2.17 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-65fg-84f6-3jq3 |
github | elastic | elasticsearch | log4j:log4j | 1.2.17 / 1.2.17 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f7vh-qwp3-x37m |
github | elastic | elasticsearch | log4j:log4j | 1.2.17 / 1.2.17 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fp5r-v3w9-4333 |
github | elastic | elasticsearch | log4j:log4j | 1.2.17 / 1.2.17 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-w9p3-5cr8-m3jj |
github | elastic | elasticsearch | net.minidev:json-smart | 1.3.1 / 1.3.1 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-493p-pfq6-5258 |
github | elastic | elasticsearch | net.minidev:json-smart | 1.3.1 / 1.3.1 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fg2v-w576-w4v3 |
github | elastic | elasticsearch | net.minidev:json-smart | 1.3.1 / 1.3.1 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-v528-7hrm-frqp |
github | elastic | elasticsearch | net.minidev:json-smart | 2.3 / 2.3 | ["dependencies","missing-data"] | x-pack/plugin/security/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-493p-pfq6-5258 |
github | elastic | elasticsearch | net.minidev:json-smart | 2.3 / 2.3 | ["dependencies","missing-data"] | x-pack/plugin/security/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-v528-7hrm-frqp |
github | elastic | elasticsearch | net.minidev:json-smart | 2.3 / 2.3 | ["dependencies","missing-data"] | x-pack/qa/evil-tests/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-493p-pfq6-5258 |
github | elastic | elasticsearch | net.minidev:json-smart | 2.3 / 2.3 | ["dependencies","missing-data"] | x-pack/qa/evil-tests/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-v528-7hrm-frqp |
github | elastic | elasticsearch | net.minidev:json-smart | 2.4.2 / 2.4.2 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-493p-pfq6-5258 |
github | elastic | elasticsearch | net.minidev:json-smart | 2.4.2 / 2.4.2 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fg2v-w576-w4v3 |
github | elastic | elasticsearch | org.apache.commons:commons-compress | 1.18 / 1.18 |
["dependencies","missing-data"] | x-pack/plugin/sql/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-53x6-4x5p-rrvv |
github | elastic | elasticsearch | org.apache.commons:commons-compress | 1.18 / 1.18 |
["dependencies","missing-data"] | x-pack/plugin/sql/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7hfm-57qf-j43q |
github | elastic | elasticsearch | org.apache.commons:commons-compress | 1.18 / 1.18 |
["dependencies","missing-data"] | x-pack/plugin/sql/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-crv7-7245-f45f |
github | elastic | elasticsearch | org.apache.commons:commons-compress | 1.18 / 1.18 |
["dependencies","missing-data"] | x-pack/plugin/sql/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mc84-pj99-q6hh |
github | elastic | elasticsearch | org.apache.commons:commons-compress | 1.18 / 1.18 |
["dependencies","missing-data"] | x-pack/plugin/sql/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-xqfj-vm6h-2x34 |
github | elastic | elasticsearch | org.apache.commons:commons-compress | 1.19 / 1.19 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7hfm-57qf-j43q |
github | elastic | elasticsearch | org.apache.commons:commons-compress | 1.19 / 1.19 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-crv7-7245-f45f |
github | elastic | elasticsearch | org.apache.commons:commons-compress | 1.19 / 1.19 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mc84-pj99-q6hh |
github | elastic | elasticsearch | org.apache.commons:commons-compress | 1.19 / 1.19 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-xqfj-vm6h-2x34 |
github | elastic | elasticsearch | org.apache.commons:commons-compress | 1.4.1 / 1.4.1 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7hfm-57qf-j43q |
github | elastic | elasticsearch | org.apache.commons:commons-compress | 1.4.1 / 1.4.1 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-crv7-7245-f45f |
github | elastic | elasticsearch | org.apache.commons:commons-compress | 1.4.1 / 1.4.1 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hrmr-f5m6-m9pq |
github | elastic | elasticsearch | org.apache.commons:commons-compress | 1.4.1 / 1.4.1 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mc84-pj99-q6hh |
github | elastic | elasticsearch | org.apache.commons:commons-compress | 1.4.1 / 1.4.1 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-xqfj-vm6h-2x34 |
github | elastic | elasticsearch | org.apache.commons:commons-compress | 1.5 / 1.5 | ["dependencies","missing-data"] | gradle/build.versions.toml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7hfm-57qf-j43q |
github | elastic | elasticsearch | org.apache.commons:commons-compress | 1.5 / 1.5 | ["dependencies","missing-data"] | gradle/build.versions.toml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-crv7-7245-f45f |
github | elastic | elasticsearch | org.apache.commons:commons-compress | 1.5 / 1.5 | ["dependencies","missing-data"] | gradle/build.versions.toml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hrmr-f5m6-m9pq |
github | elastic | elasticsearch | org.apache.commons:commons-compress | 1.5 / 1.5 | ["dependencies","missing-data"] | gradle/build.versions.toml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mc84-pj99-q6hh |
github | elastic | elasticsearch | org.apache.commons:commons-compress | 1.5 / 1.5 | ["dependencies","missing-data"] | gradle/build.versions.toml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-xqfj-vm6h-2x34 |
github | elastic | elasticsearch | org.apache.hadoop:hadoop-common | 2.8.5 / 2.8.5 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8wm5-8h9c-47pc |
github | elastic | elasticsearch | org.apache.hadoop:hadoop-common | 2.8.5 / 2.8.5 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f8vc-wfc8-hxqh |
github | elastic | elasticsearch | org.apache.hadoop:hadoop-common | 2.8.5 / 2.8.5 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-gx2c-fvhc-ph4j |
github | elastic | elasticsearch | org.apache.hadoop:hadoop-common | 2.8.5 / 2.8.5 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-rmpj-7c96-mrg8 |
github | elastic | elasticsearch | org.apache.hadoop:hadoop-common | 3.3.1 / 3.3.1 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8wm5-8h9c-47pc |
github | elastic | elasticsearch | org.apache.hadoop:hadoop-common | 3.3.1 / 3.3.1 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-rmpj-7c96-mrg8 |
github | elastic | elasticsearch | org.apache.hadoop:hadoop-yarn-server-common | 2.8.5 / 2.8.5 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-58jx-f5rf-qgqf |
github | elastic | elasticsearch | org.apache.hadoop:hadoop-yarn-server-common | 3.3.1 / 3.3.1 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-58jx-f5rf-qgqf |
github | elastic | elasticsearch | org.apache.httpcomponents:httpclient | 4.5.10 / 4.5.10 |
["dependencies"] | gradle/build.versions.toml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7r82-7xv7-xcpj |
github | elastic | elasticsearch | org.apache.httpcomponents:httpclient | 4.5.2 / 4.5.2 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7r82-7xv7-xcpj |
github | elastic | elasticsearch | org.apache.kerby:ldap-backend | 1.1.1 / 1.1.1 |
["dependencies"] | x-pack/plugin/security/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-337f-xr2x-6fcf |
github | elastic | elasticsearch | org.apache.mina:mina-core | 2.0.16 / 2.0.16 |
["dependencies","missing-data"] | x-pack/plugin/security/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5h29-qq92-wj7f |
github | elastic | elasticsearch | org.apache.mina:mina-core | 2.0.16 / 2.0.16 |
["dependencies","missing-data"] | x-pack/plugin/security/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6mcm-j9cj-3vc3 |
github | elastic | elasticsearch | org.apache.mina:mina-core | 2.0.17 / 2.0.17 |
["dependencies"] | x-pack/plugin/security/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5h29-qq92-wj7f |
github | elastic | elasticsearch | org.apache.mina:mina-core | 2.0.17 / 2.0.17 |
["dependencies"] | x-pack/plugin/security/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6mcm-j9cj-3vc3 |
github | elastic | elasticsearch | org.apache.zookeeper:zookeeper | 3.4.6 / 3.4.6 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-2hw2-62cp-p9p7 |
github | elastic | elasticsearch | org.apache.zookeeper:zookeeper | 3.4.6 / 3.4.6 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7cwj-j333-x7f7 |
github | elastic | elasticsearch | org.apache.zookeeper:zookeeper | 3.4.6 / 3.4.6 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-ccqf-c5hq-77mp |
github | elastic | elasticsearch | org.bouncycastle:bc-fips | 1.0.2 / 1.0.2 |
["dependencies"] | build-tools-internal/src/main/groovy/elasticsearch.fips.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-68m8-v89j-7j2p |
github | elastic | elasticsearch | org.bouncycastle:bc-fips | 1.0.2 / 1.0.2 |
["dependencies"] | build-tools-internal/src/main/groovy/elasticsearch.fips.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6xx3-rg99-gc3p |
github | elastic | elasticsearch | org.bouncycastle:bc-fips | 1.0.2 / 1.0.2 |
["dependencies"] | distribution/tools/plugin-cli/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-68m8-v89j-7j2p |
github | elastic | elasticsearch | org.bouncycastle:bc-fips | 1.0.2 / 1.0.2 |
["dependencies"] | distribution/tools/plugin-cli/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6xx3-rg99-gc3p |
github | elastic | elasticsearch | org.bouncycastle:bc-fips | 1.0.2 / 1.0.2 |
["dependencies"] | x-pack/plugin/core/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-68m8-v89j-7j2p |
github | elastic | elasticsearch | org.bouncycastle:bc-fips | 1.0.2 / 1.0.2 |
["dependencies"] | x-pack/plugin/core/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6xx3-rg99-gc3p |
github | elastic | elasticsearch | org.bouncycastle:bc-fips | 1.0.2.3 / 1.0.2.3 |
["dependencies","missing-data"] | build-tools-internal/src/main/groovy/elasticsearch.fips.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-68m8-v89j-7j2p |
github | elastic | elasticsearch | org.bouncycastle:bc-fips | 1.0.2.3 / 1.0.2.3 |
["dependencies","missing-data"] | distribution/tools/plugin-cli/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-68m8-v89j-7j2p |
github | elastic | elasticsearch | org.bouncycastle:bcprov-jdk15on | 1.56 / 1.56 |
["dependencies","missing-data"] | x-pack/plugin/security/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6xx3-rg99-gc3p |
github | elastic | elasticsearch | org.bouncycastle:bcprov-jdk15on | 1.56 / 1.56 |
["dependencies","missing-data"] | x-pack/plugin/security/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hr8g-6v94-x4m9 |
github | elastic | elasticsearch | org.bouncycastle:bcprov-jdk15on | 1.60 / 1.60 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6xx3-rg99-gc3p |
github | elastic | elasticsearch | org.bouncycastle:bcprov-jdk15on | 1.60 / 1.60 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hr8g-6v94-x4m9 |
github | elastic | elasticsearch | org.bouncycastle:bcprov-jdk18on | 1.71 / 1.71 |
["dependencies","missing-data"] | x-pack/plugin/identity-provider/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hr8g-6v94-x4m9 |
github | elastic | elasticsearch | org.bouncycastle:bcprov-jdk18on | 1.71 / 1.71 |
["dependencies","missing-data"] | x-pack/plugin/security/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hr8g-6v94-x4m9 |
github | elastic | elasticsearch | org.codehaus.jackson:jackson-mapper-asl | 1.9.13 / 1.9.13 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c27h-mcmw-48hv |
github | elastic | elasticsearch | org.codehaus.jackson:jackson-mapper-asl | 1.9.13 / 1.9.13 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r6j9-8759-g62w |
github | elastic | elasticsearch | org.codehaus.jackson:jackson-mapper-asl | 1.9.13 / 1.9.13 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c27h-mcmw-48hv |
github | elastic | elasticsearch | org.codehaus.jackson:jackson-mapper-asl | 1.9.13 / 1.9.13 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r6j9-8759-g62w |
github | elastic | elasticsearch | org.codehaus.jettison:jettison | 1.1 / 1.1 | ["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-56h3-78gp-v83r |
github | elastic | elasticsearch | org.codehaus.jettison:jettison | 1.1 / 1.1 | ["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7rf3-mqpx-h7xg |
github | elastic | elasticsearch | org.codehaus.jettison:jettison | 1.1 / 1.1 | ["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-grr4-wv38-f68w |
github | elastic | elasticsearch | org.codehaus.jettison:jettison | 1.1 / 1.1 | ["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-q6g2-g7f3-rr83 |
github | elastic | elasticsearch | org.codehaus.jettison:jettison | 1.1 / 1.1 | ["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-x27m-9w8j-5vcw |
github | elastic | elasticsearch | org.codehaus.jettison:jettison | 1.1 / 1.1 | ["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-56h3-78gp-v83r |
github | elastic | elasticsearch | org.codehaus.jettison:jettison | 1.1 / 1.1 | ["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7rf3-mqpx-h7xg |
github | elastic | elasticsearch | org.codehaus.jettison:jettison | 1.1 / 1.1 | ["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-grr4-wv38-f68w |
github | elastic | elasticsearch | org.codehaus.jettison:jettison | 1.1 / 1.1 | ["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-q6g2-g7f3-rr83 |
github | elastic | elasticsearch | org.codehaus.jettison:jettison | 1.1 / 1.1 | ["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-x27m-9w8j-5vcw |
github | elastic | elasticsearch | org.codehaus.plexus:plexus-utils | 2.0.4 / 2.0.4 |
["dependencies","missing-data"] | modules/ingest-attachment/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8vhq-qq4p-grq3 |
github | elastic | elasticsearch | org.codehaus.plexus:plexus-utils | 2.0.4 / 2.0.4 |
["dependencies","missing-data"] | modules/ingest-attachment/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-g6ph-x5wf-g337 |
github | elastic | elasticsearch | org.codehaus.plexus:plexus-utils | 2.0.4 / 2.0.4 |
["dependencies","missing-data"] | modules/ingest-attachment/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-jcwr-x25h-x5fh |
github | elastic | elasticsearch | org.eclipse.jetty:jetty-http | 9.4.40.v20210413 / 9.4.40.v20210413 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cj7v-27pg-wf7q |
github | elastic | elasticsearch | org.eclipse.jetty:jetty-http | 9.4.40.v20210413 / 9.4.40.v20210413 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hmr7-m48g-48f6 |
github | elastic | elasticsearch | org.eclipse.jetty:jetty-server | 9.4.40.v20210413 / 9.4.40.v20210413 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-m6cp-vxjx-65j6 |
github | elastic | elasticsearch | org.eclipse.jetty:jetty-server | 9.4.40.v20210413 / 9.4.40.v20210413 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p26g-97m4-6q7c |
github | elastic | elasticsearch | org.eclipse.jetty:jetty-server | 9.4.40.v20210413 / 9.4.40.v20210413 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qw69-rqj8-6qw8 |
github | elastic | elasticsearch | org.eclipse.jetty:jetty-webapp | 9.4.40.v20210413 / 9.4.40.v20210413 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-vjv5-gp2w-65vm |
github | elastic | elasticsearch | org.eclipse.jetty:jetty-xml | 9.4.40.v20210413 / 9.4.40.v20210413 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-58qw-p7qm-5rvh |
github | elastic | elasticsearch | org.eclipse.jgit:org.eclipse.jgit | 6.5.0.202303070854-r / 6.5.0.202303070854-r |
["dependencies","missing-data"] | gradle/build.versions.toml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3p86-9955-h393 |
github | elastic | elasticsearch | org.elasticsearch:elasticsearch | 0.90.13 / 0.90.13 |
["dependencies"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3393-hvrj-w7v3 |
github | elastic | elasticsearch | org.elasticsearch:elasticsearch | 0.90.13 / 0.90.13 |
["dependencies"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-62ww-4p3p-7fhj |
github | elastic | elasticsearch | org.elasticsearch:elasticsearch | 0.90.13 / 0.90.13 |
["dependencies"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8699-m855-cwqf |
github | elastic | elasticsearch | org.elasticsearch:elasticsearch | 0.90.13 / 0.90.13 |
["dependencies"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c77j-p484-h84m |
github | elastic | elasticsearch | org.elasticsearch:elasticsearch | 0.90.13 / 0.90.13 |
["dependencies"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cqgv-256r-m9r8 |
github | elastic | elasticsearch | org.elasticsearch:elasticsearch | 0.90.13 / 0.90.13 |
["dependencies"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fh5x-4j57-6q5x |
github | elastic | elasticsearch | org.elasticsearch:elasticsearch | 0.90.13 / 0.90.13 |
["dependencies"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fj32-6v7m-57pg |
github | elastic | elasticsearch | org.elasticsearch:elasticsearch | 0.90.13 / 0.90.13 |
["dependencies"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-g9fw-9x87-rmrj |
github | elastic | elasticsearch | org.elasticsearch:elasticsearch | 0.90.13 / 0.90.13 |
["dependencies"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hr65-qq6p-87r4 |
github | elastic | elasticsearch | org.elasticsearch:elasticsearch | 0.90.13 / 0.90.13 |
["dependencies"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-jjq8-vfjq-j6v4 |
github | elastic | elasticsearch | org.elasticsearch:elasticsearch | 0.90.13 / 0.90.13 |
["dependencies"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-jqm6-m3j3-8gg9 |
github | elastic | elasticsearch | org.elasticsearch:elasticsearch | 0.90.13 / 0.90.13 |
["dependencies"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-w94p-6mhw-4qxw |
github | elastic | elasticsearch | org.elasticsearch:elasticsearch | 0.90.13 / 0.90.13 |
["dependencies"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-x8q8-4hp5-463w |
github | elastic | elasticsearch | org.elasticsearch:elasticsearch | 2.4.5 / 2.4.5 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3393-hvrj-w7v3 |
github | elastic | elasticsearch | org.elasticsearch:elasticsearch | 2.4.5 / 2.4.5 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-62ww-4p3p-7fhj |
github | elastic | elasticsearch | org.elasticsearch:elasticsearch | 2.4.5 / 2.4.5 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c77j-p484-h84m |
github | elastic | elasticsearch | org.elasticsearch:elasticsearch | 2.4.5 / 2.4.5 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cqgv-256r-m9r8 |
github | elastic | elasticsearch | org.elasticsearch:elasticsearch | 2.4.5 / 2.4.5 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fj32-6v7m-57pg |
github | elastic | elasticsearch | org.elasticsearch:elasticsearch | 2.4.5 / 2.4.5 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-g9fw-9x87-rmrj |
github | elastic | elasticsearch | org.elasticsearch:elasticsearch | 2.4.5 / 2.4.5 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hr65-qq6p-87r4 |
github | elastic | elasticsearch | org.elasticsearch:elasticsearch | 2.4.5 / 2.4.5 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-jqm6-m3j3-8gg9 |
github | elastic | elasticsearch | org.ini4j:ini4j | 0.5.2 / 0.5.2 |
["dependencies"] | x-pack/plugin/ml/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-jr6h-r7vg-f9mc |
github | elastic | elasticsearch | org.jsoup:jsoup | 1.13.1 / 1.13.1 |
["dependencies"] | modules/lang-painless/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-gp7f-rwcx-9369 |
github | elastic | elasticsearch | org.jsoup:jsoup | 1.13.1 / 1.13.1 |
["dependencies"] | modules/lang-painless/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-m72m-mhq2-9p6c |
github | elastic | elasticsearch | org.xerial.snappy:snappy-java | 1.0.4.1 / 1.0.4.1 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-55g7-9cwv-5qfv |
github | elastic | elasticsearch | org.xerial.snappy:snappy-java | 1.0.4.1 / 1.0.4.1 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fjpj-2g6w-x25r |
github | elastic | elasticsearch | org.xerial.snappy:snappy-java | 1.0.4.1 / 1.0.4.1 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pqr6-cmr2-h8hf |
github | elastic | elasticsearch | org.xerial.snappy:snappy-java | 1.0.4.1 / 1.0.4.1 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qcwq-55hx-v3vh |
github | elastic | elasticsearch | org.xerial.snappy:snappy-java | 1.1.8.2 / 1.1.8.2 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-55g7-9cwv-5qfv |
github | elastic | elasticsearch | org.xerial.snappy:snappy-java | 1.1.8.2 / 1.1.8.2 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fjpj-2g6w-x25r |
github | elastic | elasticsearch | org.xerial.snappy:snappy-java | 1.1.8.2 / 1.1.8.2 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pqr6-cmr2-h8hf |
github | elastic | elasticsearch | org.xerial.snappy:snappy-java | 1.1.8.2 / 1.1.8.2 |
["dependencies","missing-data"] | test/fixtures/hdfs3-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qcwq-55hx-v3vh |
github | elastic | elasticsearch | org.yaml:snakeyaml | 1.15 / 1.15 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3mc7-4q67-w48m |
github | elastic | elasticsearch | org.yaml:snakeyaml | 1.15 / 1.15 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-98wm-3w3q-mw94 |
github | elastic | elasticsearch | org.yaml:snakeyaml | 1.15 / 1.15 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9w3m-gqgf-c4p9 |
github | elastic | elasticsearch | org.yaml:snakeyaml | 1.15 / 1.15 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c4r9-r8fh-9vj2 |
github | elastic | elasticsearch | org.yaml:snakeyaml | 1.15 / 1.15 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hhhw-99gj-p3c3 |
github | elastic | elasticsearch | org.yaml:snakeyaml | 1.15 / 1.15 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mjmj-j48q-9wg2 |
github | elastic | elasticsearch | org.yaml:snakeyaml | 1.15 / 1.15 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-rvwf-54qp-4r6v |
github | elastic | elasticsearch | org.yaml:snakeyaml | 1.15 / 1.15 |
["dependencies","missing-data"] | modules/reindex/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-w37g-rhq8-7m4j |
github | elastic | elasticsearch | xerces:xercesImpl | 2.9.1 / 2.9.1 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-334p-wv2m-w3vp |
github | elastic | elasticsearch | xerces:xercesImpl | 2.9.1 / 2.9.1 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7j4h-8wpf-rqfh |
github | elastic | elasticsearch | xerces:xercesImpl | 2.9.1 / 2.9.1 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-h65f-jvqw-m9fj |
github | elastic | elasticsearch | xerces:xercesImpl | 2.9.1 / 2.9.1 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-vmqm-g3vh-847m |
github | elastic | elasticsearch | xerces:xercesImpl | 2.9.1 / 2.9.1 |
["dependencies","missing-data"] | test/fixtures/hdfs2-fixture/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-w4jq-qh47-hvjq |
github | elastic | eui | @cypress/request | ^2.88.11 / 2.88.11 |
["lockfile","lockfile-yarn-pinning-^2.88.11"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p8p7-x288-28g6 |
github | elastic | eui | ajv | ^6.10.0 / 6.10.2 |
["lockfile","lockfile-yarn-pinning-^6.10.0"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-v88g-cgmw-v5xw |
github | elastic | eui | ajv | ^6.10.2 / 6.10.2 |
["lockfile","lockfile-yarn-pinning-^6.10.2"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-v88g-cgmw-v5xw |
github | elastic | eui | ansi-regex | ^3.0.0 / 3.0.0 |
["lockfile","lockfile-yarn-pinning-^3.0.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-93q8-gq69-wqmw |
github | elastic | eui | ansi-regex | ^3.0.0 / 3.0.0 |
["lockfile","lockfile-yarn-pinning-^3.0.0"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-93q8-gq69-wqmw |
github | elastic | eui | ansi-regex | ^4.0.0 / 4.1.0 |
["lockfile","lockfile-yarn-pinning-^4.0.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-93q8-gq69-wqmw |
github | elastic | eui | ansi-regex | ^4.1.0 / 4.1.0 |
["lockfile","lockfile-yarn-pinning-^4.1.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-93q8-gq69-wqmw |
github | elastic | eui | ansi-regex | ^4.1.0 / 4.1.0 |
["lockfile","lockfile-yarn-pinning-^4.1.0"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-93q8-gq69-wqmw |
github | elastic | eui | async | ^2.6.2 / 2.6.3 |
["lockfile","lockfile-yarn-pinning-^2.6.2"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fwr7-v2mv-hh25 |
github | elastic | eui | async | ^3.2.0 / 3.2.1 |
["lockfile","lockfile-yarn-pinning-^3.2.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fwr7-v2mv-hh25 |
github | elastic | eui | axios | ^0.18.0 / 0.18.1 |
["lockfile","lockfile-yarn-pinning-^0.18.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4w2v-q235-vp99 |
github | elastic | eui | axios | ^0.18.0 / 0.18.1 |
["lockfile","lockfile-yarn-pinning-^0.18.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cph5-m8f7-6c5x |
github | elastic | eui | axios | ^0.18.1 / 0.18.1 |
["lockfile","lockfile-yarn-pinning-^0.18.1"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4w2v-q235-vp99 |
github | elastic | eui | axios | ^0.18.1 / 0.18.1 |
["lockfile","lockfile-yarn-pinning-^0.18.1"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cph5-m8f7-6c5x |
github | elastic | eui | axios | ^0.19.2 / 0.19.2 |
["lockfile","lockfile-yarn-pinning-^0.19.2"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4w2v-q235-vp99 |
github | elastic | eui | axios | ^0.19.2 / 0.19.2 |
["lockfile","lockfile-yarn-pinning-^0.19.2"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cph5-m8f7-6c5x |
github | elastic | eui | color-string | ^1.5.2 / 1.5.2 |
["lockfile","lockfile-yarn-pinning-^1.5.2"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-257v-vj4p-3w2h |
github | elastic | eui | d3-color | 1 - 2 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-1 - 2"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-36jr-mh4h-2g58 |
github | elastic | eui | decode-uri-component | ^0.2.0 / 0.2.0 |
["lockfile","lockfile-yarn-pinning-^0.2.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-w573-4hg7-7wgq |
github | elastic | eui | ejs | ^2.6.1 / 2.7.4 |
["lockfile","lockfile-yarn-pinning-^2.6.1"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-phwq-j96m-2c2q |
github | elastic | eui | ejs | ^3.0.1 / 3.1.5 |
["lockfile","lockfile-yarn-pinning-^3.0.1"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-phwq-j96m-2c2q |
github | elastic | eui | follow-redirects | 1.5.10 / 1.5.10 |
["lockfile","lockfile-yarn-pinning-1.5.10"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-74fj-2j2h-c42q |
github | elastic | eui | follow-redirects | 1.5.10 / 1.5.10 |
["lockfile","lockfile-yarn-pinning-1.5.10"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pw2r-vq6v-hr8c |
github | elastic | eui | follow-redirects | ^1.0.0 / 1.13.0 |
["lockfile","lockfile-yarn-pinning-^1.0.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-74fj-2j2h-c42q |
github | elastic | eui | follow-redirects | ^1.0.0 / 1.13.0 |
["lockfile","lockfile-yarn-pinning-^1.0.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pw2r-vq6v-hr8c |
github | elastic | eui | glob-parent | ^3.1.0 / 3.1.0 |
["lockfile","lockfile-yarn-pinning-^3.1.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 |
github | elastic | eui | glob-parent | ^5.0.0 / 5.1.0 |
["lockfile","lockfile-yarn-pinning-^5.0.0"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 |
github | elastic | eui | got | ^6.2.0 / 6.7.1 |
["lockfile","lockfile-yarn-pinning-^6.2.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pfrx-2q88-qq97 |
github | elastic | eui | got | ^6.7.1 / 6.7.1 |
["lockfile","lockfile-yarn-pinning-^6.7.1"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pfrx-2q88-qq97 |
github | elastic | eui | got | ^8.3.2 / 8.3.2 |
["lockfile","lockfile-yarn-pinning-^8.3.2"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pfrx-2q88-qq97 |
github | elastic | eui | got | ^9.6.0 / 9.6.0 |
["lockfile","lockfile-yarn-pinning-^9.6.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pfrx-2q88-qq97 |
github | elastic | eui | hosted-git-info | ^2.1.4 / 2.8.8 |
["lockfile","lockfile-yarn-pinning-^2.1.4"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-43f8-2h32-f4cj |
github | elastic | eui | hosted-git-info | ^2.4.2 / 2.8.8 |
["lockfile","lockfile-yarn-pinning-^2.4.2"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-43f8-2h32-f4cj |
github | elastic | eui | http-cache-semantics | 3.8.1 / 3.8.1 |
["lockfile","lockfile-yarn-pinning-3.8.1"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-rc47-6667-2j5j |
github | elastic | eui | http-cache-semantics | ^3.8.0 / 3.8.1 |
["lockfile","lockfile-yarn-pinning-^3.8.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-rc47-6667-2j5j |
github | elastic | eui | is-svg | ^3.0.0 / 3.0.0 |
["lockfile","lockfile-yarn-pinning-^3.0.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7r28-3m3f-r2pr |
github | elastic | eui | is-svg | ^3.0.0 / 3.0.0 |
["lockfile","lockfile-yarn-pinning-^3.0.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r8j5-h5cx-65gg |
github | elastic | eui | jsdom | ^11.5.1 / 11.12.0 |
["lockfile","lockfile-yarn-pinning-^11.5.1"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f4c9-cqv8-9v98 |
github | elastic | eui | json-schema | 0.2.3 / 0.2.3 |
["lockfile","lockfile-yarn-pinning-0.2.3"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-896r-f27r-55mw |
github | elastic | eui | json5 | ^1.0.1 / 1.0.1 |
["lockfile","lockfile-yarn-pinning-^1.0.1"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h |
github | elastic | eui | json5 | ^2.1.0 / 2.1.0 |
["lockfile","lockfile-yarn-pinning-^2.1.0"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h |
github | elastic | eui | loader-utils | ^1.2.3 / 1.4.0 |
["lockfile","lockfile-yarn-pinning-^1.2.3"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3rfm-jhwj-7488 |
github | elastic | eui | loader-utils | ^1.2.3 / 1.4.0 |
["lockfile","lockfile-yarn-pinning-^1.2.3"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-76p3-8jx3-jpfq |
github | elastic | eui | loader-utils | ^1.2.3 / 1.4.0 |
["lockfile","lockfile-yarn-pinning-^1.2.3"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hhq3-ff78-jv3g |
github | elastic | eui | loader-utils | ^2.0.0 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3rfm-jhwj-7488 |
github | elastic | eui | loader-utils | ^2.0.0 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-76p3-8jx3-jpfq |
github | elastic | eui | loader-utils | ^2.0.0 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hhq3-ff78-jv3g |
github | elastic | eui | locutus | ^2.0.11 / 2.0.11 |
["lockfile","lockfile-yarn-pinning-^2.0.11"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-39q4-p535-c852 |
github | elastic | eui | locutus | ^2.0.11 / 2.0.11 |
["lockfile","lockfile-yarn-pinning-^2.0.11"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f98m-q3hr-p5wq |
github | elastic | eui | locutus | ^2.0.11 / 2.0.11 |
["lockfile","lockfile-yarn-pinning-^2.0.11"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-h86x-mv66-gr5q |
github | elastic | eui | lodash | ^4.17.12 / 4.17.19 |
["lockfile","lockfile-yarn-pinning-^4.17.12"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-29mw-wpgm-hmr9 |
github | elastic | eui | lodash | ^4.17.12 / 4.17.19 |
["lockfile","lockfile-yarn-pinning-^4.17.12"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-35jh-r3h4-6jhm |
github | elastic | eui | lodash | ^4.17.12 / 4.17.19 |
["lockfile","lockfile-yarn-pinning-^4.17.12"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p6mc-m468-83gw |
github | elastic | eui | lodash | ^4.17.13 / 4.17.19 |
["lockfile","lockfile-yarn-pinning-^4.17.13"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-29mw-wpgm-hmr9 |
github | elastic | eui | lodash | ^4.17.13 / 4.17.19 |
["lockfile","lockfile-yarn-pinning-^4.17.13"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-35jh-r3h4-6jhm |
github | elastic | eui | lodash | ^4.17.13 / 4.17.19 |
["lockfile","lockfile-yarn-pinning-^4.17.13"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p6mc-m468-83gw |
github | elastic | eui | lodash | ^4.17.14 / 4.17.19 |
["lockfile","lockfile-yarn-pinning-^4.17.14"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-29mw-wpgm-hmr9 |
github | elastic | eui | lodash | ^4.17.14 / 4.17.19 |
["lockfile","lockfile-yarn-pinning-^4.17.14"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-35jh-r3h4-6jhm |
github | elastic | eui | lodash | ^4.17.14 / 4.17.19 |
["lockfile","lockfile-yarn-pinning-^4.17.14"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p6mc-m468-83gw |
github | elastic | eui | luxon | ^1.25.0 / 1.28.0 |
["lockfile","lockfile-yarn-pinning-^1.25.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3xq5-wjfh-ppjc |
github | elastic | eui | minimatch | 3.0.4 / 3.0.4 |
["lockfile","lockfile-yarn-pinning-3.0.4"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f8q6-p94x-37v3 |
github | elastic | eui | minimatch | 3.0.x / 3.0.4 |
["lockfile","lockfile-yarn-pinning-3.0.x"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f8q6-p94x-37v3 |
github | elastic | eui | minimatch | ^3.0.4 / 3.0.4 |
["lockfile","lockfile-yarn-pinning-^3.0.4"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f8q6-p94x-37v3 |
github | elastic | eui | minimatch | ^3.0.4 / 3.0.4 |
["lockfile","lockfile-yarn-pinning-^3.0.4"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f8q6-p94x-37v3 |
github | elastic | eui | minimist | 0.0.8 / 0.0.8 |
["lockfile","lockfile-yarn-pinning-0.0.8"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-vh95-rmgr-6w4m |
github | elastic | eui | minimist | 0.0.8 / 0.0.8 |
["lockfile","lockfile-yarn-pinning-0.0.8"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-xvch-5gv4-984h |
github | elastic | eui | minimist | 1.2.0 / 1.2.0 |
["lockfile","lockfile-yarn-pinning-1.2.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-vh95-rmgr-6w4m |
github | elastic | eui | minimist | 1.2.0 / 1.2.0 |
["lockfile","lockfile-yarn-pinning-1.2.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-xvch-5gv4-984h |
github | elastic | eui | minimist | ^1.2.0 / 1.2.5 |
["lockfile","lockfile-yarn-pinning-^1.2.0"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-xvch-5gv4-984h |
github | elastic | eui | moment | >= 2.9.0 / 2.27.0 |
["lockfile","lockfile-yarn-pinning-\u003e= 2.9.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8hfj-j24r-96c4 |
github | elastic | eui | moment | >= 2.9.0 / 2.27.0 |
["lockfile","lockfile-yarn-pinning-\u003e= 2.9.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wc69-rhjr-hc9g |
github | elastic | eui | moment | ^2.15.1 / 2.27.0 |
["lockfile","lockfile-yarn-pinning-^2.15.1"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8hfj-j24r-96c4 |
github | elastic | eui | moment | ^2.15.1 / 2.27.0 |
["lockfile","lockfile-yarn-pinning-^2.15.1"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wc69-rhjr-hc9g |
github | elastic | eui | moment | ^2.24.0 / 2.27.0 |
["lockfile","lockfile-yarn-pinning-^2.24.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8hfj-j24r-96c4 |
github | elastic | eui | moment | ^2.24.0 / 2.27.0 |
["lockfile","lockfile-yarn-pinning-^2.24.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wc69-rhjr-hc9g |
github | elastic | eui | moment | ^2.27.0 / 2.27.0 |
["devDependencies"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8hfj-j24r-96c4 |
github | elastic | eui | moment | ^2.27.0 / 2.27.0 |
["devDependencies"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wc69-rhjr-hc9g |
github | elastic | eui | moment | ^2.27.0 / 2.27.0 |
["lockfile","lockfile-yarn-pinning-^2.27.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8hfj-j24r-96c4 |
github | elastic | eui | moment | ^2.27.0 / 2.27.0 |
["lockfile","lockfile-yarn-pinning-^2.27.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wc69-rhjr-hc9g |
github | elastic | eui | moment-timezone | ^0.5.31 / 0.5.31 |
["devDependencies"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-56x4-j7p9-fcf9 |
github | elastic | eui | moment-timezone | ^0.5.31 / 0.5.31 |
["devDependencies"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-v78c-4p63-2j6c |
github | elastic | eui | moment-timezone | ^0.5.31 / 0.5.31 |
["lockfile","lockfile-yarn-pinning-^0.5.31"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-56x4-j7p9-fcf9 |
github | elastic | eui | moment-timezone | ^0.5.31 / 0.5.31 |
["lockfile","lockfile-yarn-pinning-^0.5.31"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-v78c-4p63-2j6c |
github | elastic | eui | node-fetch | ^2.6.1 / 2.6.1 |
["lockfile","lockfile-yarn-pinning-^2.6.1"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r683-j2x4-v87g |
github | elastic | eui | node-notifier | ^5.4.2 / 5.4.5 |
["lockfile","lockfile-yarn-pinning-^5.4.2"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5fw9-fq32-wv5p |
github | elastic | eui | nth-check | ^1.0.2 / 1.0.2 |
["lockfile","lockfile-yarn-pinning-^1.0.2"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-rp65-9cf3-cjxr |
github | elastic | eui | nth-check | ~1.0.1 / 1.0.2 |
["lockfile","lockfile-yarn-pinning-~1.0.1"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-rp65-9cf3-cjxr |
github | elastic | eui | path-parse | ^1.0.6 / 1.0.6 |
["lockfile","lockfile-yarn-pinning-^1.0.6"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hj48-42vr-x3v9 |
github | elastic | eui | postcss | ^6.0.0 / 6.0.23 |
["lockfile","lockfile-yarn-pinning-^6.0.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-566m-qj78-rww5 |
github | elastic | eui | qs | ~6.5.2 / 6.5.2 |
["lockfile","lockfile-yarn-pinning-~6.5.2"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp |
github | elastic | eui | request | ^2.87.0 / 2.88.2 |
["lockfile","lockfile-yarn-pinning-^2.87.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p8p7-x288-28g6 |
github | elastic | eui | request | ^2.88.0 / 2.88.2 |
["lockfile","lockfile-yarn-pinning-^2.88.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p8p7-x288-28g6 |
github | elastic | eui | semver | 2 || 3 || 4 || 5 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-2 || 3 || 4 || 5"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | 5.4.1 / 5.4.1 |
["lockfile","lockfile-yarn-pinning-5.4.1"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | 5.5.0 / 5.5.0 |
["lockfile","lockfile-yarn-pinning-5.5.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | ^5.0.3 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.0.3"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | ^5.1.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.1.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | ^5.3.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.3.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | ^5.4.1 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.4.1"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | ^5.5.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.5.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | ^5.5.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.5.0"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | ^5.6.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.6.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | ^5.7.1 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.7.1"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | ^6.0.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.0.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | ^6.1.1 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.1"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | ^6.1.2 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.2"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | ^6.1.2 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.2"] | packages/eslint-plugin/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | ^6.2.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.2.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | ^6.3.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.3.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | ^7.1.1 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.1.1"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | ^7.1.3 / 7.3.7 |
["lockfile","lockfile-yarn-pinning-^7.1.3"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | ^7.2.1 / 7.3.7 |
["lockfile","lockfile-yarn-pinning-^7.2.1"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | ^7.3.2 / 7.3.7 |
["lockfile","lockfile-yarn-pinning-^7.3.2"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | ^7.3.4 / 7.3.7 |
["lockfile","lockfile-yarn-pinning-^7.3.4"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | ^7.3.5 / 7.3.7 |
["lockfile","lockfile-yarn-pinning-^7.3.5"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver | ^7.3.7 / 7.3.7 |
["lockfile","lockfile-yarn-pinning-^7.3.7"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | eui | semver-regex | ^2.0.0 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-44c6-4v22-4mhx |
github | elastic | eui | semver-regex | ^2.0.0 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4x5v-gmq8-25ch |
github | elastic | eui | serialize-javascript | ^1.7.0 / 1.9.1 |
["lockfile","lockfile-yarn-pinning-^1.7.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-h9rv-jmmf-4pgx |
github | elastic | eui | serialize-javascript | ^1.7.0 / 1.9.1 |
["lockfile","lockfile-yarn-pinning-^1.7.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hxcc-f52p-wc94 |
github | elastic | eui | set-getter | ^0.1.0 / 0.1.0 |
["lockfile","lockfile-yarn-pinning-^0.1.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-jv35-xqg7-f92r |
github | elastic | eui | shelljs | ^0.8.3 / 0.8.4 |
["lockfile","lockfile-yarn-pinning-^0.8.3"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4rq4-32rv-6wp6 |
github | elastic | eui | shelljs | ^0.8.3 / 0.8.4 |
["lockfile","lockfile-yarn-pinning-^0.8.3"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-64g7-mvw6-v9qj |
github | elastic | eui | shelljs | ^0.8.4 / 0.8.4 |
["devDependencies"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4rq4-32rv-6wp6 |
github | elastic | eui | shelljs | ^0.8.4 / 0.8.4 |
["devDependencies"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-64g7-mvw6-v9qj |
github | elastic | eui | shelljs | ^0.8.4 / 0.8.4 |
["lockfile","lockfile-yarn-pinning-^0.8.4"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4rq4-32rv-6wp6 |
github | elastic | eui | shelljs | ^0.8.4 / 0.8.4 |
["lockfile","lockfile-yarn-pinning-^0.8.4"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-64g7-mvw6-v9qj |
github | elastic | eui | ssri | ^4.1.6 / 4.1.6 |
["lockfile","lockfile-yarn-pinning-^4.1.6"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-325j-24f4-qv5x |
github | elastic | eui | ssri | ^5.0.0 / 5.3.0 |
["lockfile","lockfile-yarn-pinning-^5.0.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-vx3p-948g-6vhq |
github | elastic | eui | ssri | ^5.2.4 / 5.3.0 |
["lockfile","lockfile-yarn-pinning-^5.2.4"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-vx3p-948g-6vhq |
github | elastic | eui | ssri | ^6.0.1 / 6.0.1 |
["lockfile","lockfile-yarn-pinning-^6.0.1"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-vx3p-948g-6vhq |
github | elastic | eui | tough-cookie | ^2.3.3 / 2.5.0 |
["lockfile","lockfile-yarn-pinning-^2.3.3"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 |
github | elastic | eui | tough-cookie | ^2.3.4 / 2.5.0 |
["lockfile","lockfile-yarn-pinning-^2.3.4"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 |
github | elastic | eui | tough-cookie | ~2.5.0 / 2.5.0 |
["lockfile","lockfile-yarn-pinning-~2.5.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 |
github | elastic | eui | trim-newlines | ^2.0.0 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7p7h-4mm5-852v |
github | elastic | eui | underscore | ^1.9.1 / 1.10.2 |
["lockfile","lockfile-yarn-pinning-^1.9.1"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cf4h-3jhx-xvhq |
github | elastic | eui | underscore | ~1.4.4 / 1.4.4 |
["lockfile","lockfile-yarn-pinning-~1.4.4"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cf4h-3jhx-xvhq |
github | elastic | eui | webpack | ^5.74.0 / 5.74.0 |
["devDependencies"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hc6q-2mpp-qw7j |
github | elastic | eui | webpack | ^5.74.0 / 5.74.0 |
["lockfile","lockfile-yarn-pinning-^5.74.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hc6q-2mpp-qw7j |
github | elastic | eui | word-wrap | ^1.2.3 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-^1.2.3"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 |
github | elastic | eui | word-wrap | ~1.2.3 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-~1.2.3"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 |
github | elastic | eui | ws | ^7.2.3 / 7.3.1 |
["lockfile","lockfile-yarn-pinning-^7.2.3"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6fc8-4gx4-v693 |
github | elastic | eui | y18n | ^3.2.1 / 3.2.1 |
["lockfile","lockfile-yarn-pinning-^3.2.1"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c4w7-xm78-47vh |
github | elastic | eui | y18n | ^4.0.0 / 4.0.0 |
["lockfile","lockfile-yarn-pinning-^4.0.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c4w7-xm78-47vh |
github | elastic | eui | yargs-parser | ^10.0.0 / 10.1.0 |
["lockfile","lockfile-yarn-pinning-^10.0.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p9pc-299p-vxgp |
github | elastic | examples | Jinja2 | ==2.10.3 / 2.10.3 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-g3rq-g295-4j3m |
github | elastic | examples | Jinja2 | ==2.10.3 / 2.10.3 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-66 |
github | elastic | examples | Pygments | ==2.5.2 / 2.5.2 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9w8r-397f-prfh |
github | elastic | examples | Pygments | ==2.5.2 / 2.5.2 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mrwq-x4v8-fh7p |
github | elastic | examples | Pygments | ==2.5.2 / 2.5.2 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pq64-v7f5-gqh8 |
github | elastic | examples | Pygments | ==2.5.2 / 2.5.2 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-140 |
github | elastic | examples | Pygments | ==2.5.2 / 2.5.2 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-141 |
github | elastic | examples | Pygments | ==2.5.2 / 2.5.2 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2023-117 |
github | elastic | examples | bleach | ==3.1.0 / 3.1.0 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-m6xf-fq7q-8743 |
github | elastic | examples | bleach | ==3.1.0 / 3.1.0 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-q65m-pv3f-wr5r |
github | elastic | examples | bleach | ==3.1.0 / 3.1.0 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-vqhp-cxgc-6wmm |
github | elastic | examples | bleach | ==3.1.0 / 3.1.0 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-vv2x-vrpj-qqpq |
github | elastic | examples | bleach | ==3.1.0 / 3.1.0 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2020-27 |
github | elastic | examples | bleach | ==3.1.0 / 3.1.0 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2020-28 |
github | elastic | examples | bleach | ==3.1.0 / 3.1.0 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2020-340 |
github | elastic | examples | bleach | ==3.1.0 / 3.1.0 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-865 |
github | elastic | examples | certifi | ==2017.7.27.1 / 2017.7.27.1 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-xqr8-7jwr-rhp7 |
github | elastic | examples | certifi | ==2017.7.27.1 / 2017.7.27.1 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2023-135 |
github | elastic | examples | certifi | ==2019.11.28 / 2019.11.28 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-43fp-rhv2-5gv8 |
github | elastic | examples | certifi | ==2019.11.28 / 2019.11.28 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-xqr8-7jwr-rhp7 |
github | elastic | examples | certifi | ==2019.11.28 / 2019.11.28 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2022-42986 |
github | elastic | examples | certifi | ==2019.11.28 / 2019.11.28 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2023-135 |
github | elastic | examples | com.fasterxml.jackson.dataformat:jackson-dataformat-cbor | 2.8.10 / 2.8.10 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-xmc8-26q4-qjhx |
github | elastic | examples | com.google.code.gson:gson | 2.1 / 2.1 | ["compile"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4jrv-ppp4-jm57 |
github | elastic | examples | cryptography | ==2.2.2 / 2.2.2 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5cpq-8wj7-hf2v |
github | elastic | examples | cryptography | ==2.2.2 / 2.2.2 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fcf9-3qw3-gxmj |
github | elastic | examples | cryptography | ==2.2.2 / 2.2.2 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hggm-jpg3-v476 |
github | elastic | examples | cryptography | ==2.2.2 / 2.2.2 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-jm77-qphf-c4w8 |
github | elastic | examples | cryptography | ==2.2.2 / 2.2.2 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-w7pp-m8wf-vj6r |
github | elastic | examples | cryptography | ==2.2.2 / 2.2.2 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-x4qr-2fvf-3mr5 |
github | elastic | examples | cryptography | ==2.2.2 / 2.2.2 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2018-52 |
github | elastic | examples | cryptography | ==2.2.2 / 2.2.2 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-62 |
github | elastic | examples | io.netty:netty-codec | 4.1.16.Final / 4.1.16.Final |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9vjp-v76f-g363 |
github | elastic | examples | io.netty:netty-codec | 4.1.16.Final / 4.1.16.Final |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-grg4-wf29-r9vv |
github | elastic | examples | io.netty:netty-codec-http | 4.1.16.Final / 4.1.16.Final |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-269q-hmxg-m83q |
github | elastic | examples | io.netty:netty-codec-http | 4.1.16.Final / 4.1.16.Final |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5mcr-gq6c-3hq2 |
github | elastic | examples | io.netty:netty-codec-http | 4.1.16.Final / 4.1.16.Final |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cqqj-4p63-rrmm |
github | elastic | examples | io.netty:netty-codec-http | 4.1.16.Final / 4.1.16.Final |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wx5j-54mm-rqqq |
github | elastic | examples | io.netty:netty-handler | 4.1.16.Final / 4.1.16.Final |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6mjq-h674-j845 |
github | elastic | examples | io.netty:netty-handler | 4.1.16.Final / 4.1.16.Final |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mm9x-g8pc-w292 |
github | elastic | examples | io.netty:netty-handler | 4.1.16.Final / 4.1.16.Final |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p2v9-g2qv-p635 |
github | elastic | examples | ipython | ==7.10.1 / 7.10.1 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-29gw-9793-fvw7 |
github | elastic | examples | ipython | ==7.10.1 / 7.10.1 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pq7m-3gw7-gq5x |
github | elastic | examples | ipython | ==7.10.1 / 7.10.1 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2022-12 |
github | elastic | examples | jupyter-core | ==4.6.1 / 4.6.1 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-m678-f26j-3hrp |
github | elastic | examples | jupyter-core | ==4.6.1 / 4.6.1 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2022-42974 |
github | elastic | examples | jupyterlab | ==1.1.* / 1.1.5 |
[] | Machine Learning/Online Search Relevance Metrics/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4952-p58q-6crx |
github | elastic | examples | jupyterlab | ==1.1.* / 1.1.5 |
[] | Machine Learning/Online Search Relevance Metrics/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-130 |
github | elastic | examples | jupyterlab | ==2.1.* / 2.1.5 |
[] | Machine Learning/Query Optimization/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4952-p58q-6crx |
github | elastic | examples | jupyterlab | ==2.1.* / 2.1.5 |
[] | Machine Learning/Query Optimization/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-130 |
github | elastic | examples | log4j:log4j | 1.2.12 / 1.2.12 |
["build","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-2qrg-x229-3v8q |
github | elastic | examples | log4j:log4j | 1.2.12 / 1.2.12 |
["build","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-65fg-84f6-3jq3 |
github | elastic | examples | log4j:log4j | 1.2.12 / 1.2.12 |
["build","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f7vh-qwp3-x37m |
github | elastic | examples | log4j:log4j | 1.2.12 / 1.2.12 |
["build","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fp5r-v3w9-4333 |
github | elastic | examples | log4j:log4j | 1.2.12 / 1.2.12 |
["build","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-w9p3-5cr8-m3jj |
github | elastic | examples | lxml | ==3.6.4 / 3.6.4 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-55x5-fj6c-h6m8 |
github | elastic | examples | lxml | ==3.6.4 / 3.6.4 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-jq4v-f5q6-mjqq |
github | elastic | examples | lxml | ==3.6.4 / 3.6.4 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pgww-xf46-h92r |
github | elastic | examples | lxml | ==3.6.4 / 3.6.4 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wrxv-2j5q-m38w |
github | elastic | examples | lxml | ==3.6.4 / 3.6.4 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-xp26-p53h-6h2p |
github | elastic | examples | lxml | ==3.6.4 / 3.6.4 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2018-12 |
github | elastic | examples | lxml | ==3.6.4 / 3.6.4 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2020-62 |
github | elastic | examples | lxml | ==3.6.4 / 3.6.4 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-19 |
github | elastic | examples | lxml | ==3.6.4 / 3.6.4 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2022-230 |
github | elastic | examples | nbconvert | ==5.6.1 / 5.6.1 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9jmq-rx5f-8jwq |
github | elastic | examples | nbconvert | ==5.6.1 / 5.6.1 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2022-249 |
github | elastic | examples | notebook | ==6.0.2 / 6.0.2 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4952-p58q-6crx |
github | elastic | examples | notebook | ==6.0.2 / 6.0.2 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c7vm-f5p4-8fqh |
github | elastic | examples | notebook | ==6.0.2 / 6.0.2 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hwvq-6gjx-j797 |
github | elastic | examples | notebook | ==6.0.2 / 6.0.2 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-m87f-39q9-6f55 |
github | elastic | examples | notebook | ==6.0.2 / 6.0.2 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-v7vq-3x77-87vg |
github | elastic | examples | notebook | ==6.0.2 / 6.0.2 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2020-215 |
github | elastic | examples | notebook | ==6.0.2 / 6.0.2 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2022-180 |
github | elastic | examples | notebook | ==6.0.2 / 6.0.2 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2022-212 |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5545-2q6w-2gh6 |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6p56-wp2h-9hxr |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9fq2-x9r6-wfmf |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f7c7-j99h-c22f |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fpfv-jqm9-f5jm |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-frgw-fgh6-9g52 |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2017-1 |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2019-108 |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-856 |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-857 |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/donorschoose/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5545-2q6w-2gh6 |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/donorschoose/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6p56-wp2h-9hxr |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/donorschoose/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9fq2-x9r6-wfmf |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/donorschoose/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f7c7-j99h-c22f |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/donorschoose/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fpfv-jqm9-f5jm |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/donorschoose/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-frgw-fgh6-9g52 |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/donorschoose/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2017-1 |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/donorschoose/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2019-108 |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/donorschoose/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-856 |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/donorschoose/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-857 |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5545-2q6w-2gh6 |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6p56-wp2h-9hxr |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9fq2-x9r6-wfmf |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f7c7-j99h-c22f |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fpfv-jqm9-f5jm |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-frgw-fgh6-9g52 |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2017-1 |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2019-108 |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-856 |
github | elastic | examples | numpy | ==1.11.2 / 1.11.2 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-857 |
github | elastic | examples | numpy | ==1.18.1 / 1.18.1 |
[] | Machine Learning/Feature Importance/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5545-2q6w-2gh6 |
github | elastic | examples | numpy | ==1.18.1 / 1.18.1 |
[] | Machine Learning/Feature Importance/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6p56-wp2h-9hxr |
github | elastic | examples | numpy | ==1.18.1 / 1.18.1 |
[] | Machine Learning/Feature Importance/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f7c7-j99h-c22f |
github | elastic | examples | numpy | ==1.18.1 / 1.18.1 |
[] | Machine Learning/Feature Importance/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fpfv-jqm9-f5jm |
github | elastic | examples | numpy | ==1.18.1 / 1.18.1 |
[] | Machine Learning/Feature Importance/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-856 |
github | elastic | examples | numpy | ==1.18.1 / 1.18.1 |
[] | Machine Learning/Feature Importance/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-857 |
github | elastic | examples | numpy | ==1.18.1 / 1.18.1 |
[] | Machine Learning/Regression Loss Functions/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5545-2q6w-2gh6 |
github | elastic | examples | numpy | ==1.18.1 / 1.18.1 |
[] | Machine Learning/Regression Loss Functions/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6p56-wp2h-9hxr |
github | elastic | examples | numpy | ==1.18.1 / 1.18.1 |
[] | Machine Learning/Regression Loss Functions/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f7c7-j99h-c22f |
github | elastic | examples | numpy | ==1.18.1 / 1.18.1 |
[] | Machine Learning/Regression Loss Functions/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fpfv-jqm9-f5jm |
github | elastic | examples | numpy | ==1.18.1 / 1.18.1 |
[] | Machine Learning/Regression Loss Functions/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-856 |
github | elastic | examples | numpy | ==1.18.1 / 1.18.1 |
[] | Machine Learning/Regression Loss Functions/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-857 |
github | elastic | examples | numpy | ==1.19.5 / 1.19.5 |
[] | Machine Learning/Class Assigment Objectives/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6p56-wp2h-9hxr |
github | elastic | examples | numpy | ==1.19.5 / 1.19.5 |
[] | Machine Learning/Class Assigment Objectives/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fpfv-jqm9-f5jm |
github | elastic | examples | org.apache.httpcomponents:httpclient | 4.5.2 / 4.5.2 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7r82-7xv7-xcpj |
github | elastic | examples | org.apache.logging.log4j:log4j-core | 2.9.1 / 2.9.1 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7rjr-3q55-vv33 |
github | elastic | examples | org.apache.logging.log4j:log4j-core | 2.9.1 / 2.9.1 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8489-44mv-ggj8 |
github | elastic | examples | org.apache.logging.log4j:log4j-core | 2.9.1 / 2.9.1 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-jfh8-c2jp-5v3q |
github | elastic | examples | org.apache.logging.log4j:log4j-core | 2.9.1 / 2.9.1 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p6xc-xr62-6r2g |
github | elastic | examples | org.apache.logging.log4j:log4j-core | 2.9.1 / 2.9.1 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-vwqq-5vrc-xw9h |
github | elastic | examples | org.apache.maven.shared:maven-shared-utils | 0.7 / 0.7 | ["build","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-rhgr-952r-6p8q |
github | elastic | examples | org.apache.maven:maven-core | 2.2.1 / 2.2.1 |
["build","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-2f88-5hg8-9x2x |
github | elastic | examples | org.codehaus.plexus:plexus-utils | 1.5.15 / 1.5.15 |
["build","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8vhq-qq4p-grq3 |
github | elastic | examples | org.codehaus.plexus:plexus-utils | 1.5.15 / 1.5.15 |
["build","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-g6ph-x5wf-g337 |
github | elastic | examples | org.codehaus.plexus:plexus-utils | 1.5.15 / 1.5.15 |
["build","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-jcwr-x25h-x5fh |
github | elastic | examples | org.eclipse.jetty:jetty-http | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cj7v-27pg-wf7q |
github | elastic | examples | org.eclipse.jetty:jetty-http | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hmr7-m48g-48f6 |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-26vr-8j45-3r4w |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6x9x-8qw9-9pp6 |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7vx9-xjhr-rw6h |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-84q7-p226-4x5w |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9rgv-h7x4-qw8g |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-m6cp-vxjx-65j6 |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p26g-97m4-6q7c |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qw69-rqj8-6qw8 |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r28m-g6j9-r2h5 |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-vgg8-72f2-qm23 |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wfcc-pff6-rgc5 |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-xc67-hjx6-cgg6 |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-26vr-8j45-3r4w |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6x9x-8qw9-9pp6 |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7vx9-xjhr-rw6h |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-84q7-p226-4x5w |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9rgv-h7x4-qw8g |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-m6cp-vxjx-65j6 |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p26g-97m4-6q7c |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qw69-rqj8-6qw8 |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r28m-g6j9-r2h5 |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-vgg8-72f2-qm23 |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wfcc-pff6-rgc5 |
github | elastic | examples | org.eclipse.jetty:jetty-server | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-xc67-hjx6-cgg6 |
github | elastic | examples | org.eclipse.jetty:jetty-webapp | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-g3wg-6mcf-8jj6 |
github | elastic | examples | org.eclipse.jetty:jetty-webapp | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-g3wg-6mcf-8jj6 |
github | elastic | examples | org.eclipse.jetty:jetty-xml | 9.2.11.v20150529 / 9.2.11.v20150529 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-58qw-p7qm-5rvh |
github | elastic | examples | org.elasticsearch:elasticsearch | 6.2.3 / 6.2.3 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3393-hvrj-w7v3 |
github | elastic | examples | org.elasticsearch:elasticsearch | 6.2.3 / 6.2.3 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-62ww-4p3p-7fhj |
github | elastic | examples | org.elasticsearch:elasticsearch | 6.2.3 / 6.2.3 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c77j-p484-h84m |
github | elastic | examples | org.elasticsearch:elasticsearch | 6.2.3 / 6.2.3 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cqgv-256r-m9r8 |
github | elastic | examples | org.elasticsearch:elasticsearch | 6.2.3 / 6.2.3 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fj32-6v7m-57pg |
github | elastic | examples | org.elasticsearch:elasticsearch | 6.2.3 / 6.2.3 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-g9fw-9x87-rmrj |
github | elastic | examples | org.elasticsearch:elasticsearch | 6.2.3 / 6.2.3 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hr65-qq6p-87r4 |
github | elastic | examples | org.elasticsearch:elasticsearch | 6.2.3 / 6.2.3 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-jqm6-m3j3-8gg9 |
github | elastic | examples | org.elasticsearch:elasticsearch | 6.2.3 / 6.2.3 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r9fv-qpm9-rj4g |
github | elastic | examples | org.yaml:snakeyaml | 1.17 / 1.17 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3mc7-4q67-w48m |
github | elastic | examples | org.yaml:snakeyaml | 1.17 / 1.17 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-98wm-3w3q-mw94 |
github | elastic | examples | org.yaml:snakeyaml | 1.17 / 1.17 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9w3m-gqgf-c4p9 |
github | elastic | examples | org.yaml:snakeyaml | 1.17 / 1.17 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c4r9-r8fh-9vj2 |
github | elastic | examples | org.yaml:snakeyaml | 1.17 / 1.17 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hhhw-99gj-p3c3 |
github | elastic | examples | org.yaml:snakeyaml | 1.17 / 1.17 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mjmj-j48q-9wg2 |
github | elastic | examples | org.yaml:snakeyaml | 1.17 / 1.17 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-rvwf-54qp-4r6v |
github | elastic | examples | org.yaml:snakeyaml | 1.17 / 1.17 |
["compile","missing-data"] | Search/recipe_search_java/pom.xml | Elastic | SECURITY | Package is vulnerable to CVE GHSA-w37g-rhq8-7m4j |
github | elastic | examples | pandas | ==0.19.0 / 0.19.0 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2020-73 |
github | elastic | examples | pandas | ==0.19.0 / 0.19.0 |
[] | Exploring Public Datasets/donorschoose/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2020-73 |
github | elastic | examples | pandas | ==0.19.0 / 0.19.0 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2020-73 |
github | elastic | examples | pandas | ==0.25.3 / 0.25.3 |
[] | Machine Learning/Feature Importance/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2020-73 |
github | elastic | examples | pip | ==20.* / 20.3.4 |
[] | Machine Learning/Online Search Relevance Metrics/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5xp3-jfq3-5q8x |
github | elastic | examples | pip | ==20.* / 20.3.4 |
[] | Machine Learning/Online Search Relevance Metrics/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-437 |
github | elastic | examples | pip | ==20.* / 20.3.4 |
[] | Machine Learning/Query Optimization/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5xp3-jfq3-5q8x |
github | elastic | examples | pip | ==20.* / 20.3.4 |
[] | Machine Learning/Query Optimization/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-437 |
github | elastic | examples | request | * / 2.88.2 | ["dependencies"] | Exploring Public Datasets/nhl/package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p8p7-x288-28g6 |
github | elastic | examples | requests | ==2.12.1 / 2.12.1 |
[] | Graph/apache_logs_security_analysis/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-j8r2-6x86-q33q |
github | elastic | examples | requests | ==2.12.1 / 2.12.1 |
[] | Graph/apache_logs_security_analysis/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-x84v-xcm2-53pg |
github | elastic | examples | requests | ==2.12.1 / 2.12.1 |
[] | Graph/apache_logs_security_analysis/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2018-28 |
github | elastic | examples | requests | ==2.12.1 / 2.12.1 |
[] | Graph/apache_logs_security_analysis/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2023-74 |
github | elastic | examples | requests | ==2.12.1 / 2.12.1 |
[] | Graph/movie_recommendations/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-j8r2-6x86-q33q |
github | elastic | examples | requests | ==2.12.1 / 2.12.1 |
[] | Graph/movie_recommendations/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-x84v-xcm2-53pg |
github | elastic | examples | requests | ==2.12.1 / 2.12.1 |
[] | Graph/movie_recommendations/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2018-28 |
github | elastic | examples | requests | ==2.12.1 / 2.12.1 |
[] | Graph/movie_recommendations/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2023-74 |
github | elastic | examples | requests | ==2.22.0 / 2.22.0 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-j8r2-6x86-q33q |
github | elastic | examples | requests | ==2.22.0 / 2.22.0 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2023-74 |
github | elastic | examples | requests | ==2.22.0 / 2.22.0 |
[] | Machine Learning/Feature Importance/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-j8r2-6x86-q33q |
github | elastic | examples | requests | ==2.22.0 / 2.22.0 |
[] | Machine Learning/Feature Importance/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2023-74 |
github | elastic | examples | requests | ==2.24.* / 2.24.0 |
[] | Machine Learning/Online Search Relevance Metrics/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-j8r2-6x86-q33q |
github | elastic | examples | requests | ==2.24.* / 2.24.0 |
[] | Machine Learning/Online Search Relevance Metrics/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2023-74 |
github | elastic | examples | requests | ==2.25.1 / 2.25.1 |
[] | Machine Learning/Class Assigment Objectives/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-j8r2-6x86-q33q |
github | elastic | examples | requests | ==2.25.1 / 2.25.1 |
[] | Machine Learning/Class Assigment Objectives/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2023-74 |
github | elastic | examples | scikit-learn | ==0.22.2 / 0.22.2 |
[] | Machine Learning/Regression Loss Functions/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2020-107 |
github | elastic | examples | scikit-learn | ==0.22.2 / 0.22.2 |
[] | Machine Learning/Regression Loss Functions/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2020-108 |
github | elastic | examples | scikit-learn | ==0.23.* / 0.23.2 |
[] | Machine Learning/Query Optimization/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2020-108 |
github | elastic | examples | tornado | ==6.0.3 / 6.0.3 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hj3f-6gcp-jg8j |
github | elastic | examples | tornado | ==6.0.3 / 6.0.3 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qppv-j76h-2rpx |
github | elastic | examples | tornado | ==6.0.3 / 6.0.3 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2023-75 |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mh33-7rrq-662w |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r64q-w8jr-g9qp |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-v4w5-p2hg-8fh6 |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wqvq-5m8c-6g24 |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-www2-v7xj-xrc6 |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2017-98 |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2018-32 |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2019-132 |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2019-133 |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2020-148 |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/cdc_nutrition_exercise_patterns/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-108 |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mh33-7rrq-662w |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r64q-w8jr-g9qp |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-v4w5-p2hg-8fh6 |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wqvq-5m8c-6g24 |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-www2-v7xj-xrc6 |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2017-98 |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2018-32 |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2019-132 |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2019-133 |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2020-148 |
github | elastic | examples | urllib3 | ==1.18 / 1.18 |
[] | Exploring Public Datasets/nyc_restaurants/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-108 |
github | elastic | examples | urllib3 | ==1.19.1 / 1.19.1 |
[] | Graph/movie_recommendations/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mh33-7rrq-662w |
github | elastic | examples | urllib3 | ==1.19.1 / 1.19.1 |
[] | Graph/movie_recommendations/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r64q-w8jr-g9qp |
github | elastic | examples | urllib3 | ==1.19.1 / 1.19.1 |
[] | Graph/movie_recommendations/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wqvq-5m8c-6g24 |
github | elastic | examples | urllib3 | ==1.19.1 / 1.19.1 |
[] | Graph/movie_recommendations/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-www2-v7xj-xrc6 |
github | elastic | examples | urllib3 | ==1.19.1 / 1.19.1 |
[] | Graph/movie_recommendations/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2018-32 |
github | elastic | examples | urllib3 | ==1.19.1 / 1.19.1 |
[] | Graph/movie_recommendations/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2019-132 |
github | elastic | examples | urllib3 | ==1.19.1 / 1.19.1 |
[] | Graph/movie_recommendations/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2019-133 |
github | elastic | examples | urllib3 | ==1.19.1 / 1.19.1 |
[] | Graph/movie_recommendations/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2020-148 |
github | elastic | examples | urllib3 | ==1.19.1 / 1.19.1 |
[] | Graph/movie_recommendations/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-108 |
github | elastic | examples | urllib3 | ==1.21 / 1.21 |
[] | Miscellaneous/custom_tile_maps/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mh33-7rrq-662w |
github | elastic | examples | urllib3 | ==1.21 / 1.21 |
[] | Miscellaneous/custom_tile_maps/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r64q-w8jr-g9qp |
github | elastic | examples | urllib3 | ==1.21 / 1.21 |
[] | Miscellaneous/custom_tile_maps/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wqvq-5m8c-6g24 |
github | elastic | examples | urllib3 | ==1.21 / 1.21 |
[] | Miscellaneous/custom_tile_maps/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-www2-v7xj-xrc6 |
github | elastic | examples | urllib3 | ==1.21 / 1.21 |
[] | Miscellaneous/custom_tile_maps/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2018-32 |
github | elastic | examples | urllib3 | ==1.21 / 1.21 |
[] | Miscellaneous/custom_tile_maps/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2019-132 |
github | elastic | examples | urllib3 | ==1.21 / 1.21 |
[] | Miscellaneous/custom_tile_maps/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2019-133 |
github | elastic | examples | urllib3 | ==1.21 / 1.21 |
[] | Miscellaneous/custom_tile_maps/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2020-148 |
github | elastic | examples | urllib3 | ==1.21 / 1.21 |
[] | Miscellaneous/custom_tile_maps/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-108 |
github | elastic | examples | urllib3 | ==1.21.1 / 1.21.1 |
[] | Security Analytics/auditd_analysis/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mh33-7rrq-662w |
github | elastic | examples | urllib3 | ==1.21.1 / 1.21.1 |
[] | Security Analytics/auditd_analysis/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r64q-w8jr-g9qp |
github | elastic | examples | urllib3 | ==1.21.1 / 1.21.1 |
[] | Security Analytics/auditd_analysis/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wqvq-5m8c-6g24 |
github | elastic | examples | urllib3 | ==1.21.1 / 1.21.1 |
[] | Security Analytics/auditd_analysis/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-www2-v7xj-xrc6 |
github | elastic | examples | urllib3 | ==1.21.1 / 1.21.1 |
[] | Security Analytics/auditd_analysis/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2018-32 |
github | elastic | examples | urllib3 | ==1.21.1 / 1.21.1 |
[] | Security Analytics/auditd_analysis/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2019-132 |
github | elastic | examples | urllib3 | ==1.21.1 / 1.21.1 |
[] | Security Analytics/auditd_analysis/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2019-133 |
github | elastic | examples | urllib3 | ==1.21.1 / 1.21.1 |
[] | Security Analytics/auditd_analysis/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2020-148 |
github | elastic | examples | urllib3 | ==1.21.1 / 1.21.1 |
[] | Security Analytics/auditd_analysis/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-108 |
github | elastic | examples | urllib3 | ==1.22 / 1.22 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mh33-7rrq-662w |
github | elastic | examples | urllib3 | ==1.22 / 1.22 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r64q-w8jr-g9qp |
github | elastic | examples | urllib3 | ==1.22 / 1.22 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wqvq-5m8c-6g24 |
github | elastic | examples | urllib3 | ==1.22 / 1.22 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-www2-v7xj-xrc6 |
github | elastic | examples | urllib3 | ==1.22 / 1.22 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2018-32 |
github | elastic | examples | urllib3 | ==1.22 / 1.22 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2019-132 |
github | elastic | examples | urllib3 | ==1.22 / 1.22 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2019-133 |
github | elastic | examples | urllib3 | ==1.22 / 1.22 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2020-148 |
github | elastic | examples | urllib3 | ==1.22 / 1.22 |
[] | Alerting/Sample Watches/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-108 |
github | elastic | examples | urllib3 | ==1.22 / 1.22 |
[] | Exploring Public Datasets/donorschoose/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mh33-7rrq-662w |
github | elastic | examples | urllib3 | ==1.22 / 1.22 |
[] | Exploring Public Datasets/donorschoose/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r64q-w8jr-g9qp |
github | elastic | examples | urllib3 | ==1.22 / 1.22 |
[] | Exploring Public Datasets/donorschoose/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wqvq-5m8c-6g24 |
github | elastic | examples | urllib3 | ==1.22 / 1.22 |
[] | Exploring Public Datasets/donorschoose/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-www2-v7xj-xrc6 |
github | elastic | examples | urllib3 | ==1.22 / 1.22 |
[] | Exploring Public Datasets/donorschoose/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2018-32 |
github | elastic | examples | urllib3 | ==1.22 / 1.22 |
[] | Exploring Public Datasets/donorschoose/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2019-132 |
github | elastic | examples | urllib3 | ==1.22 / 1.22 |
[] | Exploring Public Datasets/donorschoose/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2019-133 |
github | elastic | examples | urllib3 | ==1.22 / 1.22 |
[] | Exploring Public Datasets/donorschoose/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2020-148 |
github | elastic | examples | urllib3 | ==1.22 / 1.22 |
[] | Exploring Public Datasets/donorschoose/scripts/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-108 |
github | elastic | examples | urllib3 | ==1.25.7 / 1.25.7 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hmv2-79q8-fv6g |
github | elastic | examples | urllib3 | ==1.25.7 / 1.25.7 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-q2q7-5pp4-w6pg |
github | elastic | examples | urllib3 | ==1.25.7 / 1.25.7 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wqvq-5m8c-6g24 |
github | elastic | examples | urllib3 | ==1.25.7 / 1.25.7 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2020-148 |
github | elastic | examples | urllib3 | ==1.25.7 / 1.25.7 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2020-149 |
github | elastic | examples | urllib3 | ==1.25.7 / 1.25.7 |
[] | Machine Learning/Analytics Jupyter Notebooks/ml-analytics-classification-requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2021-108 |
github | elastic | examples | wheel | ==0.33.* / 0.33.6 |
[] | Machine Learning/Online Search Relevance Metrics/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qwmp-2cf2-g9g6 |
github | elastic | examples | wheel | ==0.33.* / 0.33.6 |
[] | Machine Learning/Online Search Relevance Metrics/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2022-43017 |
github | elastic | examples | wheel | ==0.35.* / 0.35.1 |
[] | Machine Learning/Query Optimization/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qwmp-2cf2-g9g6 |
github | elastic | examples | wheel | ==0.35.* / 0.35.1 |
[] | Machine Learning/Query Optimization/requirements.txt | Elastic | SECURITY | Package is vulnerable to CVE PYSEC-2022-43017 |
github | elastic | go-elasticsearch | gopkg.in/yaml.v2 | v2.2.2 / v2.2.2 |
["require"] | esapi/test/go.mod | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6q6q-88xp-6f2r |
github | elastic | go-elasticsearch | gopkg.in/yaml.v2 | v2.2.2 / v2.2.2 |
["require"] | esapi/test/go.mod | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r88r-gmrh-7j83 |
github | elastic | go-elasticsearch | gopkg.in/yaml.v2 | v2.2.2 / v2.2.2 |
["require"] | esapi/test/go.mod | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wxc4-f4m6-wwqv |
github | elastic | go-elasticsearch | gopkg.in/yaml.v2 | v2.2.2 / v2.2.2 |
["require"] | esapi/test/go.mod | Elastic | SECURITY | Package is vulnerable to CVE GO-2020-0036 |
github | elastic | go-elasticsearch | gopkg.in/yaml.v2 | v2.2.2 / v2.2.2 |
["require"] | esapi/test/go.mod | Elastic | SECURITY | Package is vulnerable to CVE GO-2021-0061 |
github | elastic | go-elasticsearch | gopkg.in/yaml.v2 | v2.2.2 / v2.2.2 |
["require"] | esapi/test/go.mod | Elastic | SECURITY | Package is vulnerable to CVE GO-2022-0956 |
github | elastic | kibana | @cypress/request | 2.88.12 / 2.88.12 |
["lockfile","lockfile-yarn-pinning-2.88.12"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p8p7-x288-28g6 |
github | elastic | kibana | com.google.guava:guava | 11.0.1 / 11.0.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | elastic | kibana | com.google.guava:guava | 11.0.1 / 11.0.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | elastic | kibana | com.google.guava:guava | 11.0.1 / 11.0.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mvr2-9pj6-7w5j |
github | elastic | kibana | commons-beanutils:commons-beanutils | 1.8.3 / 1.8.3 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6phf-73q6-gh87 |
github | elastic | kibana | commons-beanutils:commons-beanutils | 1.8.3 / 1.8.3 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p66x-2cv9-qq3v |
github | elastic | kibana | commons-collections:commons-collections | 3.2.1 / 3.2.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6hgm-866r-3cjv |
github | elastic | kibana | commons-collections:commons-collections | 3.2.1 / 3.2.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fjq5-5j5f-mvxh |
github | elastic | kibana | commons-fileupload:commons-fileupload | 1.3.1-jenkins-1 / 1.3.1-jenkins-1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7x9j-7223-rg5m |
github | elastic | kibana | commons-fileupload:commons-fileupload | 1.3.1-jenkins-1 / 1.3.1-jenkins-1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fvm3-cfvj-gxqq |
github | elastic | kibana | commons-fileupload:commons-fileupload | 1.3.1-jenkins-1 / 1.3.1-jenkins-1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hfrx-6qgj-fp6c |
github | elastic | kibana | commons-io:commons-io | 2.4 / 2.4 | ["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-gwrp-pvrq-jmwv |
github | elastic | kibana | d3-color | 1 - 2 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-1 - 2"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-36jr-mh4h-2g58 |
github | elastic | kibana | diff | ^1.3.2 / 1.4.0 |
["lockfile","lockfile-yarn-pinning-^1.3.2"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-h6ch-v84p-w6p9 |
github | elastic | kibana | glob-parent | ^3.1.0 / 3.1.0 |
["lockfile","lockfile-yarn-pinning-^3.1.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 |
github | elastic | kibana | got | ^9.6.0 / 9.6.0 |
["lockfile","lockfile-yarn-pinning-^9.6.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pfrx-2q88-qq97 |
github | elastic | kibana | junit:junit | 4.12 / 4.12 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-269g-pwp5-87pp |
github | elastic | kibana | junit:junit | 4.12 / 4.12 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-269g-pwp5-87pp |
github | elastic | kibana | log4j:log4j | 1.2.17 / 1.2.17 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-2qrg-x229-3v8q |
github | elastic | kibana | log4j:log4j | 1.2.17 / 1.2.17 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-65fg-84f6-3jq3 |
github | elastic | kibana | log4j:log4j | 1.2.17 / 1.2.17 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f7vh-qwp3-x37m |
github | elastic | kibana | log4j:log4j | 1.2.17 / 1.2.17 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fp5r-v3w9-4333 |
github | elastic | kibana | log4j:log4j | 1.2.17 / 1.2.17 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-w9p3-5cr8-m3jj |
github | elastic | kibana | org.acegisecurity:acegi-security | 1.0.7 / 1.0.7 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3295-h9qx-r82x |
github | elastic | kibana | org.apache.ant:ant | 1.8.4 / 1.8.4 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4p6w-m9wc-c9c9 |
github | elastic | kibana | org.apache.ant:ant | 1.8.4 / 1.8.4 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5v34-g2px-j4fw |
github | elastic | kibana | org.apache.ant:ant | 1.8.4 / 1.8.4 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f62v-xpxf-3v68 |
github | elastic | kibana | org.apache.ant:ant | 1.8.4 / 1.8.4 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-q5r4-cfpx-h6fh |
github | elastic | kibana | org.apache.commons:commons-compress | 1.10 / 1.10 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7hfm-57qf-j43q |
github | elastic | kibana | org.apache.commons:commons-compress | 1.10 / 1.10 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-crv7-7245-f45f |
github | elastic | kibana | org.apache.commons:commons-compress | 1.10 / 1.10 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hrmr-f5m6-m9pq |
github | elastic | kibana | org.apache.commons:commons-compress | 1.10 / 1.10 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mc84-pj99-q6hh |
github | elastic | kibana | org.apache.commons:commons-compress | 1.10 / 1.10 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-xqfj-vm6h-2x34 |
github | elastic | kibana | org.apache.ivy:ivy | 2.4.0 / 2.4.0 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-2jc4-r94c-rp7h |
github | elastic | kibana | org.apache.ivy:ivy | 2.4.0 / 2.4.0 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-94rr-4jr5-9h2p |
github | elastic | kibana | org.apache.ivy:ivy | 2.4.0 / 2.4.0 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wv7w-rj2x-556x |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-2632-h32j-6rg9 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-279f-qwgh-h5mp |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-28p3-mchr-9frj |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-2c79-h2h5-g3fw |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-2pp9-r4rv-6p6j |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-2xcm-h7vv-g8m9 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-34wx-x2w9-vqm3 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3pr8-rf62-g893 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3q84-vrvx-rfvf |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4625-q52w-39cx |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-47wc-p5cp-w7pw |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4g38-hrm4-rg94 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4h47-h3cr-23wh |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4jhm-5f7g-75fp |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4jjj-cm7q-v6hr |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4pw5-r58h-fv24 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4wr9-2xc6-jmg5 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-53jp-gmwc-jwf6 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-55wp-3pq4-w8p9 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-584m-7r4m-8j6v |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-58xm-mxjf-254g |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5hfp-964w-5vgm |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5j46-5hwq-gwh7 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6456-xjm5-g3pg |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-667q-vj58-rj88 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-69vw-3pcm-84rw |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6jfc-mc97-c7wg |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6q4g-84f3-mw74 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6rh5-23hx-j452 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-742j-jcfr-23w3 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7cjc-xppr-xj6x |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7f84-p6r5-jr6q |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7qf3-c2q8-69m3 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7xp8-7wqx-5hqx |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-864v-5q2g-fr64 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8qpf-fv36-h4r8 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8qxp-g8jv-p37x |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8xg4-xq2v-v6j7 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-929w-q433-4h9x |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-97c3-w9cr-6qc2 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-98fp-r22g-wpj7 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-98gq-6hxg-52r6 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9cjv-93g7-c6mv |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9g4m-ffx6-c29g |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9grj-j43m-mjqr |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9m48-54pj-h248 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9qgf-4fpf-cmh2 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c5r9-rx53-q3gf |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c735-g9f2-2mvp |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cj6r-8pxj-5jv6 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-crg2-6xv3-qg5f |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cv2w-q8c3-xjv7 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cvvm-4cr9-r436 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cxqw-vjcr-gp5g |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f585-9fw3-rj2m |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fj6f-6933-839j |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-frgr-c5f2-8qhh |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-g4j6-m3m3-crw8 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-g8pg-qrvm-wgh2 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-gfhj-524q-gcrm |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-gpxv-776p-7gc7 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-h76p-mc68-jv3p |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hcxf-rq72-h4rr |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hf9h-vv4m-2f33 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hg6g-jj7g-x6v2 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hhpm-5cp2-hg4x |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hph9-9vcq-f7gp |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hq87-h4jg-vxfw |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hv45-5j9h-7fhg |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hvmc-7g2x-r3p9 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hw55-f8wc-82m6 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-j3cq-h6vh-gx7f |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-j664-qhh4-hpf8 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-j8qv-mj4r-6fw4 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-jpvq-v729-7j2h |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-m9hr-259f-2v23 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mj7q-cmf3-mg7h |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p265-xr98-3vmr |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p92q-7fhh-mq35 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pgj6-jmj5-wqfx |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pgxv-h967-fw2q |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pvwx-3jx5-24r2 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pxgq-gqr9-5gwx |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-q4cq-r7hg-pxqq |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-q4wp-8c99-69pw |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-q6q9-83xw-mp6p |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qf38-f2fr-q4x9 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qgj4-rc8m-44mq |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qp4f-2w67-c8hw |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qpg9-83fv-x9ch |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qr42-82qj-mw65 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qv64-w99c-qcr9 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qv6f-rcv6-6q3x |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qxp6-27gw-99cj |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r2jf-rc5v-vmpv |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r78q-qgx6-64pp |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-rr6r-p7rw-369c |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-rrgp-c2w8-6vg6 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-vcr8-h8qp-qj8h |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-vpjm-58cw-r8q5 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-w2hv-rcqr-2h7r |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-w7jr-wqw6-54xc |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wmr8-25ff-ggpj |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.121.1 / 2.121.1 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wv63-gwr9-5c55 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-2632-h32j-6rg9 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-26wc-3wqp-g3rp |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-28p3-mchr-9frj |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-2c79-h2h5-g3fw |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-2pp9-r4rv-6p6j |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-2w4x-rxp7-grg7 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-2x9h-h3c4-wqqh |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-2xcm-h7vv-g8m9 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3297-944x-j7x7 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-34wx-x2w9-vqm3 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3pr8-rf62-g893 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3q84-vrvx-rfvf |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-42m6-7xff-9v9m |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4466-8jm4-448p |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4625-q52w-39cx |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-47wc-p5cp-w7pw |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4g38-hrm4-rg94 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4h47-h3cr-23wh |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4jhm-5f7g-75fp |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4jjj-cm7q-v6hr |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4pw5-r58h-fv24 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4wr9-2xc6-jmg5 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-53jp-gmwc-jwf6 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-584m-7r4m-8j6v |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-58xm-mxjf-254g |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5hfp-964w-5vgm |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5p59-v5wm-77v4 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5ppx-rgw2-xg23 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6456-xjm5-g3pg |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-667q-vj58-rj88 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6967-9vvv-4cmm |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-69vw-3pcm-84rw |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6jfc-mc97-c7wg |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6mv9-hcx5-7mhh |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6q4g-84f3-mw74 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6rh5-23hx-j452 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-742j-jcfr-23w3 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7592-93rm-6gpx |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7cjc-xppr-xj6x |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7f84-p6r5-jr6q |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7qf3-c2q8-69m3 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7r4h-2h23-6jq9 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7xp8-7wqx-5hqx |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-85wq-pqhp-hmq6 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-864v-5q2g-fr64 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8qpf-fv36-h4r8 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8qxp-g8jv-p37x |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8xg4-xq2v-v6j7 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-929w-q433-4h9x |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-92mr-4w2q-4578 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-97c3-w9cr-6qc2 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-98fp-r22g-wpj7 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-98gq-6hxg-52r6 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9cjv-93g7-c6mv |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9g4m-ffx6-c29g |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9grj-j43m-mjqr |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9jcv-v4jp-w3cq |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9m48-54pj-h248 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9qgf-4fpf-cmh2 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c5r9-rx53-q3gf |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c735-g9f2-2mvp |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cj6r-8pxj-5jv6 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cpw3-x7gf-p872 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-crg2-6xv3-qg5f |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cv2w-q8c3-xjv7 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cvvm-4cr9-r436 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cxqw-vjcr-gp5g |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f585-9fw3-rj2m |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-f7f6-xrwc-9c57 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-ffgg-vphh-v273 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fj6f-6933-839j |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fq9f-9wv9-rfmg |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-frgr-c5f2-8qhh |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fwqr-3pvp-pjwq |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-g4j6-m3m3-crw8 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-g78x-xmv8-23xp |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-g8pg-qrvm-wgh2 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-gfhj-524q-gcrm |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-gpxv-776p-7gc7 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-h76p-mc68-jv3p |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-h8c5-c92g-jq6x |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-h972-cwjv-2v39 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hcxf-rq72-h4rr |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hf9h-vv4m-2f33 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hg6g-jj7g-x6v2 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hhpm-5cp2-hg4x |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hph9-9vcq-f7gp |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hv45-5j9h-7fhg |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hvmc-7g2x-r3p9 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hw55-f8wc-82m6 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-j3cq-h6vh-gx7f |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-j472-mcq2-95p6 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-j664-qhh4-hpf8 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-j8qv-mj4r-6fw4 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-jff5-55xj-4jcq |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-jpvq-v729-7j2h |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-m93h-5qmx-pphg |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-m9hr-259f-2v23 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-mj7q-cmf3-mg7h |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p265-xr98-3vmr |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p8x8-p473-mmmv |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p92q-7fhh-mq35 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pgj6-jmj5-wqfx |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pgxv-h967-fw2q |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pvwx-3jx5-24r2 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pwv6-872c-gcg6 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pxgq-gqr9-5gwx |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-q4cq-r7hg-pxqq |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-q4wp-8c99-69pw |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-q6q9-83xw-mp6p |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qf38-f2fr-q4x9 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qgj4-rc8m-44mq |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qp4f-2w67-c8hw |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qpg9-83fv-x9ch |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qr42-82qj-mw65 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qv6f-rcv6-6q3x |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-qxp6-27gw-99cj |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r2jf-rc5v-vmpv |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r57f-7xw3-q2r9 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r69c-5j7c-vm6q |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r78q-qgx6-64pp |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-r9q2-3r6x-qmgp |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-rgmj-mccj-h9mx |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-rr6r-p7rw-369c |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-rrgp-c2w8-6vg6 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-v222-w2mw-xjc6 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-vcr8-h8qp-qj8h |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-vpjm-58cw-r8q5 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-w2hv-rcqr-2h7r |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-w7jr-wqw6-54xc |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wf9g-rh76-6jvr |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wfj3-535m-p6fx |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wj5c-j656-h5fw |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wmr8-25ff-ggpj |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wqv4-9gr3-3qgh |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wv63-gwr9-5c55 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-x3rc-cxv7-6xp6 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-x55p-6526-xmmp |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-x646-m7x2-gcp7 |
github | elastic | kibana | org.jenkins-ci.main:jenkins-core | 2.23 / 2.23 |
["dependencies"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-x6jw-2f23-mc5j |
github | elastic | kibana | org.kohsuke:libpam4j | 1.8 / 1.8 | ["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-x9rg-q5fx-fx66 |
github | elastic | kibana | org.mindrot:jbcrypt | 0.3m / 0.3m |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-9h6p-92jq-888x |
github | elastic | kibana | org.springframework:spring-beans | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-36p3-wjmg-h94x |
github | elastic | kibana | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-3rmv-2pg5-xvqj |
github | elastic | kibana | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4487-x383-qpph |
github | elastic | kibana | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-564r-hj7v-mcr5 |
github | elastic | kibana | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8crv-49fr-2h6j |
github | elastic | kibana | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-ffvq-7w96-97p7 |
github | elastic | kibana | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-g5mm-vmx4-3rg7 |
github | elastic | kibana | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-g8hw-794c-4j9g |
github | elastic | kibana | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-hh26-6xwr-ggv7 |
github | elastic | kibana | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-p5hg-3xm3-gcjg |
github | elastic | kibana | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-pgf9-h69p-pcgf |
github | elastic | kibana | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-rcpf-vj53-7h2m |
github | elastic | kibana | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-rqph-vqwm-22vc |
github | elastic | kibana | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wjjr-h4wh-w6vv |
github | elastic | kibana | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-wxqc-pxw9-g2p8 |
github | elastic | kibana | org.springframework:spring-web | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-4wrc-f8pq-fpqp |
github | elastic | kibana | org.springframework:spring-web | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-6v7w-535j-rq5m |
github | elastic | kibana | org.springframework:spring-web | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-g6hf-f9cq-q7w7 |
github | elastic | kibana | org.springframework:spring-web | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-xjrf-8x4f-43h4 |
github | elastic | kibana | org.springframework:spring-webmvc | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-2m8h-fgr8-2q9w |
github | elastic | kibana | org.springframework:spring-webmvc | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-36p3-wjmg-h94x |
github | elastic | kibana | org.springframework:spring-webmvc | 2.5.6.SEC03 / 2.5.6.SEC03 |
["dependencies","missing-data"] | .ci/pipeline-library/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-8cmm-qj8g-fcp6 |
github | elastic | kibana | semver | 2 || 3 || 4 || 5 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-2 || 3 || 4 || 5"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | kibana | semver | 5.6.0 / 5.6.0 |
["lockfile","lockfile-yarn-pinning-5.6.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | kibana | semver | ^5.4.1 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.4.1"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | kibana | semver | ^5.5.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.5.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | kibana | semver | ^5.6.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.6.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw |
github | elastic | kibana | trim-newlines | ^1.0.0 / 1.0.0 |
["lockfile","lockfile-yarn-pinning-^1.0.0"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7p7h-4mm5-852v |
github | elastic | kibana | ua-parser-js | ^0.7.18 / 0.7.24 |
["lockfile","lockfile-yarn-pinning-^0.7.18"] | package.json | Elastic | SECURITY | Package is vulnerable to CVE GHSA-fhg7-m89q-25r3 |
github | elastic | logstash | com.google.guava:guava | 24.1.1-jre / 24.1.1-jre |
["dependencies"] | logstash-core/benchmarks/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | elastic | logstash | com.google.guava:guava | 24.1.1-jre / 24.1.1-jre |
["dependencies"] | logstash-core/benchmarks/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | elastic | logstash | com.google.guava:guava | 31.0.1-jre / 31.0.1-jre |
["dependencies","missing-data"] | logstash-core/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | elastic | logstash | com.google.guava:guava | 31.0.1-jre / 31.0.1-jre |
["dependencies","missing-data"] | logstash-core/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | elastic | logstash | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies"] | logstash-core/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 |
github | elastic | logstash | com.google.guava:guava | 31.1-jre / 31.1-jre |
["dependencies"] | logstash-core/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 |
github | elastic | logstash | junit:junit | 4.12 / 4.12 |
["dependencies"] | logstash-core/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-269g-pwp5-87pp |
github | elastic | logstash | junit:junit | 4.12 / 4.12 |
["dependencies"] | qa/integration/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-269g-pwp5-87pp |
github | elastic | logstash | junit:junit | 4.12 / 4.12 |
["dependencies"] | tools/benchmark-cli/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-269g-pwp5-87pp |
github | elastic | logstash | junit:junit | 4.12 / 4.12 |
["dependencies"] | tools/dependencies-report/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-269g-pwp5-87pp |
github | elastic | logstash | junit:junit | 4.12 / 4.12 |
["dependencies"] | tools/ingest-converter/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-269g-pwp5-87pp |
github | elastic | logstash | junit:junit | 4.12 / 4.12 |
["dependencies"] | tools/jvm-options-parser/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-269g-pwp5-87pp |
github | elastic | logstash | junit:junit | 4.12 / 4.12 |
["dependencies"] | x-pack/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-269g-pwp5-87pp |
github | elastic | logstash | org.apache.commons:commons-compress | 1.23.0 / 1.23.0 |
["dependencies"] | tools/benchmark-cli/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-cgwf-w82q-5jrr |
github | elastic | logstash | org.apache.httpcomponents:httpclient | 4.5.12 / 4.5.12 |
["dependencies"] | tools/benchmark-cli/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7r82-7xv7-xcpj |
github | elastic | logstash | org.apache.httpcomponents:httpclient | 4.5.2 / 4.5.2 |
["dependencies","missing-data"] | tools/benchmark-cli/build.gradle | Elastic | SECURITY | Package is vulnerable to CVE GHSA-7r82-7xv7-xcpj |
github | golangci | golangci-lint | @braintree/sanitize-url | 3.1.0 / 3.1.0 |
["dependencies","lockfile"] | docs/package.json | SECURITY | Package is vulnerable to CVE GHSA-hqq7-2q2v-82xq | |
github | golangci | golangci-lint | @braintree/sanitize-url | 3.1.0 / 3.1.0 |
["dependencies","lockfile"] | docs/package.json | SECURITY | Package is vulnerable to CVE GHSA-q8gg-vj6m-hgmj | |
github | golangci | golangci-lint | ansi-html | 0.0.7 / 0.0.7 |
["dependencies","lockfile"] | docs/package.json | SECURITY | Package is vulnerable to CVE GHSA-whgm-jr23-g3j9 | |
github | golangci | golangci-lint | d3-color | 1.4.1 / 1.4.1 |
["dependencies","lockfile"] | docs/package.json | SECURITY | Package is vulnerable to CVE GHSA-36jr-mh4h-2g58 | |
github | golangci | golangci-lint | engine.io | 6.2.1 / 6.2.1 |
["dependencies","lockfile"] | docs/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | golangci | golangci-lint | github.com/aws/aws-sdk-go | v1.44.257 / v1.44.257 |
["indirect"] | tools/go.mod | SECURITY | Package is vulnerable to CVE GO-2022-0646 | |
github | golangci | golangci-lint | golang.org/x/net | v0.10.0 / v0.10.0 |
["indirect"] | test/testdata/ginkgolinter/go.mod | SECURITY | Package is vulnerable to CVE GO-2023-1988 | |
github | golangci | golangci-lint | golang.org/x/net | v0.10.0 / v0.10.0 |
["indirect"] | tools/go.mod | SECURITY | Package is vulnerable to CVE GO-2023-1988 | |
github | golangci | golangci-lint | hosted-git-info | 2.8.8 / 2.8.8 |
["dependencies","lockfile"] | .github/contributors/package.json | SECURITY | Package is vulnerable to CVE GHSA-43f8-2h32-f4cj | |
github | golangci | golangci-lint | hosted-git-info | 2.8.8 / 2.8.8 |
["dependencies","lockfile"] | docs/package.json | SECURITY | Package is vulnerable to CVE GHSA-43f8-2h32-f4cj | |
github | golangci | golangci-lint | json5 | 2.2.1 / 2.2.1 |
["dependencies","lockfile"] | docs/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | golangci | golangci-lint | loader-utils | 1.4.0 / 1.4.0 |
["dependencies","lockfile"] | docs/package.json | SECURITY | Package is vulnerable to CVE GHSA-3rfm-jhwj-7488 | |
github | golangci | golangci-lint | loader-utils | 1.4.0 / 1.4.0 |
["dependencies","lockfile"] | docs/package.json | SECURITY | Package is vulnerable to CVE GHSA-76p3-8jx3-jpfq | |
github | golangci | golangci-lint | loader-utils | 1.4.0 / 1.4.0 |
["dependencies","lockfile"] | docs/package.json | SECURITY | Package is vulnerable to CVE GHSA-hhq3-ff78-jv3g | |
github | golangci | golangci-lint | mermaid | 8.14.0 / 8.14.0 |
["dependencies","lockfile"] | docs/package.json | SECURITY | Package is vulnerable to CVE GHSA-x3vm-38hw-55wf | |
github | golangci | golangci-lint | node.extend | 1.0.8 / 1.0.8 |
["dependencies","lockfile"] | .github/contributors/package.json | SECURITY | Package is vulnerable to CVE GHSA-r96c-57pf-9jjm | |
github | golangci | golangci-lint | nth-check | 1.0.2 / 1.0.2 |
["dependencies","lockfile"] | docs/package.json | SECURITY | Package is vulnerable to CVE GHSA-rp65-9cf3-cjxr | |
github | golangci | golangci-lint | path-parse | 1.0.6 / 1.0.6 |
["dependencies","lockfile"] | .github/contributors/package.json | SECURITY | Package is vulnerable to CVE GHSA-hj48-42vr-x3v9 | |
github | golangci | golangci-lint | sanitize-html | 1.27.5 / 1.27.5 |
["dependencies","lockfile"] | docs/package.json | SECURITY | Package is vulnerable to CVE GHSA-mjxr-4v3x-q3m4 | |
github | golangci | golangci-lint | sanitize-html | 1.27.5 / 1.27.5 |
["dependencies","lockfile"] | docs/package.json | SECURITY | Package is vulnerable to CVE GHSA-rjqq-98f6-6j3r | |
github | golangci | golangci-lint | trim | 0.0.1 / 0.0.1 |
["dependencies","lockfile"] | docs/package.json | SECURITY | Package is vulnerable to CVE GHSA-w5p7-h5w8-2hfq | |
github | golangci | golangci-lint | trim-newlines | 2.0.0 / 2.0.0 |
["dependencies","lockfile"] | .github/contributors/package.json | SECURITY | Package is vulnerable to CVE GHSA-7p7h-4mm5-852v | |
github | golangci | golangci-lint | trim-newlines | 3.0.0 / 3.0.0 |
["dependencies","lockfile"] | docs/package.json | SECURITY | Package is vulnerable to CVE GHSA-7p7h-4mm5-852v | |
github | gravitational | teleport | github.com/aws/aws-sdk-go | v1.44.269 / v1.44.269 |
["require"] | examples/teleport-usage/go.mod | SECURITY | Package is vulnerable to CVE GO-2022-0646 | |
github | gravitational | teleport | github.com/aws/aws-sdk-go | v1.45.15 / v1.45.15 |
["require"] | go.mod | SECURITY | Package is vulnerable to CVE GO-2022-0646 | |
github | gravitational | teleport | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-1229 | |
github | gravitational | teleport | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-1249 | |
github | gravitational | teleport | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-1314 | |
github | gravitational | teleport | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-1678 | |
github | gravitational | teleport | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-1695 | |
github | gravitational | teleport | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-281 | |
github | gravitational | teleport | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-308 | |
github | gravitational | teleport | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-333 | |
github | gravitational | teleport | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-347 | |
github | gravitational | teleport | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-349 | |
github | gravitational | teleport | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-520 | |
github | gravitational | teleport | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-541 | |
github | gravitational | teleport | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-581 | |
github | gravitational | teleport | glob-parent | ^3.1.0 / 3.1.0 |
["lockfile","lockfile-yarn-pinning-^3.1.0"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 | |
github | gravitational | teleport | glob-parent | ^3.1.0 / 3.1.0 |
["lockfile","lockfile-yarn-pinning-^3.1.0"] | web/packages/build/package.json | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 | |
github | gravitational | teleport | glob-parent | ^3.1.0 / 3.1.0 |
["lockfile","lockfile-yarn-pinning-^3.1.0"] | web/packages/design/package.json | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 | |
github | gravitational | teleport | glob-parent | ^3.1.0 / 3.1.0 |
["lockfile","lockfile-yarn-pinning-^3.1.0"] | web/packages/e-imports/package.json | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 | |
github | gravitational | teleport | glob-parent | ^3.1.0 / 3.1.0 |
["lockfile","lockfile-yarn-pinning-^3.1.0"] | web/packages/shared/package.json | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 | |
github | gravitational | teleport | glob-parent | ^3.1.0 / 3.1.0 |
["lockfile","lockfile-yarn-pinning-^3.1.0"] | web/packages/teleport/package.json | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 | |
github | gravitational | teleport | glob-parent | ^3.1.0 / 3.1.0 |
["lockfile","lockfile-yarn-pinning-^3.1.0"] | web/packages/teleterm/package.json | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 | |
github | gravitational | teleport | golang.org/x/net | v0.7.0 / v0.7.0 |
["indirect"] | examples/desktop-registration/go.mod | SECURITY | Package is vulnerable to CVE GO-2023-1988 | |
github | gravitational | teleport | golang.org/x/net | v0.7.0 / v0.7.0 |
["indirect"] | examples/go-client/go.mod | SECURITY | Package is vulnerable to CVE GO-2023-1988 | |
github | gravitational | teleport | golang.org/x/net | v0.8.0 / v0.8.0 |
["indirect"] | examples/access-plugin-minimal/go.mod | SECURITY | Package is vulnerable to CVE GO-2023-1988 | |
github | gravitational | teleport | golang.org/x/net | v0.8.0 / v0.8.0 |
["indirect"] | examples/api-sync-roles/go.mod | SECURITY | Package is vulnerable to CVE GO-2023-1988 | |
github | gravitational | teleport | golang.org/x/net | v0.8.0 / v0.8.0 |
["indirect"] | examples/service-discovery-api-client/go.mod | SECURITY | Package is vulnerable to CVE GO-2023-1988 | |
github | gravitational | teleport | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-3rfm-jhwj-7488 | |
github | gravitational | teleport | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-76p3-8jx3-jpfq | |
github | gravitational | teleport | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-hhq3-ff78-jv3g | |
github | gravitational | teleport | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | web/packages/build/package.json | SECURITY | Package is vulnerable to CVE GHSA-3rfm-jhwj-7488 | |
github | gravitational | teleport | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | web/packages/build/package.json | SECURITY | Package is vulnerable to CVE GHSA-76p3-8jx3-jpfq | |
github | gravitational | teleport | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | web/packages/build/package.json | SECURITY | Package is vulnerable to CVE GHSA-hhq3-ff78-jv3g | |
github | gravitational | teleport | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | web/packages/design/package.json | SECURITY | Package is vulnerable to CVE GHSA-3rfm-jhwj-7488 | |
github | gravitational | teleport | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | web/packages/design/package.json | SECURITY | Package is vulnerable to CVE GHSA-76p3-8jx3-jpfq | |
github | gravitational | teleport | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | web/packages/design/package.json | SECURITY | Package is vulnerable to CVE GHSA-hhq3-ff78-jv3g | |
github | gravitational | teleport | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | web/packages/e-imports/package.json | SECURITY | Package is vulnerable to CVE GHSA-3rfm-jhwj-7488 | |
github | gravitational | teleport | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | web/packages/e-imports/package.json | SECURITY | Package is vulnerable to CVE GHSA-76p3-8jx3-jpfq | |
github | gravitational | teleport | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | web/packages/e-imports/package.json | SECURITY | Package is vulnerable to CVE GHSA-hhq3-ff78-jv3g | |
github | gravitational | teleport | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | web/packages/shared/package.json | SECURITY | Package is vulnerable to CVE GHSA-3rfm-jhwj-7488 | |
github | gravitational | teleport | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | web/packages/shared/package.json | SECURITY | Package is vulnerable to CVE GHSA-76p3-8jx3-jpfq | |
github | gravitational | teleport | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | web/packages/shared/package.json | SECURITY | Package is vulnerable to CVE GHSA-hhq3-ff78-jv3g | |
github | gravitational | teleport | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | web/packages/teleport/package.json | SECURITY | Package is vulnerable to CVE GHSA-3rfm-jhwj-7488 | |
github | gravitational | teleport | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | web/packages/teleport/package.json | SECURITY | Package is vulnerable to CVE GHSA-76p3-8jx3-jpfq | |
github | gravitational | teleport | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | web/packages/teleport/package.json | SECURITY | Package is vulnerable to CVE GHSA-hhq3-ff78-jv3g | |
github | gravitational | teleport | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | web/packages/teleterm/package.json | SECURITY | Package is vulnerable to CVE GHSA-3rfm-jhwj-7488 | |
github | gravitational | teleport | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | web/packages/teleterm/package.json | SECURITY | Package is vulnerable to CVE GHSA-76p3-8jx3-jpfq | |
github | gravitational | teleport | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | web/packages/teleterm/package.json | SECURITY | Package is vulnerable to CVE GHSA-hhq3-ff78-jv3g | |
github | gravitational | teleport | qs | 6.7.0 / 6.7.0 |
["lockfile","lockfile-yarn-pinning-6.7.0"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | gravitational | teleport | qs | 6.7.0 / 6.7.0 |
["lockfile","lockfile-yarn-pinning-6.7.0"] | web/packages/build/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | gravitational | teleport | qs | 6.7.0 / 6.7.0 |
["lockfile","lockfile-yarn-pinning-6.7.0"] | web/packages/design/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | gravitational | teleport | qs | 6.7.0 / 6.7.0 |
["lockfile","lockfile-yarn-pinning-6.7.0"] | web/packages/e-imports/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | gravitational | teleport | qs | 6.7.0 / 6.7.0 |
["lockfile","lockfile-yarn-pinning-6.7.0"] | web/packages/shared/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | gravitational | teleport | qs | 6.7.0 / 6.7.0 |
["lockfile","lockfile-yarn-pinning-6.7.0"] | web/packages/teleport/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | gravitational | teleport | qs | 6.7.0 / 6.7.0 |
["lockfile","lockfile-yarn-pinning-6.7.0"] | web/packages/teleterm/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | gravitational | teleport | qs | ^6.10.0 / 6.10.1 |
["lockfile","lockfile-yarn-pinning-^6.10.0"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | gravitational | teleport | qs | ^6.10.0 / 6.10.1 |
["lockfile","lockfile-yarn-pinning-^6.10.0"] | web/packages/build/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | gravitational | teleport | qs | ^6.10.0 / 6.10.1 |
["lockfile","lockfile-yarn-pinning-^6.10.0"] | web/packages/design/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | gravitational | teleport | qs | ^6.10.0 / 6.10.1 |
["lockfile","lockfile-yarn-pinning-^6.10.0"] | web/packages/e-imports/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | gravitational | teleport | qs | ^6.10.0 / 6.10.1 |
["lockfile","lockfile-yarn-pinning-^6.10.0"] | web/packages/shared/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | gravitational | teleport | qs | ^6.10.0 / 6.10.1 |
["lockfile","lockfile-yarn-pinning-^6.10.0"] | web/packages/teleport/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | gravitational | teleport | qs | ^6.10.0 / 6.10.1 |
["lockfile","lockfile-yarn-pinning-^6.10.0"] | web/packages/teleterm/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | gravitational | teleport | semver | 7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-7.0.0"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | gravitational | teleport | semver | 7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-7.0.0"] | web/packages/build/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | gravitational | teleport | semver | 7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-7.0.0"] | web/packages/design/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | gravitational | teleport | semver | 7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-7.0.0"] | web/packages/e-imports/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | gravitational | teleport | semver | 7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-7.0.0"] | web/packages/shared/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | gravitational | teleport | semver | 7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-7.0.0"] | web/packages/teleport/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | gravitational | teleport | semver | 7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-7.0.0"] | web/packages/teleterm/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | gravitational | teleport | semver | ~7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-~7.0.0"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | gravitational | teleport | semver | ~7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-~7.0.0"] | web/packages/build/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | gravitational | teleport | semver | ~7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-~7.0.0"] | web/packages/design/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | gravitational | teleport | semver | ~7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-~7.0.0"] | web/packages/e-imports/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | gravitational | teleport | semver | ~7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-~7.0.0"] | web/packages/shared/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | gravitational | teleport | semver | ~7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-~7.0.0"] | web/packages/teleport/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | gravitational | teleport | semver | ~7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-~7.0.0"] | web/packages/teleterm/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | gravitational | teleport | trim | 0.0.1 / 0.0.1 |
["lockfile","lockfile-yarn-pinning-0.0.1"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-w5p7-h5w8-2hfq | |
github | gravitational | teleport | trim | 0.0.1 / 0.0.1 |
["lockfile","lockfile-yarn-pinning-0.0.1"] | web/packages/build/package.json | SECURITY | Package is vulnerable to CVE GHSA-w5p7-h5w8-2hfq | |
github | gravitational | teleport | trim | 0.0.1 / 0.0.1 |
["lockfile","lockfile-yarn-pinning-0.0.1"] | web/packages/design/package.json | SECURITY | Package is vulnerable to CVE GHSA-w5p7-h5w8-2hfq | |
github | gravitational | teleport | trim | 0.0.1 / 0.0.1 |
["lockfile","lockfile-yarn-pinning-0.0.1"] | web/packages/e-imports/package.json | SECURITY | Package is vulnerable to CVE GHSA-w5p7-h5w8-2hfq | |
github | gravitational | teleport | trim | 0.0.1 / 0.0.1 |
["lockfile","lockfile-yarn-pinning-0.0.1"] | web/packages/shared/package.json | SECURITY | Package is vulnerable to CVE GHSA-w5p7-h5w8-2hfq | |
github | gravitational | teleport | trim | 0.0.1 / 0.0.1 |
["lockfile","lockfile-yarn-pinning-0.0.1"] | web/packages/teleport/package.json | SECURITY | Package is vulnerable to CVE GHSA-w5p7-h5w8-2hfq | |
github | gravitational | teleport | trim | 0.0.1 / 0.0.1 |
["lockfile","lockfile-yarn-pinning-0.0.1"] | web/packages/teleterm/package.json | SECURITY | Package is vulnerable to CVE GHSA-w5p7-h5w8-2hfq | |
github | hashicorp | consul | ansi-html | ^0.0.7 / 0.0.7 |
["lockfile","lockfile-yarn-pinning-^0.0.7"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-whgm-jr23-g3j9 | |
github | hashicorp | consul | ansi-html | ^0.0.7 / 0.0.7 |
["lockfile","lockfile-yarn-pinning-^0.0.7"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-whgm-jr23-g3j9 | |
github | hashicorp | consul | ansi-html | ^0.0.7 / 0.0.7 |
["lockfile","lockfile-yarn-pinning-^0.0.7"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-whgm-jr23-g3j9 | |
github | hashicorp | consul | ansi-html | ^0.0.7 / 0.0.7 |
["lockfile","lockfile-yarn-pinning-^0.0.7"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-whgm-jr23-g3j9 | |
github | hashicorp | consul | ansi-html | ^0.0.7 / 0.0.7 |
["lockfile","lockfile-yarn-pinning-^0.0.7"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-whgm-jr23-g3j9 | |
github | hashicorp | consul | ansi-html | ^0.0.7 / 0.0.7 |
["lockfile","lockfile-yarn-pinning-^0.0.7"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-whgm-jr23-g3j9 | |
github | hashicorp | consul | ansi-html | ^0.0.7 / 0.0.7 |
["lockfile","lockfile-yarn-pinning-^0.0.7"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-whgm-jr23-g3j9 | |
github | hashicorp | consul | ansi-html | ^0.0.7 / 0.0.7 |
["lockfile","lockfile-yarn-pinning-^0.0.7"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-whgm-jr23-g3j9 | |
github | hashicorp | consul | clean-css | ^3.4.5 / 3.4.28 |
["lockfile","lockfile-yarn-pinning-^3.4.5"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-wxhq-pm8v-cw75 | |
github | hashicorp | consul | clean-css | ^3.4.5 / 3.4.28 |
["lockfile","lockfile-yarn-pinning-^3.4.5"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-wxhq-pm8v-cw75 | |
github | hashicorp | consul | clean-css | ^3.4.5 / 3.4.28 |
["lockfile","lockfile-yarn-pinning-^3.4.5"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-wxhq-pm8v-cw75 | |
github | hashicorp | consul | clean-css | ^3.4.5 / 3.4.28 |
["lockfile","lockfile-yarn-pinning-^3.4.5"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-wxhq-pm8v-cw75 | |
github | hashicorp | consul | clean-css | ^3.4.5 / 3.4.28 |
["lockfile","lockfile-yarn-pinning-^3.4.5"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-wxhq-pm8v-cw75 | |
github | hashicorp | consul | clean-css | ^3.4.5 / 3.4.28 |
["lockfile","lockfile-yarn-pinning-^3.4.5"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-wxhq-pm8v-cw75 | |
github | hashicorp | consul | clean-css | ^3.4.5 / 3.4.28 |
["lockfile","lockfile-yarn-pinning-^3.4.5"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-wxhq-pm8v-cw75 | |
github | hashicorp | consul | clean-css | ^3.4.5 / 3.4.28 |
["lockfile","lockfile-yarn-pinning-^3.4.5"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-wxhq-pm8v-cw75 | |
github | hashicorp | consul | codemirror | ~5.15.0 / 5.15.2 |
["lockfile","lockfile-yarn-pinning-~5.15.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-4gw3-8f77-f72c | |
github | hashicorp | consul | codemirror | ~5.15.0 / 5.15.2 |
["lockfile","lockfile-yarn-pinning-~5.15.0"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-4gw3-8f77-f72c | |
github | hashicorp | consul | codemirror | ~5.15.0 / 5.15.2 |
["lockfile","lockfile-yarn-pinning-~5.15.0"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-4gw3-8f77-f72c | |
github | hashicorp | consul | codemirror | ~5.15.0 / 5.15.2 |
["lockfile","lockfile-yarn-pinning-~5.15.0"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-4gw3-8f77-f72c | |
github | hashicorp | consul | codemirror | ~5.15.0 / 5.15.2 |
["lockfile","lockfile-yarn-pinning-~5.15.0"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-4gw3-8f77-f72c | |
github | hashicorp | consul | codemirror | ~5.15.0 / 5.15.2 |
["lockfile","lockfile-yarn-pinning-~5.15.0"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-4gw3-8f77-f72c | |
github | hashicorp | consul | codemirror | ~5.15.0 / 5.15.2 |
["lockfile","lockfile-yarn-pinning-~5.15.0"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-4gw3-8f77-f72c | |
github | hashicorp | consul | codemirror | ~5.15.0 / 5.15.2 |
["lockfile","lockfile-yarn-pinning-~5.15.0"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-4gw3-8f77-f72c | |
github | hashicorp | consul | cross-fetch | 3.1.4 / 3.1.4 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-7gc6-qh9x-w6h8 | |
github | hashicorp | consul | d3-color | 1 - 2 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-1 - 2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-36jr-mh4h-2g58 | |
github | hashicorp | consul | d3-color | 1 - 2 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-1 - 2"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-36jr-mh4h-2g58 | |
github | hashicorp | consul | d3-color | 1 - 2 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-1 - 2"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-36jr-mh4h-2g58 | |
github | hashicorp | consul | d3-color | 1 - 2 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-1 - 2"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-36jr-mh4h-2g58 | |
github | hashicorp | consul | d3-color | 1 - 2 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-1 - 2"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-36jr-mh4h-2g58 | |
github | hashicorp | consul | d3-color | 1 - 2 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-1 - 2"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-36jr-mh4h-2g58 | |
github | hashicorp | consul | d3-color | 1 - 2 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-1 - 2"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-36jr-mh4h-2g58 | |
github | hashicorp | consul | d3-color | 1 - 2 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-1 - 2"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-36jr-mh4h-2g58 | |
github | hashicorp | consul | decode-uri-component | 0.2.0 / 0.2.0 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-w573-4hg7-7wgq | |
github | hashicorp | consul | ejs | 3.1.5 / 3.1.5 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-phwq-j96m-2c2q | |
github | hashicorp | consul | engine.io | ~6.4.1 / 6.4.1 |
["lockfile","lockfile-yarn-pinning-~6.4.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | hashicorp | consul | engine.io | ~6.4.1 / 6.4.1 |
["lockfile","lockfile-yarn-pinning-~6.4.1"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | hashicorp | consul | engine.io | ~6.4.1 / 6.4.1 |
["lockfile","lockfile-yarn-pinning-~6.4.1"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | hashicorp | consul | engine.io | ~6.4.1 / 6.4.1 |
["lockfile","lockfile-yarn-pinning-~6.4.1"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | hashicorp | consul | engine.io | ~6.4.1 / 6.4.1 |
["lockfile","lockfile-yarn-pinning-~6.4.1"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | hashicorp | consul | engine.io | ~6.4.1 / 6.4.1 |
["lockfile","lockfile-yarn-pinning-~6.4.1"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | hashicorp | consul | engine.io | ~6.4.1 / 6.4.1 |
["lockfile","lockfile-yarn-pinning-~6.4.1"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | hashicorp | consul | engine.io | ~6.4.1 / 6.4.1 |
["lockfile","lockfile-yarn-pinning-~6.4.1"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | hashicorp | consul | github.com/aws/aws-sdk-go | v1.44.289 / v1.44.289 |
["indirect"] | test-integ/go.mod | SECURITY | Package is vulnerable to CVE GO-2022-0646 | |
github | hashicorp | consul | github.com/aws/aws-sdk-go | v1.44.289 / v1.44.289 |
["indirect"] | test/integration/consul-container/go.mod | SECURITY | Package is vulnerable to CVE GO-2022-0646 | |
github | hashicorp | consul | github.com/aws/aws-sdk-go | v1.44.289 / v1.44.289 |
["require"] | go.mod | SECURITY | Package is vulnerable to CVE GO-2022-0646 | |
github | hashicorp | consul | github.com/hashicorp/consul | v1.11.4 / v1.11.4 |
["require"] | internal/tools/proto-gen-rpc-glue/e2e/go.mod | SECURITY | Package is vulnerable to CVE GHSA-c57c-7hrj-6q6v | |
github | hashicorp | consul | github.com/hashicorp/consul | v1.11.4 / v1.11.4 |
["require"] | internal/tools/proto-gen-rpc-glue/e2e/go.mod | SECURITY | Package is vulnerable to CVE GHSA-m69r-9g56-7mv8 | |
github | hashicorp | consul | github.com/hashicorp/consul | v1.11.4 / v1.11.4 |
["require"] | internal/tools/proto-gen-rpc-glue/e2e/go.mod | SECURITY | Package is vulnerable to CVE GHSA-q6h7-4qgw-2j9p | |
github | hashicorp | consul | github.com/hashicorp/consul | v1.15.2 / v1.15.2 |
["require"] | test/integration/connect/envoy/test-sds-server/go.mod | SECURITY | Package is vulnerable to CVE GHSA-c57c-7hrj-6q6v | |
github | hashicorp | consul | github.com/hashicorp/consul | v1.15.2 / v1.15.2 |
["require"] | test/integration/connect/envoy/test-sds-server/go.mod | SECURITY | Package is vulnerable to CVE GHSA-rqjq-ww83-wv5c | |
github | hashicorp | consul | glob-parent | ^3.1.0 / 3.1.0 |
["lockfile","lockfile-yarn-pinning-^3.1.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 | |
github | hashicorp | consul | glob-parent | ^3.1.0 / 3.1.0 |
["lockfile","lockfile-yarn-pinning-^3.1.0"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 | |
github | hashicorp | consul | glob-parent | ^3.1.0 / 3.1.0 |
["lockfile","lockfile-yarn-pinning-^3.1.0"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 | |
github | hashicorp | consul | glob-parent | ^3.1.0 / 3.1.0 |
["lockfile","lockfile-yarn-pinning-^3.1.0"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 | |
github | hashicorp | consul | glob-parent | ^3.1.0 / 3.1.0 |
["lockfile","lockfile-yarn-pinning-^3.1.0"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 | |
github | hashicorp | consul | glob-parent | ^3.1.0 / 3.1.0 |
["lockfile","lockfile-yarn-pinning-^3.1.0"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 | |
github | hashicorp | consul | glob-parent | ^3.1.0 / 3.1.0 |
["lockfile","lockfile-yarn-pinning-^3.1.0"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 | |
github | hashicorp | consul | glob-parent | ^3.1.0 / 3.1.0 |
["lockfile","lockfile-yarn-pinning-^3.1.0"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 | |
github | hashicorp | consul | json5 | 2.2.0 / 2.2.0 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | hashicorp | consul | json5 | ^0.5.1 / 0.5.1 |
["lockfile","lockfile-yarn-pinning-^0.5.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | hashicorp | consul | json5 | ^0.5.1 / 0.5.1 |
["lockfile","lockfile-yarn-pinning-^0.5.1"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | hashicorp | consul | json5 | ^0.5.1 / 0.5.1 |
["lockfile","lockfile-yarn-pinning-^0.5.1"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | hashicorp | consul | json5 | ^0.5.1 / 0.5.1 |
["lockfile","lockfile-yarn-pinning-^0.5.1"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | hashicorp | consul | json5 | ^0.5.1 / 0.5.1 |
["lockfile","lockfile-yarn-pinning-^0.5.1"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | hashicorp | consul | json5 | ^0.5.1 / 0.5.1 |
["lockfile","lockfile-yarn-pinning-^0.5.1"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | hashicorp | consul | json5 | ^0.5.1 / 0.5.1 |
["lockfile","lockfile-yarn-pinning-^0.5.1"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | hashicorp | consul | json5 | ^0.5.1 / 0.5.1 |
["lockfile","lockfile-yarn-pinning-^0.5.1"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | hashicorp | consul | markdown-it | ^8.3.1 / 8.4.2 |
["lockfile","lockfile-yarn-pinning-^8.3.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-6vfc-qv3f-vr6c | |
github | hashicorp | consul | markdown-it | ^8.3.1 / 8.4.2 |
["lockfile","lockfile-yarn-pinning-^8.3.1"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-6vfc-qv3f-vr6c | |
github | hashicorp | consul | markdown-it | ^8.3.1 / 8.4.2 |
["lockfile","lockfile-yarn-pinning-^8.3.1"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-6vfc-qv3f-vr6c | |
github | hashicorp | consul | markdown-it | ^8.3.1 / 8.4.2 |
["lockfile","lockfile-yarn-pinning-^8.3.1"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-6vfc-qv3f-vr6c | |
github | hashicorp | consul | markdown-it | ^8.3.1 / 8.4.2 |
["lockfile","lockfile-yarn-pinning-^8.3.1"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-6vfc-qv3f-vr6c | |
github | hashicorp | consul | markdown-it | ^8.3.1 / 8.4.2 |
["lockfile","lockfile-yarn-pinning-^8.3.1"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-6vfc-qv3f-vr6c | |
github | hashicorp | consul | markdown-it | ^8.3.1 / 8.4.2 |
["lockfile","lockfile-yarn-pinning-^8.3.1"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-6vfc-qv3f-vr6c | |
github | hashicorp | consul | markdown-it | ^8.3.1 / 8.4.2 |
["lockfile","lockfile-yarn-pinning-^8.3.1"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-6vfc-qv3f-vr6c | |
github | hashicorp | consul | node-fetch | 2.6.1 / 2.6.1 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-r683-j2x4-v87g | |
github | hashicorp | consul | semver | 2 || 3 || 4 || 5 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-2 || 3 || 4 || 5"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | 2 || 3 || 4 || 5 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-2 || 3 || 4 || 5"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | 2 || 3 || 4 || 5 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-2 || 3 || 4 || 5"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | 2 || 3 || 4 || 5 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-2 || 3 || 4 || 5"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | 2 || 3 || 4 || 5 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-2 || 3 || 4 || 5"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | 2 || 3 || 4 || 5 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-2 || 3 || 4 || 5"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | 2 || 3 || 4 || 5 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-2 || 3 || 4 || 5"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | 2 || 3 || 4 || 5 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-2 || 3 || 4 || 5"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | 7.3.5 / 7.3.5 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.3.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.3.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.3.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.3.0"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.3.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.3.0"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.3.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.3.0"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.3.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.3.0"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.3.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.3.0"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.3.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.3.0"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.3.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.3.0"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.4.1 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.4.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.4.1 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.4.1"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.4.1 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.4.1"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.4.1 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.4.1"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.4.1 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.4.1"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.4.1 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.4.1"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.4.1 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.4.1"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.4.1 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.4.1"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.5.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.5.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.5.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.5.0"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.5.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.5.0"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.5.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.5.0"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.5.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.5.0"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.5.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.5.0"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.5.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.5.0"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.5.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.5.0"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.6.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.6.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.6.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.6.0"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.6.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.6.0"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.6.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.6.0"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.6.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.6.0"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.6.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.6.0"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.6.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.6.0"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^5.6.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.6.0"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.0.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.0.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.0.0"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.0.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.0.0"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.0.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.0.0"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.0.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.0.0"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.0.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.0.0"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.0.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.0.0"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.0.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.0.0"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.0"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.0"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.0"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.0"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.0"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.0"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.0"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.1 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.1 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.1"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.1 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.1"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.1 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.1"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.1 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.1"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.1 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.1"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.1 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.1"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.1 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.1"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.2 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.2 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.2"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.2 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.2"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.2 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.2"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.2 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.2"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.2 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.2"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.2 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.2"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.1.2 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.2"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.3.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.3.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.3.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.3.0"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.3.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.3.0"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.3.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.3.0"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.3.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.3.0"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.3.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.3.0"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.3.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.3.0"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^6.3.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.3.0"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.1.3 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.1.3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.1.3 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.1.3"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.1.3 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.1.3"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.1.3 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.1.3"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.1.3 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.1.3"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.1.3 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.1.3"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.1.3 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.1.3"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.1.3 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.1.3"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.2.1 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.2.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.2.1 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.2.1"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.2.1 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.2.1"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.2.1 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.2.1"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.2.1 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.2.1"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.2.1 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.2.1"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.2.1 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.2.1"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.2.1 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.2.1"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.2 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.2 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.2"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.2 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.2"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.2 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.2"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.2 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.2"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.2 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.2"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.2 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.2"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.2 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.2"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.4 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.4"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.4 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.4"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.4 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.4"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.4 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.4"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.4 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.4"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.4 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.4"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.4 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.4"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.4 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.4"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.5 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.5"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.5 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.5"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.5 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.5"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.5 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.5"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.5 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.5"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.5 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.5"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.5 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.5"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.5 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.5"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.8 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.8"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.8 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.8"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.8 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.8"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.8 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.8"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.8 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.8"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.8 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.8"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.8 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.8"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver | ^7.3.8 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.8"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | consul | semver-regex | 3.1.2 / 3.1.2 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-44c6-4v22-4mhx | |
github | hashicorp | consul | semver-regex | 3.1.2 / 3.1.2 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-4x5v-gmq8-25ch | |
github | hashicorp | consul | socket.io-parser | ~4.2.1 / 4.2.2 |
["lockfile","lockfile-yarn-pinning-~4.2.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-cqmj-92xf-r6r9 | |
github | hashicorp | consul | socket.io-parser | ~4.2.1 / 4.2.2 |
["lockfile","lockfile-yarn-pinning-~4.2.1"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-cqmj-92xf-r6r9 | |
github | hashicorp | consul | socket.io-parser | ~4.2.1 / 4.2.2 |
["lockfile","lockfile-yarn-pinning-~4.2.1"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-cqmj-92xf-r6r9 | |
github | hashicorp | consul | socket.io-parser | ~4.2.1 / 4.2.2 |
["lockfile","lockfile-yarn-pinning-~4.2.1"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-cqmj-92xf-r6r9 | |
github | hashicorp | consul | socket.io-parser | ~4.2.1 / 4.2.2 |
["lockfile","lockfile-yarn-pinning-~4.2.1"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-cqmj-92xf-r6r9 | |
github | hashicorp | consul | socket.io-parser | ~4.2.1 / 4.2.2 |
["lockfile","lockfile-yarn-pinning-~4.2.1"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-cqmj-92xf-r6r9 | |
github | hashicorp | consul | socket.io-parser | ~4.2.1 / 4.2.2 |
["lockfile","lockfile-yarn-pinning-~4.2.1"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-cqmj-92xf-r6r9 | |
github | hashicorp | consul | socket.io-parser | ~4.2.1 / 4.2.2 |
["lockfile","lockfile-yarn-pinning-~4.2.1"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-cqmj-92xf-r6r9 | |
github | hashicorp | consul | tough-cookie | 4.0.0 / 4.0.0 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 | |
github | hashicorp | consul | tough-cookie | ^4.0.0 / 4.1.2 |
["lockfile","lockfile-yarn-pinning-^4.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 | |
github | hashicorp | consul | tough-cookie | ^4.0.0 / 4.1.2 |
["lockfile","lockfile-yarn-pinning-^4.0.0"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 | |
github | hashicorp | consul | tough-cookie | ^4.0.0 / 4.1.2 |
["lockfile","lockfile-yarn-pinning-^4.0.0"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 | |
github | hashicorp | consul | tough-cookie | ^4.0.0 / 4.1.2 |
["lockfile","lockfile-yarn-pinning-^4.0.0"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 | |
github | hashicorp | consul | tough-cookie | ^4.0.0 / 4.1.2 |
["lockfile","lockfile-yarn-pinning-^4.0.0"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 | |
github | hashicorp | consul | tough-cookie | ^4.0.0 / 4.1.2 |
["lockfile","lockfile-yarn-pinning-^4.0.0"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 | |
github | hashicorp | consul | tough-cookie | ^4.0.0 / 4.1.2 |
["lockfile","lockfile-yarn-pinning-^4.0.0"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 | |
github | hashicorp | consul | tough-cookie | ^4.0.0 / 4.1.2 |
["lockfile","lockfile-yarn-pinning-^4.0.0"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 | |
github | hashicorp | consul | trim | 0.0.1 / 0.0.1 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-w5p7-h5w8-2hfq | |
github | hashicorp | consul | underscore | ~1.6.0 / 1.6.0 |
["lockfile","lockfile-yarn-pinning-~1.6.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-cf4h-3jhx-xvhq | |
github | hashicorp | consul | underscore | ~1.6.0 / 1.6.0 |
["lockfile","lockfile-yarn-pinning-~1.6.0"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-cf4h-3jhx-xvhq | |
github | hashicorp | consul | underscore | ~1.6.0 / 1.6.0 |
["lockfile","lockfile-yarn-pinning-~1.6.0"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-cf4h-3jhx-xvhq | |
github | hashicorp | consul | underscore | ~1.6.0 / 1.6.0 |
["lockfile","lockfile-yarn-pinning-~1.6.0"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-cf4h-3jhx-xvhq | |
github | hashicorp | consul | underscore | ~1.6.0 / 1.6.0 |
["lockfile","lockfile-yarn-pinning-~1.6.0"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-cf4h-3jhx-xvhq | |
github | hashicorp | consul | underscore | ~1.6.0 / 1.6.0 |
["lockfile","lockfile-yarn-pinning-~1.6.0"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-cf4h-3jhx-xvhq | |
github | hashicorp | consul | underscore | ~1.6.0 / 1.6.0 |
["lockfile","lockfile-yarn-pinning-~1.6.0"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-cf4h-3jhx-xvhq | |
github | hashicorp | consul | underscore | ~1.6.0 / 1.6.0 |
["lockfile","lockfile-yarn-pinning-~1.6.0"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-cf4h-3jhx-xvhq | |
github | hashicorp | consul | url-regex | 5.0.0 / 5.0.0 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-v4rh-8p82-6h5w | |
github | hashicorp | consul | word-wrap | 1.2.3 / 1.2.3 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | |
github | hashicorp | consul | word-wrap | ^1.2.3 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-^1.2.3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | |
github | hashicorp | consul | word-wrap | ^1.2.3 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-^1.2.3"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | |
github | hashicorp | consul | word-wrap | ^1.2.3 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-^1.2.3"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | |
github | hashicorp | consul | word-wrap | ^1.2.3 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-^1.2.3"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | |
github | hashicorp | consul | word-wrap | ^1.2.3 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-^1.2.3"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | |
github | hashicorp | consul | word-wrap | ^1.2.3 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-^1.2.3"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | |
github | hashicorp | consul | word-wrap | ^1.2.3 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-^1.2.3"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | |
github | hashicorp | consul | word-wrap | ^1.2.3 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-^1.2.3"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | |
github | hashicorp | consul | word-wrap | ~1.2.3 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-~1.2.3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | |
github | hashicorp | consul | word-wrap | ~1.2.3 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-~1.2.3"] | ui/packages/consul-acls/package.json | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | |
github | hashicorp | consul | word-wrap | ~1.2.3 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-~1.2.3"] | ui/packages/consul-hcp/package.json | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | |
github | hashicorp | consul | word-wrap | ~1.2.3 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-~1.2.3"] | ui/packages/consul-lock-sessions/package.json | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | |
github | hashicorp | consul | word-wrap | ~1.2.3 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-~1.2.3"] | ui/packages/consul-nspaces/package.json | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | |
github | hashicorp | consul | word-wrap | ~1.2.3 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-~1.2.3"] | ui/packages/consul-partitions/package.json | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | |
github | hashicorp | consul | word-wrap | ~1.2.3 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-~1.2.3"] | ui/packages/consul-peerings/package.json | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | |
github | hashicorp | consul | word-wrap | ~1.2.3 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-~1.2.3"] | ui/packages/consul-ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | |
github | hashicorp | nomad | @xmldom/xmldom | ^0.7.1 / 0.7.5 |
["lockfile","lockfile-yarn-pinning-^0.7.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-crh6-fp67-6883 | |
github | hashicorp | nomad | ansi-html | 0.0.7 / 0.0.7 |
["lockfile","lockfile-yarn-pinning-0.0.7"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-whgm-jr23-g3j9 | |
github | hashicorp | nomad | ansi-html | ^0.0.7 / 0.0.7 |
["lockfile","lockfile-yarn-pinning-^0.0.7"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-whgm-jr23-g3j9 | |
github | hashicorp | nomad | ansi-regex | ^3.0.0 / 3.0.0 |
["lockfile","lockfile-yarn-pinning-^3.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-93q8-gq69-wqmw | |
github | hashicorp | nomad | ansi-regex | ^4.1.0 / 4.1.0 |
["lockfile","lockfile-yarn-pinning-^4.1.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-93q8-gq69-wqmw | |
github | hashicorp | nomad | async | ^2.4.1 / 2.6.3 |
["lockfile","lockfile-yarn-pinning-^2.4.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-fwr7-v2mv-hh25 | |
github | hashicorp | nomad | async | ^2.6.2 / 2.6.3 |
["lockfile","lockfile-yarn-pinning-^2.6.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-fwr7-v2mv-hh25 | |
github | hashicorp | nomad | browserslist | 4.14.2 / 4.14.2 |
["lockfile","lockfile-yarn-pinning-4.14.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-w8qv-6jwh-64r5 | |
github | hashicorp | nomad | clean-css | ^3.4.5 / 3.4.28 |
["lockfile","lockfile-yarn-pinning-^3.4.5"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-wxhq-pm8v-cw75 | |
github | hashicorp | nomad | cryptiles | 0.2.x / 0.2.2 |
["lockfile","lockfile-yarn-pinning-0.2.x"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-rq8g-5pc5-wrhr | |
github | hashicorp | nomad | d3-color | 1 - 3 / 3.0.1 |
["lockfile","lockfile-yarn-pinning-1 - 3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-36jr-mh4h-2g58 | |
github | hashicorp | nomad | d3-color | 3 / 3.0.1 | ["lockfile","lockfile-yarn-pinning-3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-36jr-mh4h-2g58 | |
github | hashicorp | nomad | decode-uri-component | ^0.2.0 / 0.2.0 |
["lockfile","lockfile-yarn-pinning-^0.2.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-w573-4hg7-7wgq | |
github | hashicorp | nomad | engine.io | ~6.0.0 / 6.0.0 |
["lockfile","lockfile-yarn-pinning-~6.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-273r-mgr4-v34f | |
github | hashicorp | nomad | engine.io | ~6.0.0 / 6.0.0 |
["lockfile","lockfile-yarn-pinning-~6.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | hashicorp | nomad | engine.io | ~6.0.0 / 6.0.0 |
["lockfile","lockfile-yarn-pinning-~6.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-r7qp-cfhv-p84w | |
github | hashicorp | nomad | github.com/aws/aws-sdk-go | v1.44.184 / v1.44.184 |
["require"] | go.mod | SECURITY | Package is vulnerable to CVE GO-2022-0646 | |
github | hashicorp | nomad | github.com/cyphar/filepath-securejoin | v0.2.3 / v0.2.3 |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE GHSA-6xv5-86q9-7xr8 | |
github | hashicorp | nomad | github.com/cyphar/filepath-securejoin | v0.2.3 / v0.2.3 |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE GO-2023-2048 | |
github | hashicorp | nomad | glob-parent | ^2.0.0 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 | |
github | hashicorp | nomad | glob-parent | ^3.1.0 / 3.1.0 |
["lockfile","lockfile-yarn-pinning-^3.1.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 | |
github | hashicorp | nomad | glob-parent | ^5.1.0 / 5.1.1 |
["lockfile","lockfile-yarn-pinning-^5.1.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 | |
github | hashicorp | nomad | hawk | 1.1.1 / 1.1.1 |
["lockfile","lockfile-yarn-pinning-1.1.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-44pw-h2cw-w3vq | |
github | hashicorp | nomad | hawk | 1.1.1 / 1.1.1 |
["lockfile","lockfile-yarn-pinning-1.1.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-jcpv-g9rr-qxrc | |
github | hashicorp | nomad | hoek | 0.9.x / 0.9.1 |
["lockfile","lockfile-yarn-pinning-0.9.x"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-jp4x-w63m-7wgm | |
github | hashicorp | nomad | immer | 8.0.1 / 8.0.1 |
["lockfile","lockfile-yarn-pinning-8.0.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-33f9-j839-rf8h | |
github | hashicorp | nomad | immer | 8.0.1 / 8.0.1 |
["lockfile","lockfile-yarn-pinning-8.0.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c36v-fmgq-m8hx | |
github | hashicorp | nomad | jsdom | ^16.4.0 / 16.4.0 |
["lockfile","lockfile-yarn-pinning-^16.4.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-f4c9-cqv8-9v98 | |
github | hashicorp | nomad | json-schema | 0.2.3 / 0.2.3 |
["lockfile","lockfile-yarn-pinning-0.2.3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-896r-f27r-55mw | |
github | hashicorp | nomad | json5 | ^0.5.1 / 0.5.1 |
["lockfile","lockfile-yarn-pinning-^0.5.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | hashicorp | nomad | json5 | ^1.0.1 / 1.0.1 |
["lockfile","lockfile-yarn-pinning-^1.0.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | hashicorp | nomad | json5 | ^2.1.2 / 2.2.0 |
["lockfile","lockfile-yarn-pinning-^2.1.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | hashicorp | nomad | json5 | ^2.1.3 / 2.2.0 |
["lockfile","lockfile-yarn-pinning-^2.1.3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | hashicorp | nomad | loader-utils | 2.0.0 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-2.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-3rfm-jhwj-7488 | |
github | hashicorp | nomad | loader-utils | 2.0.0 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-2.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-76p3-8jx3-jpfq | |
github | hashicorp | nomad | loader-utils | 2.0.0 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-2.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-hhq3-ff78-jv3g | |
github | hashicorp | nomad | loader-utils | ^1.2.3 / 1.4.0 |
["lockfile","lockfile-yarn-pinning-^1.2.3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-3rfm-jhwj-7488 | |
github | hashicorp | nomad | loader-utils | ^1.2.3 / 1.4.0 |
["lockfile","lockfile-yarn-pinning-^1.2.3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-76p3-8jx3-jpfq | |
github | hashicorp | nomad | loader-utils | ^1.2.3 / 1.4.0 |
["lockfile","lockfile-yarn-pinning-^1.2.3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-hhq3-ff78-jv3g | |
github | hashicorp | nomad | loader-utils | ^1.4.0 / 1.4.0 |
["lockfile","lockfile-yarn-pinning-^1.4.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-3rfm-jhwj-7488 | |
github | hashicorp | nomad | loader-utils | ^1.4.0 / 1.4.0 |
["lockfile","lockfile-yarn-pinning-^1.4.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-76p3-8jx3-jpfq | |
github | hashicorp | nomad | loader-utils | ^1.4.0 / 1.4.0 |
["lockfile","lockfile-yarn-pinning-^1.4.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-hhq3-ff78-jv3g | |
github | hashicorp | nomad | loader-utils | ^2.0.0 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-3rfm-jhwj-7488 | |
github | hashicorp | nomad | loader-utils | ^2.0.0 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-76p3-8jx3-jpfq | |
github | hashicorp | nomad | loader-utils | ^2.0.0 / 2.0.0 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-hhq3-ff78-jv3g | |
github | hashicorp | nomad | markdown-it | ^4.3.0 / 4.4.0 |
["lockfile","lockfile-yarn-pinning-^4.3.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-6vfc-qv3f-vr6c | |
github | hashicorp | nomad | markdown-it | ^8.3.1 / 8.4.2 |
["lockfile","lockfile-yarn-pinning-^8.3.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-6vfc-qv3f-vr6c | |
github | hashicorp | nomad | mime | ~1.2.11 / 1.2.11 |
["lockfile","lockfile-yarn-pinning-~1.2.11"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-wrvr-8mpx-r7pp | |
github | hashicorp | nomad | minimatch | 3.0.4 / 3.0.4 |
["lockfile","lockfile-yarn-pinning-3.0.4"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-f8q6-p94x-37v3 | |
github | hashicorp | nomad | minimatch | ^3.0.4 / 3.0.4 |
["lockfile","lockfile-yarn-pinning-^3.0.4"] | scripts/screenshots/src/package.json | SECURITY | Package is vulnerable to CVE GHSA-f8q6-p94x-37v3 | |
github | hashicorp | nomad | minimist | ^0.2.1 / 0.2.1 |
["lockfile","lockfile-yarn-pinning-^0.2.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-xvch-5gv4-984h | |
github | hashicorp | nomad | minimist | ^1.1.1 / 1.2.5 |
["lockfile","lockfile-yarn-pinning-^1.1.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-xvch-5gv4-984h | |
github | hashicorp | nomad | minimist | ^1.2.0 / 1.2.5 |
["lockfile","lockfile-yarn-pinning-^1.2.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-xvch-5gv4-984h | |
github | hashicorp | nomad | minimist | ^1.2.5 / 1.2.5 |
["lockfile","lockfile-yarn-pinning-^1.2.5"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-xvch-5gv4-984h | |
github | hashicorp | nomad | moment | >= 2.9.0 / 2.29.1 |
["lockfile","lockfile-yarn-pinning-\u003e= 2.9.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-8hfj-j24r-96c4 | |
github | hashicorp | nomad | moment | >= 2.9.0 / 2.29.1 |
["lockfile","lockfile-yarn-pinning-\u003e= 2.9.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-wc69-rhjr-hc9g | |
github | hashicorp | nomad | moment | ^2.19.3 / 2.29.1 |
["lockfile","lockfile-yarn-pinning-^2.19.3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-8hfj-j24r-96c4 | |
github | hashicorp | nomad | moment | ^2.19.3 / 2.29.1 |
["lockfile","lockfile-yarn-pinning-^2.19.3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-wc69-rhjr-hc9g | |
github | hashicorp | nomad | moment | ^2.29.1 / 2.29.1 |
["lockfile","lockfile-yarn-pinning-^2.29.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-8hfj-j24r-96c4 | |
github | hashicorp | nomad | moment | ^2.29.1 / 2.29.1 |
["lockfile","lockfile-yarn-pinning-^2.29.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-wc69-rhjr-hc9g | |
github | hashicorp | nomad | moment-timezone | ^0.5.13 / 0.5.32 |
["lockfile","lockfile-yarn-pinning-^0.5.13"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-56x4-j7p9-fcf9 | |
github | hashicorp | nomad | moment-timezone | ^0.5.13 / 0.5.32 |
["lockfile","lockfile-yarn-pinning-^0.5.13"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-v78c-4p63-2j6c | |
github | hashicorp | nomad | moment-timezone | ^0.5.33 / 0.5.34 |
["lockfile","lockfile-yarn-pinning-^0.5.33"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-56x4-j7p9-fcf9 | |
github | hashicorp | nomad | moment-timezone | ^0.5.33 / 0.5.34 |
["lockfile","lockfile-yarn-pinning-^0.5.33"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-v78c-4p63-2j6c | |
github | hashicorp | nomad | mout | ^1.0.0 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-^1.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-vvv8-xw5f-3f88 | |
github | hashicorp | nomad | nth-check | ^1.0.2 / 1.0.2 |
["lockfile","lockfile-yarn-pinning-^1.0.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-rp65-9cf3-cjxr | |
github | hashicorp | nomad | prismjs | ^1.21.0 / 1.25.0 |
["lockfile","lockfile-yarn-pinning-^1.21.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-3949-f494-cm99 | |
github | hashicorp | nomad | prismjs | ~1.24.0 / 1.24.1 |
["lockfile","lockfile-yarn-pinning-~1.24.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-3949-f494-cm99 | |
github | hashicorp | nomad | prismjs | ~1.24.0 / 1.24.1 |
["lockfile","lockfile-yarn-pinning-~1.24.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-hqhp-5p83-hx96 | |
github | hashicorp | nomad | qs | 6.7.0 / 6.7.0 |
["lockfile","lockfile-yarn-pinning-6.7.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | hashicorp | nomad | qs | ^6.10.0 / 6.10.1 |
["lockfile","lockfile-yarn-pinning-^6.10.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | hashicorp | nomad | qs | ^6.4.0 / 6.9.6 |
["lockfile","lockfile-yarn-pinning-^6.4.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | hashicorp | nomad | qs | ~1.0.0 / 1.0.2 |
["lockfile","lockfile-yarn-pinning-~1.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-gqgv-6jq5-jjj9 | |
github | hashicorp | nomad | qs | ~1.0.0 / 1.0.2 |
["lockfile","lockfile-yarn-pinning-~1.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | hashicorp | nomad | qs | ~6.5.2 / 6.5.2 |
["lockfile","lockfile-yarn-pinning-~6.5.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | hashicorp | nomad | request | ^2.88.2 / 2.88.2 |
["lockfile","lockfile-yarn-pinning-^2.88.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-p8p7-x288-28g6 | |
github | hashicorp | nomad | request | ~2.40.0 / 2.40.0 |
["lockfile","lockfile-yarn-pinning-~2.40.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-7xfp-9c55-5vqj | |
github | hashicorp | nomad | request | ~2.40.0 / 2.40.0 |
["lockfile","lockfile-yarn-pinning-~2.40.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-p8p7-x288-28g6 | |
github | hashicorp | nomad | semver | 2 || 3 || 4 || 5 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-2 || 3 || 4 || 5"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | nomad | semver | 7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-7.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | nomad | semver | ^5.3.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.3.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | nomad | semver | ^5.4.1 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.4.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | nomad | semver | ^5.5.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.5.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | nomad | semver | ^5.5.1 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.5.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | nomad | semver | ^5.6.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.6.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | nomad | semver | ^6.0.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | nomad | semver | ^6.1.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | nomad | semver | ^6.1.1 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | nomad | semver | ^6.1.2 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | nomad | semver | ^6.3.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.3.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | nomad | semver | ^7.1.3 / 7.3.5 |
["lockfile","lockfile-yarn-pinning-^7.1.3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | nomad | semver | ^7.2.1 / 7.3.4 |
["lockfile","lockfile-yarn-pinning-^7.2.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | nomad | semver | ^7.3.2 / 7.3.4 |
["lockfile","lockfile-yarn-pinning-^7.3.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | nomad | semver | ^7.3.4 / 7.3.5 |
["lockfile","lockfile-yarn-pinning-^7.3.4"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | nomad | semver | ^7.3.5 / 7.3.5 |
["lockfile","lockfile-yarn-pinning-^7.3.5"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | nomad | semver | ^7.3.8 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.8"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | nomad | shell-quote | 1.7.2 / 1.7.2 |
["lockfile","lockfile-yarn-pinning-1.7.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-g4rg-993r-mgx7 | |
github | hashicorp | nomad | shell-quote | ^1.6.1 / 1.7.2 |
["lockfile","lockfile-yarn-pinning-^1.6.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-g4rg-993r-mgx7 | |
github | hashicorp | nomad | socket.io-parser | ~4.0.4 / 4.0.4 |
["lockfile","lockfile-yarn-pinning-~4.0.4"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-cqmj-92xf-r6r9 | |
github | hashicorp | nomad | socket.io-parser | ~4.0.4 / 4.0.4 |
["lockfile","lockfile-yarn-pinning-~4.0.4"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-qm95-pgcg-qqfq | |
github | hashicorp | nomad | terser | ^4.1.2 / 4.8.0 |
["lockfile","lockfile-yarn-pinning-^4.1.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-4wf5-vphf-c2xc | |
github | hashicorp | nomad | terser | ^4.6.3 / 4.8.0 |
["lockfile","lockfile-yarn-pinning-^4.6.3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-4wf5-vphf-c2xc | |
github | hashicorp | nomad | terser | ^5.3.0 / 5.6.1 |
["lockfile","lockfile-yarn-pinning-^5.3.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-4wf5-vphf-c2xc | |
github | hashicorp | nomad | terser | ^5.3.4 / 5.9.0 |
["lockfile","lockfile-yarn-pinning-^5.3.4"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-4wf5-vphf-c2xc | |
github | hashicorp | nomad | tough-cookie | >=0.12.0 / 4.0.0 |
["lockfile","lockfile-yarn-pinning-\u003e=0.12.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 | |
github | hashicorp | nomad | tough-cookie | ^2.3.3 / 2.5.0 |
["lockfile","lockfile-yarn-pinning-^2.3.3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 | |
github | hashicorp | nomad | tough-cookie | ^3.0.1 / 3.0.1 |
["lockfile","lockfile-yarn-pinning-^3.0.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 | |
github | hashicorp | nomad | tough-cookie | ~2.5.0 / 2.5.0 |
["lockfile","lockfile-yarn-pinning-~2.5.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 | |
github | hashicorp | nomad | trim | 0.0.1 / 0.0.1 |
["lockfile","lockfile-yarn-pinning-0.0.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-w5p7-h5w8-2hfq | |
github | hashicorp | nomad | tunnel-agent | ~0.4.0 / 0.4.3 |
["lockfile","lockfile-yarn-pinning-~0.4.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-xc7v-wxcw-j472 | |
github | hashicorp | nomad | underscore | ~1.6.0 / 1.6.0 |
["lockfile","lockfile-yarn-pinning-~1.6.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-cf4h-3jhx-xvhq | |
github | hashicorp | nomad | yaml | ^2.0.0 / 2.0.1 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-f9xv-q969-pqx4 | |
github | hashicorp | packer | decode-uri-component | 0.2.0 / 0.2.0 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-w573-4hg7-7wgq | |
github | hashicorp | packer | ejs | 3.1.5 / 3.1.5 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-phwq-j96m-2c2q | |
github | hashicorp | packer | github.com/aws/aws-sdk-go | v1.44.114 / v1.44.114 |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE GO-2022-0646 | |
github | hashicorp | packer | semver | 7.3.7 / 7.3.7 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | packer | trim | 0.0.1 / 0.0.1 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-w5p7-h5w8-2hfq | |
github | hashicorp | packer | url-regex | 5.0.0 / 5.0.0 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-v4rh-8p82-6h5w | |
github | hashicorp | terraform | ejs | 3.1.5 / 3.1.5 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-phwq-j96m-2c2q | |
github | hashicorp | terraform | github.com/aws/aws-sdk-go | v1.44.122 / v1.44.122 |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE GO-2022-0646 | |
github | hashicorp | terraform | github.com/satori/go.uuid | v1.2.0 / v1.2.0 |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE GO-2020-0018 | |
github | hashicorp | terraform | semver | 5.7.1 / 5.7.1 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | terraform | tough-cookie | 4.1.2 / 4.1.2 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 | |
github | hashicorp | terraform | trim | 0.0.1 / 0.0.1 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-w5p7-h5w8-2hfq | |
github | hashicorp | terraform | url-regex | 5.0.0 / 5.0.0 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-v4rh-8p82-6h5w | |
github | hashicorp | terraform | word-wrap | 1.2.3 / 1.2.3 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | |
github | hashicorp | vagrant | ejs | 3.1.5 / 3.1.5 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-phwq-j96m-2c2q | |
github | hashicorp | vagrant | github.com/aws/aws-sdk-go | v1.44.279 / v1.44.279 |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE GO-2022-0646 | |
github | hashicorp | vagrant | golang.org/x/net | v0.10.0 / v0.10.0 |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE GO-2023-1988 | |
github | hashicorp | vagrant | semver | 7.3.5 / 7.3.5 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | vagrant | trim | 0.0.1 / 0.0.1 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-w5p7-h5w8-2hfq | |
github | hashicorp | vagrant | url-regex | 5.0.0 / 5.0.0 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-v4rh-8p82-6h5w | |
github | hashicorp | vault | @xmldom/xmldom | ^0.8.0 / 0.8.2 |
["lockfile","lockfile-yarn-pinning-^0.8.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-crh6-fp67-6883 | |
github | hashicorp | vault | ansi-html | ^0.0.7 / 0.0.7 |
["lockfile","lockfile-yarn-pinning-^0.0.7"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-whgm-jr23-g3j9 | |
github | hashicorp | vault | ansi-regex | ^3.0.0 / 3.0.0 |
["lockfile","lockfile-yarn-pinning-^3.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-93q8-gq69-wqmw | |
github | hashicorp | vault | ansi-regex | ^4.1.0 / 4.1.0 |
["lockfile","lockfile-yarn-pinning-^4.1.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-93q8-gq69-wqmw | |
github | hashicorp | vault | ansi-regex | ^5.0.0 / 5.0.0 |
["lockfile","lockfile-yarn-pinning-^5.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-93q8-gq69-wqmw | |
github | hashicorp | vault | async | ^2.4.1 / 2.6.3 |
["lockfile","lockfile-yarn-pinning-^2.4.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-fwr7-v2mv-hh25 | |
github | hashicorp | vault | clean-css | ^3.4.5 / 3.4.28 |
["lockfile","lockfile-yarn-pinning-^3.4.5"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-wxhq-pm8v-cw75 | |
github | hashicorp | vault | cross-fetch | 3.1.4 / 3.1.4 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-7gc6-qh9x-w6h8 | |
github | hashicorp | vault | d3-color | 1 / 1.4.1 | ["lockfile","lockfile-yarn-pinning-1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-36jr-mh4h-2g58 | |
github | hashicorp | vault | decode-uri-component | 0.2.0 / 0.2.0 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-w573-4hg7-7wgq | |
github | hashicorp | vault | decode-uri-component | ^0.2.0 / 0.2.0 |
["lockfile","lockfile-yarn-pinning-^0.2.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-w573-4hg7-7wgq | |
github | hashicorp | vault | ejs | 3.1.5 / 3.1.5 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-phwq-j96m-2c2q | |
github | hashicorp | vault | engine.io | ~6.2.0 / 6.2.0 |
["lockfile","lockfile-yarn-pinning-~6.2.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | hashicorp | vault | engine.io | ~6.2.0 / 6.2.0 |
["lockfile","lockfile-yarn-pinning-~6.2.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-r7qp-cfhv-p84w | |
github | hashicorp | vault | flat | ^4.1.0 / 4.1.1 |
["devDependencies"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-2j2x-2gpw-g8fm | |
github | hashicorp | vault | flat | ^4.1.0 / 4.1.1 |
["lockfile","lockfile-yarn-pinning-^4.1.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-2j2x-2gpw-g8fm | |
github | hashicorp | vault | follow-redirects | ^1.0.0 / 1.14.0 |
["lockfile","lockfile-yarn-pinning-^1.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-74fj-2j2h-c42q | |
github | hashicorp | vault | follow-redirects | ^1.0.0 / 1.14.0 |
["lockfile","lockfile-yarn-pinning-^1.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-pw2r-vq6v-hr8c | |
github | hashicorp | vault | github.com/aws/aws-sdk-go | v1.30.27 / v1.30.27 |
["require"] | api/auth/aws/go.mod | SECURITY | Package is vulnerable to CVE GHSA-6jvc-q2x7-pchv | |
github | hashicorp | vault | github.com/aws/aws-sdk-go | v1.30.27 / v1.30.27 |
["require"] | api/auth/aws/go.mod | SECURITY | Package is vulnerable to CVE GHSA-76wf-9vgp-pj7w | |
github | hashicorp | vault | github.com/aws/aws-sdk-go | v1.30.27 / v1.30.27 |
["require"] | api/auth/aws/go.mod | SECURITY | Package is vulnerable to CVE GHSA-7f33-f4f5-xwgw | |
github | hashicorp | vault | github.com/aws/aws-sdk-go | v1.30.27 / v1.30.27 |
["require"] | api/auth/aws/go.mod | SECURITY | Package is vulnerable to CVE GHSA-f5pg-7wfw-84q9 | |
github | hashicorp | vault | github.com/aws/aws-sdk-go | v1.30.27 / v1.30.27 |
["require"] | api/auth/aws/go.mod | SECURITY | Package is vulnerable to CVE GO-2022-0391 | |
github | hashicorp | vault | github.com/aws/aws-sdk-go | v1.30.27 / v1.30.27 |
["require"] | api/auth/aws/go.mod | SECURITY | Package is vulnerable to CVE GO-2022-0646 | |
github | hashicorp | vault | github.com/aws/aws-sdk-go | v1.44.331 / v1.44.331 |
["require"] | go.mod | SECURITY | Package is vulnerable to CVE GO-2022-0646 | |
github | hashicorp | vault | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-1229 | |
github | hashicorp | vault | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-1249 | |
github | hashicorp | vault | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-1314 | |
github | hashicorp | vault | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-1678 | |
github | hashicorp | vault | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-1695 | |
github | hashicorp | vault | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-281 | |
github | hashicorp | vault | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-308 | |
github | hashicorp | vault | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-333 | |
github | hashicorp | vault | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-347 | |
github | hashicorp | vault | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-349 | |
github | hashicorp | vault | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-520 | |
github | hashicorp | vault | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-541 | |
github | hashicorp | vault | github.com/google/flatbuffers | v23.1.21+incompatible / v23.1.21+incompatible |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE OSV-2021-581 | |
github | hashicorp | vault | glob-parent | ^3.1.0 / 3.1.0 |
["lockfile","lockfile-yarn-pinning-^3.1.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-ww39-953v-wcq6 | |
github | hashicorp | vault | golang.org/x/net | v0.7.0 / v0.7.0 |
["require"] | api/go.mod | SECURITY | Package is vulnerable to CVE GO-2023-1988 | |
github | hashicorp | vault | golang.org/x/net | v0.9.0 / v0.9.0 |
["indirect"] | vault/hcp_link/proto/go.mod | SECURITY | Package is vulnerable to CVE GO-2023-1988 | |
github | hashicorp | vault | json-schema | 0.2.3 / 0.2.3 |
["lockfile","lockfile-yarn-pinning-0.2.3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-896r-f27r-55mw | |
github | hashicorp | vault | json5 | 2.2.0 / 2.2.0 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | hashicorp | vault | json5 | ^0.5.1 / 0.5.1 |
["lockfile","lockfile-yarn-pinning-^0.5.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | hashicorp | vault | json5 | ^1.0.1 / 1.0.1 |
["lockfile","lockfile-yarn-pinning-^1.0.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | hashicorp | vault | json5 | ^2.1.2 / 2.2.0 |
["lockfile","lockfile-yarn-pinning-^2.1.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | hashicorp | vault | json5 | ^2.2.1 / 2.2.1 |
["lockfile","lockfile-yarn-pinning-^2.2.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | hashicorp | vault | loader-utils | ^1.2.3 / 1.4.0 |
["lockfile","lockfile-yarn-pinning-^1.2.3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-3rfm-jhwj-7488 | |
github | hashicorp | vault | loader-utils | ^1.2.3 / 1.4.0 |
["lockfile","lockfile-yarn-pinning-^1.2.3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-76p3-8jx3-jpfq | |
github | hashicorp | vault | loader-utils | ^1.2.3 / 1.4.0 |
["lockfile","lockfile-yarn-pinning-^1.2.3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-hhq3-ff78-jv3g | |
github | hashicorp | vault | loader-utils | ^1.4.0 / 1.4.0 |
["lockfile","lockfile-yarn-pinning-^1.4.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-3rfm-jhwj-7488 | |
github | hashicorp | vault | loader-utils | ^1.4.0 / 1.4.0 |
["lockfile","lockfile-yarn-pinning-^1.4.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-76p3-8jx3-jpfq | |
github | hashicorp | vault | loader-utils | ^1.4.0 / 1.4.0 |
["lockfile","lockfile-yarn-pinning-^1.4.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-hhq3-ff78-jv3g | |
github | hashicorp | vault | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-3rfm-jhwj-7488 | |
github | hashicorp | vault | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-76p3-8jx3-jpfq | |
github | hashicorp | vault | loader-utils | ^2.0.0 / 2.0.2 |
["lockfile","lockfile-yarn-pinning-^2.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-hhq3-ff78-jv3g | |
github | hashicorp | vault | minimatch | ^3.0.2 / 3.0.4 |
["lockfile","lockfile-yarn-pinning-^3.0.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-f8q6-p94x-37v3 | |
github | hashicorp | vault | minimatch | ^3.0.2 / 3.0.4 |
["resolutions"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-f8q6-p94x-37v3 | |
github | hashicorp | vault | mout | ^1.0.0 / 1.2.2 |
["lockfile","lockfile-yarn-pinning-^1.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-pc58-wgmc-hfjr | |
github | hashicorp | vault | mout | ^1.0.0 / 1.2.2 |
["lockfile","lockfile-yarn-pinning-^1.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-vvv8-xw5f-3f88 | |
github | hashicorp | vault | node-fetch | ^2.6.1 / 2.6.1 |
["lockfile","lockfile-yarn-pinning-^2.6.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-r683-j2x4-v87g | |
github | hashicorp | vault | nth-check | ^1.0.2 / 1.0.2 |
["lockfile","lockfile-yarn-pinning-^1.0.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-rp65-9cf3-cjxr | |
github | hashicorp | vault | postcss | ^6.0.1 / 6.0.23 |
["lockfile","lockfile-yarn-pinning-^6.0.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-566m-qj78-rww5 | |
github | hashicorp | vault | postcss | ^6.0.17 / 6.0.23 |
["lockfile","lockfile-yarn-pinning-^6.0.17"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-566m-qj78-rww5 | |
github | hashicorp | vault | qs | ^6.3.0 / 6.10.1 |
["lockfile","lockfile-yarn-pinning-^6.3.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | hashicorp | vault | qs | ^6.3.0 / 6.10.1 |
["resolutions"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | hashicorp | vault | request | ^2.88.2 / 2.88.2 |
["lockfile","lockfile-yarn-pinning-^2.88.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-p8p7-x288-28g6 | |
github | hashicorp | vault | semver | 7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-7.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | vault | semver | 7.3.5 / 7.3.5 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | vault | semver | 7.3.5 / 7.3.5 |
["lockfile","lockfile-yarn-pinning-7.3.5"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | vault | semver | ^5.3.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.3.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | vault | semver | ^5.4.1 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.4.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | vault | semver | ^5.5.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.5.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | vault | semver | ^5.6.0 / 5.7.1 |
["lockfile","lockfile-yarn-pinning-^5.6.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | vault | semver | ^6.0.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | vault | semver | ^6.1.1 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | vault | semver | ^6.1.2 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.1.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | vault | semver | ^6.3.0 / 6.3.0 |
["lockfile","lockfile-yarn-pinning-^6.3.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | vault | semver | ^7.0.0 / 7.5.1 |
["lockfile","lockfile-yarn-pinning-^7.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | vault | semver | ^7.3.2 / 7.3.5 |
["lockfile","lockfile-yarn-pinning-^7.3.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | vault | semver | ^7.3.4 / 7.3.5 |
["lockfile","lockfile-yarn-pinning-^7.3.4"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | vault | semver | ^7.3.5 / 7.3.5 |
["lockfile","lockfile-yarn-pinning-^7.3.5"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | vault | semver | ^7.3.7 / 7.3.7 |
["lockfile","lockfile-yarn-pinning-^7.3.7"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | vault | semver | ^7.3.8 / 7.3.8 |
["lockfile","lockfile-yarn-pinning-^7.3.8"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | hashicorp | vault | shell-quote | ^1.6.1 / 1.7.2 |
["devDependencies"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-g4rg-993r-mgx7 | |
github | hashicorp | vault | shell-quote | ^1.6.1 / 1.7.2 |
["lockfile","lockfile-yarn-pinning-^1.6.1"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-g4rg-993r-mgx7 | |
github | hashicorp | vault | socket.io-parser | ~4.2.0 / 4.2.1 |
["lockfile","lockfile-yarn-pinning-~4.2.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-cqmj-92xf-r6r9 | |
github | hashicorp | vault | swagger-ui-dist | ^3.36.2 / 3.48.0 |
["devDependencies"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-6c9x-mj3g-h47x | |
github | hashicorp | vault | swagger-ui-dist | ^3.36.2 / 3.48.0 |
["devDependencies"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-qrmm-w75w-3wpx | |
github | hashicorp | vault | swagger-ui-dist | ^3.36.2 / 3.48.0 |
["lockfile","lockfile-yarn-pinning-^3.36.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-6c9x-mj3g-h47x | |
github | hashicorp | vault | swagger-ui-dist | ^3.36.2 / 3.48.0 |
["lockfile","lockfile-yarn-pinning-^3.36.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-qrmm-w75w-3wpx | |
github | hashicorp | vault | terser | ^4.1.2 / 4.8.0 |
["lockfile","lockfile-yarn-pinning-^4.1.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-4wf5-vphf-c2xc | |
github | hashicorp | vault | terser | ^4.3.9 / 4.8.0 |
["lockfile","lockfile-yarn-pinning-^4.3.9"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-4wf5-vphf-c2xc | |
github | hashicorp | vault | terser | ^5.3.0 / 5.7.0 |
["lockfile","lockfile-yarn-pinning-^5.3.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-4wf5-vphf-c2xc | |
github | hashicorp | vault | terser | ^5.7.2 / 5.14.0 |
["lockfile","lockfile-yarn-pinning-^5.7.2"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-4wf5-vphf-c2xc | |
github | hashicorp | vault | tough-cookie | 4.0.0 / 4.0.0 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 | |
github | hashicorp | vault | tough-cookie | ^2.3.3 / 2.5.0 |
["lockfile","lockfile-yarn-pinning-^2.3.3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 | |
github | hashicorp | vault | tough-cookie | ^4.0.0 / 4.0.0 |
["lockfile","lockfile-yarn-pinning-^4.0.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 | |
github | hashicorp | vault | tough-cookie | ~2.5.0 / 2.5.0 |
["lockfile","lockfile-yarn-pinning-~2.5.0"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-72xf-g2v4-qvf3 | |
github | hashicorp | vault | trim | 0.0.1 / 0.0.1 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-w5p7-h5w8-2hfq | |
github | hashicorp | vault | url-regex | 5.0.0 / 5.0.0 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-v4rh-8p82-6h5w | |
github | hashicorp | vault | word-wrap | 1.2.3 / 1.2.3 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | |
github | hashicorp | vault | word-wrap | ^1.2.3 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-^1.2.3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | |
github | hashicorp | vault | word-wrap | ~1.2.3 / 1.2.3 |
["lockfile","lockfile-yarn-pinning-~1.2.3"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | |
github | hashicorp | vault | ws | ^7.4.4 / 7.4.5 |
["lockfile","lockfile-yarn-pinning-^7.4.4"] | ui/package.json | SECURITY | Package is vulnerable to CVE GHSA-6fc8-4gx4-v693 | |
github | jamietanna | oapi-codegen-private | github.com/gin-gonic/gin | v1.8.1 / v1.8.1 |
["require"] | go.mod | Jamie Tanna | SECURITY | Package is vulnerable to CVE GHSA-2c4m-59x9-fr2g |
github | jamietanna | oapi-codegen-private | github.com/gin-gonic/gin | v1.8.1 / v1.8.1 |
["require"] | go.mod | Jamie Tanna | SECURITY | Package is vulnerable to CVE GHSA-3vp4-m3rf-835h |
github | jamietanna | oapi-codegen-private | github.com/gin-gonic/gin | v1.8.1 / v1.8.1 |
["require"] | go.mod | Jamie Tanna | SECURITY | Package is vulnerable to CVE GO-2023-1737 |
github | jamietanna | oapi-codegen-private | github.com/lestrrat-go/jwx | v1.2.25 / v1.2.25 |
["require"] | go.mod | Jamie Tanna | SECURITY | Package is vulnerable to CVE GHSA-rm8v-mxj3-5rmq |
github | jamietanna | oapi-codegen-private | github.com/lestrrat-go/jwx | v1.2.25 / v1.2.25 |
["require"] | go.mod | Jamie Tanna | SECURITY | Package is vulnerable to CVE GO-2023-1859 |
github | jamietanna | oapi-codegen-private | golang.org/x/net | v0.2.0 / v0.2.0 |
["indirect"] | go.mod | Jamie Tanna | SECURITY | Package is vulnerable to CVE GHSA-vvpx-j8f3-3w6h |
github | jamietanna | oapi-codegen-private | golang.org/x/net | v0.2.0 / v0.2.0 |
["indirect"] | go.mod | Jamie Tanna | SECURITY | Package is vulnerable to CVE GO-2022-1144 |
github | jamietanna | oapi-codegen-private | golang.org/x/net | v0.2.0 / v0.2.0 |
["indirect"] | go.mod | Jamie Tanna | SECURITY | Package is vulnerable to CVE GO-2023-1571 |
github | jamietanna | oapi-codegen-private | golang.org/x/net | v0.2.0 / v0.2.0 |
["indirect"] | go.mod | Jamie Tanna | SECURITY | Package is vulnerable to CVE GO-2023-1988 |
github | jamietanna | renovate-501-maven | junit:junit | 4.11 / 4.11 |
["test"] | pom.xml | Jamie Tanna | SECURITY | Package is vulnerable to CVE GHSA-269g-pwp5-87pp |
github | jenkinsci | job-dsl-plugin | com.google.guava:guava | 11.0.1 / 11.0.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 | |
github | jenkinsci | job-dsl-plugin | com.google.guava:guava | 11.0.1 / 11.0.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 | |
github | jenkinsci | job-dsl-plugin | com.google.guava:guava | 11.0.1 / 11.0.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-mvr2-9pj6-7w5j | |
github | jenkinsci | job-dsl-plugin | com.google.guava:guava | 11.0.1 / 11.0.1 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 | |
github | jenkinsci | job-dsl-plugin | com.google.guava:guava | 11.0.1 / 11.0.1 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 | |
github | jenkinsci | job-dsl-plugin | com.google.guava:guava | 11.0.1 / 11.0.1 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-mvr2-9pj6-7w5j | |
github | jenkinsci | job-dsl-plugin | com.google.guava:guava | 11.0.1 / 11.0.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 | ||
github | jenkinsci | job-dsl-plugin | com.google.guava:guava | 11.0.1 / 11.0.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 | ||
github | jenkinsci | job-dsl-plugin | com.google.guava:guava | 11.0.1 / 11.0.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-mvr2-9pj6-7w5j | ||
github | jenkinsci | job-dsl-plugin | com.google.guava:guava | 16.0.1 / 16.0.1 |
["build","missing-data"] | job-dsl-core/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 | |
github | jenkinsci | job-dsl-plugin | com.google.guava:guava | 16.0.1 / 16.0.1 |
["build","missing-data"] | job-dsl-core/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 | |
github | jenkinsci | job-dsl-plugin | com.google.guava:guava | 16.0.1 / 16.0.1 |
["build","missing-data"] | job-dsl-core/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-mvr2-9pj6-7w5j | |
github | jenkinsci | job-dsl-plugin | com.google.protobuf:protobuf-java | 3.11.1 / 3.11.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-4gg5-vx3j-xwc7 | |
github | jenkinsci | job-dsl-plugin | com.google.protobuf:protobuf-java | 3.11.1 / 3.11.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-77rm-9x9h-xj3g | |
github | jenkinsci | job-dsl-plugin | com.google.protobuf:protobuf-java | 3.11.1 / 3.11.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-g5ww-5jh7-63cx | |
github | jenkinsci | job-dsl-plugin | com.google.protobuf:protobuf-java | 3.11.1 / 3.11.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-h4h5-3hr4-j3g2 | |
github | jenkinsci | job-dsl-plugin | com.google.protobuf:protobuf-java | 3.11.1 / 3.11.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-wrvw-hg22-4m67 | |
github | jenkinsci | job-dsl-plugin | com.google.protobuf:protobuf-java | 3.11.1 / 3.11.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-4gg5-vx3j-xwc7 | ||
github | jenkinsci | job-dsl-plugin | com.google.protobuf:protobuf-java | 3.11.1 / 3.11.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-77rm-9x9h-xj3g | ||
github | jenkinsci | job-dsl-plugin | com.google.protobuf:protobuf-java | 3.11.1 / 3.11.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-g5ww-5jh7-63cx | ||
github | jenkinsci | job-dsl-plugin | com.google.protobuf:protobuf-java | 3.11.1 / 3.11.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-h4h5-3hr4-j3g2 | ||
github | jenkinsci | job-dsl-plugin | com.google.protobuf:protobuf-java | 3.11.1 / 3.11.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-wrvw-hg22-4m67 | ||
github | jenkinsci | job-dsl-plugin | com.thoughtworks.xstream:xstream | 1.4.19 / 1.4.19 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-f8cc-g7j8-xxpm | |
github | jenkinsci | job-dsl-plugin | com.thoughtworks.xstream:xstream | 1.4.19 / 1.4.19 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-j563-grx4-pjpv | |
github | jenkinsci | job-dsl-plugin | com.thoughtworks.xstream:xstream | 1.4.19 / 1.4.19 |
[] | SECURITY | Package is vulnerable to CVE GHSA-f8cc-g7j8-xxpm | ||
github | jenkinsci | job-dsl-plugin | com.thoughtworks.xstream:xstream | 1.4.19 / 1.4.19 |
[] | SECURITY | Package is vulnerable to CVE GHSA-j563-grx4-pjpv | ||
github | jenkinsci | job-dsl-plugin | commons-beanutils:commons-beanutils | 1.9.3 / 1.9.3 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-6phf-73q6-gh87 | |
github | jenkinsci | job-dsl-plugin | commons-beanutils:commons-beanutils | 1.9.3 / 1.9.3 |
[] | SECURITY | Package is vulnerable to CVE GHSA-6phf-73q6-gh87 | ||
github | jenkinsci | job-dsl-plugin | commons-fileupload:commons-fileupload | 1.3.1-jenkins-2 / 1.3.1-jenkins-2 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7x9j-7223-rg5m | |
github | jenkinsci | job-dsl-plugin | commons-fileupload:commons-fileupload | 1.3.1-jenkins-2 / 1.3.1-jenkins-2 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-fvm3-cfvj-gxqq | |
github | jenkinsci | job-dsl-plugin | commons-fileupload:commons-fileupload | 1.3.1-jenkins-2 / 1.3.1-jenkins-2 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-hfrx-6qgj-fp6c | |
github | jenkinsci | job-dsl-plugin | commons-fileupload:commons-fileupload | 1.3.1-jenkins-2 / 1.3.1-jenkins-2 |
[] | SECURITY | Package is vulnerable to CVE GHSA-7x9j-7223-rg5m | ||
github | jenkinsci | job-dsl-plugin | commons-fileupload:commons-fileupload | 1.3.1-jenkins-2 / 1.3.1-jenkins-2 |
[] | SECURITY | Package is vulnerable to CVE GHSA-fvm3-cfvj-gxqq | ||
github | jenkinsci | job-dsl-plugin | commons-fileupload:commons-fileupload | 1.3.1-jenkins-2 / 1.3.1-jenkins-2 |
[] | SECURITY | Package is vulnerable to CVE GHSA-hfrx-6qgj-fp6c | ||
github | jenkinsci | job-dsl-plugin | commons-fileupload:commons-fileupload | 1.4 / 1.4 | ["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-hfrx-6qgj-fp6c | |
github | jenkinsci | job-dsl-plugin | dom4j:dom4j | 1.6.1 / 1.6.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-6pcc-3rfx-4gpm | |
github | jenkinsci | job-dsl-plugin | dom4j:dom4j | 1.6.1 / 1.6.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-hwj3-m3p6-hj38 | |
github | jenkinsci | job-dsl-plugin | dom4j:dom4j | 1.6.1 / 1.6.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-6pcc-3rfx-4gpm | ||
github | jenkinsci | job-dsl-plugin | dom4j:dom4j | 1.6.1 / 1.6.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-hwj3-m3p6-hj38 | ||
github | jenkinsci | job-dsl-plugin | junit:junit | 4.12 / 4.12 |
["compile","missing-data"] | pom.xml | SECURITY | Package is vulnerable to CVE GHSA-269g-pwp5-87pp | |
github | jenkinsci | job-dsl-plugin | junit:junit | 4.12 / 4.12 |
[] | SECURITY | Package is vulnerable to CVE GHSA-269g-pwp5-87pp | ||
github | jenkinsci | job-dsl-plugin | log4j:log4j | 1.2.17 / 1.2.17 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-2qrg-x229-3v8q | |
github | jenkinsci | job-dsl-plugin | log4j:log4j | 1.2.17 / 1.2.17 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-65fg-84f6-3jq3 | |
github | jenkinsci | job-dsl-plugin | log4j:log4j | 1.2.17 / 1.2.17 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-f7vh-qwp3-x37m | |
github | jenkinsci | job-dsl-plugin | log4j:log4j | 1.2.17 / 1.2.17 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-fp5r-v3w9-4333 | |
github | jenkinsci | job-dsl-plugin | log4j:log4j | 1.2.17 / 1.2.17 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-w9p3-5cr8-m3jj | |
github | jenkinsci | job-dsl-plugin | log4j:log4j | 1.2.17 / 1.2.17 |
[] | SECURITY | Package is vulnerable to CVE GHSA-2qrg-x229-3v8q | ||
github | jenkinsci | job-dsl-plugin | log4j:log4j | 1.2.17 / 1.2.17 |
[] | SECURITY | Package is vulnerable to CVE GHSA-65fg-84f6-3jq3 | ||
github | jenkinsci | job-dsl-plugin | log4j:log4j | 1.2.17 / 1.2.17 |
[] | SECURITY | Package is vulnerable to CVE GHSA-f7vh-qwp3-x37m | ||
github | jenkinsci | job-dsl-plugin | log4j:log4j | 1.2.17 / 1.2.17 |
[] | SECURITY | Package is vulnerable to CVE GHSA-fp5r-v3w9-4333 | ||
github | jenkinsci | job-dsl-plugin | log4j:log4j | 1.2.17 / 1.2.17 |
[] | SECURITY | Package is vulnerable to CVE GHSA-w9p3-5cr8-m3jj | ||
github | jenkinsci | job-dsl-plugin | net.minidev:json-smart | 2.3 / 2.3 | ["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-493p-pfq6-5258 | |
github | jenkinsci | job-dsl-plugin | net.minidev:json-smart | 2.3 / 2.3 | ["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-v528-7hrm-frqp | |
github | jenkinsci | job-dsl-plugin | net.minidev:json-smart | 2.3 / 2.3 | [] | SECURITY | Package is vulnerable to CVE GHSA-493p-pfq6-5258 | ||
github | jenkinsci | job-dsl-plugin | net.minidev:json-smart | 2.3 / 2.3 | [] | SECURITY | Package is vulnerable to CVE GHSA-v528-7hrm-frqp | ||
github | jenkinsci | job-dsl-plugin | org.acegisecurity:acegi-security | 1.0.7 / 1.0.7 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-3295-h9qx-r82x | |
github | jenkinsci | job-dsl-plugin | org.acegisecurity:acegi-security | 1.0.7 / 1.0.7 |
[] | SECURITY | Package is vulnerable to CVE GHSA-3295-h9qx-r82x | ||
github | jenkinsci | job-dsl-plugin | org.apache.ant:ant | 1.10.9 / 1.10.9 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-5v34-g2px-j4fw | |
github | jenkinsci | job-dsl-plugin | org.apache.ant:ant | 1.10.9 / 1.10.9 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-q5r4-cfpx-h6fh | |
github | jenkinsci | job-dsl-plugin | org.apache.ant:ant | 1.10.9 / 1.10.9 |
[] | SECURITY | Package is vulnerable to CVE GHSA-5v34-g2px-j4fw | ||
github | jenkinsci | job-dsl-plugin | org.apache.ant:ant | 1.10.9 / 1.10.9 |
[] | SECURITY | Package is vulnerable to CVE GHSA-q5r4-cfpx-h6fh | ||
github | jenkinsci | job-dsl-plugin | org.apache.ant:ant | 1.9.4 / 1.9.4 |
["build","missing-data"] | pom.xml | SECURITY | Package is vulnerable to CVE GHSA-4p6w-m9wc-c9c9 | |
github | jenkinsci | job-dsl-plugin | org.apache.ant:ant | 1.9.4 / 1.9.4 |
["build","missing-data"] | pom.xml | SECURITY | Package is vulnerable to CVE GHSA-5v34-g2px-j4fw | |
github | jenkinsci | job-dsl-plugin | org.apache.ant:ant | 1.9.4 / 1.9.4 |
["build","missing-data"] | pom.xml | SECURITY | Package is vulnerable to CVE GHSA-f62v-xpxf-3v68 | |
github | jenkinsci | job-dsl-plugin | org.apache.ant:ant | 1.9.4 / 1.9.4 |
["build","missing-data"] | pom.xml | SECURITY | Package is vulnerable to CVE GHSA-q5r4-cfpx-h6fh | |
github | jenkinsci | job-dsl-plugin | org.apache.commons:commons-compress | 1.19 / 1.19 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7hfm-57qf-j43q | |
github | jenkinsci | job-dsl-plugin | org.apache.commons:commons-compress | 1.19 / 1.19 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-crv7-7245-f45f | |
github | jenkinsci | job-dsl-plugin | org.apache.commons:commons-compress | 1.19 / 1.19 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-mc84-pj99-q6hh | |
github | jenkinsci | job-dsl-plugin | org.apache.commons:commons-compress | 1.19 / 1.19 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-xqfj-vm6h-2x34 | |
github | jenkinsci | job-dsl-plugin | org.apache.commons:commons-compress | 1.19 / 1.19 |
[] | SECURITY | Package is vulnerable to CVE GHSA-7hfm-57qf-j43q | ||
github | jenkinsci | job-dsl-plugin | org.apache.commons:commons-compress | 1.19 / 1.19 |
[] | SECURITY | Package is vulnerable to CVE GHSA-crv7-7245-f45f | ||
github | jenkinsci | job-dsl-plugin | org.apache.commons:commons-compress | 1.19 / 1.19 |
[] | SECURITY | Package is vulnerable to CVE GHSA-mc84-pj99-q6hh | ||
github | jenkinsci | job-dsl-plugin | org.apache.commons:commons-compress | 1.19 / 1.19 |
[] | SECURITY | Package is vulnerable to CVE GHSA-xqfj-vm6h-2x34 | ||
github | jenkinsci | job-dsl-plugin | org.apache.maven:maven-core | 3.2.5 / 3.2.5 |
["build","missing-data"] | job-dsl-core/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-2f88-5hg8-9x2x | |
github | jenkinsci | job-dsl-plugin | org.apache.maven:maven-core | 3.2.5 / 3.2.5 |
[] | SECURITY | Package is vulnerable to CVE GHSA-2f88-5hg8-9x2x | ||
github | jenkinsci | job-dsl-plugin | org.codehaus.groovy:groovy | 2.4.17 / 2.4.17 |
["build","missing-data"] | pom.xml | SECURITY | Package is vulnerable to CVE GHSA-rcjj-h6gh-jf3r | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-279f-qwgh-h5mp | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-2c79-h2h5-g3fw | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-34wx-x2w9-vqm3 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-3q84-vrvx-rfvf | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-4625-q52w-39cx | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-4g38-hrm4-rg94 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-4pw5-r58h-fv24 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-4wr9-2xc6-jmg5 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-55wp-3pq4-w8p9 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-584m-7r4m-8j6v | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-58xm-mxjf-254g | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-5j46-5hwq-gwh7 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-69vw-3pcm-84rw | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-6q4g-84f3-mw74 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7f84-p6r5-jr6q | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7qf3-c2q8-69m3 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-8xg4-xq2v-v6j7 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-929w-q433-4h9x | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-97c3-w9cr-6qc2 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-98fp-r22g-wpj7 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-98gq-6hxg-52r6 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-9grj-j43m-mjqr | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-c5r9-rx53-q3gf | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-cj6r-8pxj-5jv6 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-cv2w-q8c3-xjv7 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-cvvm-4cr9-r436 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-cxqw-vjcr-gp5g | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-f585-9fw3-rj2m | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-frgr-c5f2-8qhh | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-h76p-mc68-jv3p | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-hf9h-vv4m-2f33 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-hq87-h4jg-vxfw | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-j3cq-h6vh-gx7f | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-j664-qhh4-hpf8 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-m9hr-259f-2v23 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-mj7q-cmf3-mg7h | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-p92q-7fhh-mq35 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-pgj6-jmj5-wqfx | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-pvwx-3jx5-24r2 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-pxgq-gqr9-5gwx | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-q4wp-8c99-69pw | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-qv64-w99c-qcr9 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-qv6f-rcv6-6q3x | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-qxp6-27gw-99cj | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-rrgp-c2w8-6vg6 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-vpjm-58cw-r8q5 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-w2hv-rcqr-2h7r | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-wv63-gwr9-5c55 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-279f-qwgh-h5mp | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-2c79-h2h5-g3fw | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-34wx-x2w9-vqm3 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-3q84-vrvx-rfvf | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-4625-q52w-39cx | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-4g38-hrm4-rg94 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-4pw5-r58h-fv24 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-4wr9-2xc6-jmg5 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-55wp-3pq4-w8p9 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-584m-7r4m-8j6v | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-58xm-mxjf-254g | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-5j46-5hwq-gwh7 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-69vw-3pcm-84rw | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-6q4g-84f3-mw74 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-7f84-p6r5-jr6q | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-7qf3-c2q8-69m3 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-8xg4-xq2v-v6j7 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-929w-q433-4h9x | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-97c3-w9cr-6qc2 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-98fp-r22g-wpj7 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-98gq-6hxg-52r6 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-9grj-j43m-mjqr | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-c5r9-rx53-q3gf | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-cj6r-8pxj-5jv6 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-cv2w-q8c3-xjv7 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-cvvm-4cr9-r436 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-cxqw-vjcr-gp5g | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-f585-9fw3-rj2m | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-frgr-c5f2-8qhh | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-h76p-mc68-jv3p | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-hf9h-vv4m-2f33 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-hq87-h4jg-vxfw | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-j3cq-h6vh-gx7f | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-j664-qhh4-hpf8 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-m9hr-259f-2v23 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-mj7q-cmf3-mg7h | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-p92q-7fhh-mq35 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-pgj6-jmj5-wqfx | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-pvwx-3jx5-24r2 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-pxgq-gqr9-5gwx | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-q4wp-8c99-69pw | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-qv64-w99c-qcr9 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-qv6f-rcv6-6q3x | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-qxp6-27gw-99cj | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-rrgp-c2w8-6vg6 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-vpjm-58cw-r8q5 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-w2hv-rcqr-2h7r | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.263.1 / 2.263.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-wv63-gwr9-5c55 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.319.3 / 2.319.3 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-279f-qwgh-h5mp | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.319.3 / 2.319.3 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-55wp-3pq4-w8p9 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.319.3 / 2.319.3 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-584m-7r4m-8j6v | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.319.3 / 2.319.3 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-5j46-5hwq-gwh7 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.319.3 / 2.319.3 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-69vw-3pcm-84rw | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.319.3 / 2.319.3 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7f84-p6r5-jr6q | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.319.3 / 2.319.3 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-98fp-r22g-wpj7 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.319.3 / 2.319.3 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-9grj-j43m-mjqr | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.319.3 / 2.319.3 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-cj6r-8pxj-5jv6 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.319.3 / 2.319.3 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-frgr-c5f2-8qhh | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.319.3 / 2.319.3 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-h76p-mc68-jv3p | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.319.3 / 2.319.3 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-hf9h-vv4m-2f33 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.319.3 / 2.319.3 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-hq87-h4jg-vxfw | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.319.3 / 2.319.3 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-j664-qhh4-hpf8 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.319.3 / 2.319.3 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-qv64-w99c-qcr9 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.main:jenkins-core | 2.319.3 / 2.319.3 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-rrgp-c2w8-6vg6 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins.workflow:workflow-support | 3.5 / 3.5 | ["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-64r9-x74q-wxmh | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins.workflow:workflow-support | 3.5 / 3.5 | [] | SECURITY | Package is vulnerable to CVE GHSA-64r9-x74q-wxmh | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:cloudbees-folder | 6.16 / 6.16 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-22c3-whjv-hrfm | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:cloudbees-folder | 6.16 / 6.16 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-36hq-v2fc-rpqp | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:cloudbees-folder | 6.16 / 6.16 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-4vqp-pcm3-73xp | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:cloudbees-folder | 6.16 / 6.16 |
[] | SECURITY | Package is vulnerable to CVE GHSA-22c3-whjv-hrfm | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:cloudbees-folder | 6.16 / 6.16 |
[] | SECURITY | Package is vulnerable to CVE GHSA-36hq-v2fc-rpqp | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:cloudbees-folder | 6.16 / 6.16 |
[] | SECURITY | Package is vulnerable to CVE GHSA-4vqp-pcm3-73xp | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:config-file-provider | 3.7.0 / 3.7.0 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-2959-fj73-hm8p | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:config-file-provider | 3.7.0 / 3.7.0 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-3m3f-2323-64m7 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:config-file-provider | 3.7.0 / 3.7.0 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-998m-f2x3-jjq4 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:config-file-provider | 3.7.0 / 3.7.0 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-pv2g-vm98-vjxf | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:config-file-provider | 3.7.0 / 3.7.0 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-q7xg-hh3q-hc68 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:config-file-provider | 3.7.0 / 3.7.0 |
[] | SECURITY | Package is vulnerable to CVE GHSA-2959-fj73-hm8p | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:config-file-provider | 3.7.0 / 3.7.0 |
[] | SECURITY | Package is vulnerable to CVE GHSA-3m3f-2323-64m7 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:config-file-provider | 3.7.0 / 3.7.0 |
[] | SECURITY | Package is vulnerable to CVE GHSA-998m-f2x3-jjq4 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:config-file-provider | 3.7.0 / 3.7.0 |
[] | SECURITY | Package is vulnerable to CVE GHSA-pv2g-vm98-vjxf | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:config-file-provider | 3.7.0 / 3.7.0 |
[] | SECURITY | Package is vulnerable to CVE GHSA-q7xg-hh3q-hc68 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:credentials | 2.1.4 / 2.1.4 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-gchq-9r68-6jwv | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:credentials | 2.1.4 / 2.1.4 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-rvg5-f5fj-mxvg | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:credentials | 2.1.4 / 2.1.4 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-xm94-9jw8-p6hw | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:credentials | 2.6.1 / 2.6.1 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-rvg5-f5fj-mxvg | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:credentials | 2.6.1 / 2.6.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-rvg5-f5fj-mxvg | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:mailer | 1.34 / 1.34 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-558x-h7rg-997v | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:mailer | 1.34 / 1.34 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-85rq-hp8x-ghjq | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:mailer | 1.34 / 1.34 |
[] | SECURITY | Package is vulnerable to CVE GHSA-558x-h7rg-997v | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:mailer | 1.34 / 1.34 |
[] | SECURITY | Package is vulnerable to CVE GHSA-85rq-hp8x-ghjq | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.56 / 1.56 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-27rf-8mjp-r363 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.56 / 1.56 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-62pm-mgrh-7p69 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.56 / 1.56 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-72gx-qq2m-6xr2 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.56 / 1.56 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-76qj-9gwh-pvv3 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.56 / 1.56 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7vr5-72w7-q6jc | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.56 / 1.56 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-ccr8-4xr7-cgj3 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.56 / 1.56 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-f6mq-6fx5-w2ch | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.56 / 1.56 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-fv42-mx39-6fpw | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.56 / 1.56 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-p56j-x44h-g66j | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.56 / 1.56 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-q87g-7mp5-765q | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.56 / 1.56 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-qvhf-3567-pc4v | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.56 / 1.56 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-qvmf-36h5-3f5v | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.56 / 1.56 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-qwgx-mrv5-87j8 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.56 / 1.56 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-x25x-j4w4-7m59 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.75 / 1.75 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-27rf-8mjp-r363 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.75 / 1.75 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-76qj-9gwh-pvv3 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.75 / 1.75 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7vr5-72w7-q6jc | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.75 / 1.75 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-f6mq-6fx5-w2ch | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.75 / 1.75 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-fv42-mx39-6fpw | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.75 / 1.75 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-qwgx-mrv5-87j8 | |
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.75 / 1.75 |
[] | SECURITY | Package is vulnerable to CVE GHSA-27rf-8mjp-r363 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.75 / 1.75 |
[] | SECURITY | Package is vulnerable to CVE GHSA-76qj-9gwh-pvv3 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.75 / 1.75 |
[] | SECURITY | Package is vulnerable to CVE GHSA-7vr5-72w7-q6jc | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.75 / 1.75 |
[] | SECURITY | Package is vulnerable to CVE GHSA-f6mq-6fx5-w2ch | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.75 / 1.75 |
[] | SECURITY | Package is vulnerable to CVE GHSA-fv42-mx39-6fpw | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:script-security | 1.75 / 1.75 |
[] | SECURITY | Package is vulnerable to CVE GHSA-qwgx-mrv5-87j8 | ||
github | jenkinsci | job-dsl-plugin | org.jenkins-ci.plugins:ssh-credentials | 1.13 / 1.13 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-cwcf-5m5w-mq2w | |
github | jenkinsci | job-dsl-plugin | org.json:json | 20180813 / 20180813 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-3vqj-43w4-2q58 | |
github | jenkinsci | job-dsl-plugin | org.json:json | 20180813 / 20180813 |
[] | SECURITY | Package is vulnerable to CVE GHSA-3vqj-43w4-2q58 | ||
github | jenkinsci | job-dsl-plugin | org.springframework.security:spring-security-core | 5.5.3 / 5.5.3 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-hh32-7344-cg2f | |
github | jenkinsci | job-dsl-plugin | org.springframework.security:spring-security-core | 5.5.3 / 5.5.3 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-wx54-3278-m5g4 | |
github | jenkinsci | job-dsl-plugin | org.springframework.security:spring-security-core | 5.5.3 / 5.5.3 |
[] | SECURITY | Package is vulnerable to CVE GHSA-hh32-7344-cg2f | ||
github | jenkinsci | job-dsl-plugin | org.springframework.security:spring-security-core | 5.5.3 / 5.5.3 |
[] | SECURITY | Package is vulnerable to CVE GHSA-wx54-3278-m5g4 | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-beans | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-36p3-wjmg-h94x | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-beans | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-36p3-wjmg-h94x | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-beans | 5.3.11 / 5.3.11 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-36p3-wjmg-h94x | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-3rmv-2pg5-xvqj | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-4487-x383-qpph | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-564r-hj7v-mcr5 | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-8crv-49fr-2h6j | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-ffvq-7w96-97p7 | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-g5mm-vmx4-3rg7 | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-g8hw-794c-4j9g | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-hh26-6xwr-ggv7 | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-p5hg-3xm3-gcjg | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-pgf9-h69p-pcgf | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-rcpf-vj53-7h2m | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-rqph-vqwm-22vc | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-wjjr-h4wh-w6vv | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-wxqc-pxw9-g2p8 | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-3rmv-2pg5-xvqj | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-4487-x383-qpph | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-564r-hj7v-mcr5 | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-8crv-49fr-2h6j | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-ffvq-7w96-97p7 | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-g5mm-vmx4-3rg7 | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-g8hw-794c-4j9g | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-hh26-6xwr-ggv7 | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-p5hg-3xm3-gcjg | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-pgf9-h69p-pcgf | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-rcpf-vj53-7h2m | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-rqph-vqwm-22vc | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-wjjr-h4wh-w6vv | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-wxqc-pxw9-g2p8 | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 5.3.11 / 5.3.11 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-564r-hj7v-mcr5 | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 5.3.11 / 5.3.11 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-6gf2-pvqw-37ph | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 5.3.11 / 5.3.11 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-g5mm-vmx4-3rg7 | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 5.3.11 / 5.3.11 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-hh26-6xwr-ggv7 | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 5.3.11 / 5.3.11 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-rqph-vqwm-22vc | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-core | 5.3.11 / 5.3.11 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-wxqc-pxw9-g2p8 | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-expression | 5.3.11 / 5.3.11 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-558x-2xjg-6232 | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-expression | 5.3.11 / 5.3.11 |
[] | SECURITY | Package is vulnerable to CVE GHSA-558x-2xjg-6232 | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-web | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-4wrc-f8pq-fpqp | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-web | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-6v7w-535j-rq5m | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-web | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-g6hf-f9cq-q7w7 | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-web | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-xjrf-8x4f-43h4 | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-web | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-4wrc-f8pq-fpqp | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-web | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-6v7w-535j-rq5m | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-web | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-g6hf-f9cq-q7w7 | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-web | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-xjrf-8x4f-43h4 | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-web | 5.3.11 / 5.3.11 |
["test","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-4wrc-f8pq-fpqp | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-webmvc | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-2m8h-fgr8-2q9w | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-webmvc | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-36p3-wjmg-h94x | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-webmvc | 2.5.6.SEC03 / 2.5.6.SEC03 |
["optional","missing-data"] | job-dsl-plugin/pom.xml | SECURITY | Package is vulnerable to CVE GHSA-8cmm-qj8g-fcp6 | |
github | jenkinsci | job-dsl-plugin | org.springframework:spring-webmvc | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-2m8h-fgr8-2q9w | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-webmvc | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-36p3-wjmg-h94x | ||
github | jenkinsci | job-dsl-plugin | org.springframework:spring-webmvc | 2.5.6.SEC03 / 2.5.6.SEC03 |
[] | SECURITY | Package is vulnerable to CVE GHSA-8cmm-qj8g-fcp6 | ||
github | jenkinsci | job-dsl-plugin | semver | 7.3.8 / 7.3.8 |
[] | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | ||
github | jenkinsci | job-dsl-plugin | word-wrap | 1.2.3 / 1.2.3 |
[] | SECURITY | Package is vulnerable to CVE GHSA-j8xg-fqg3-53r7 | ||
github | kubernetes | kubernetes | github.com/cyphar/filepath-securejoin | v0.2.3 / v0.2.3 |
["require"] | go.mod | SECURITY | Package is vulnerable to CVE GHSA-6xv5-86q9-7xr8 | |
github | kubernetes | kubernetes | github.com/cyphar/filepath-securejoin | v0.2.3 / v0.2.3 |
["require"] | go.mod | SECURITY | Package is vulnerable to CVE GO-2023-2048 | |
github | monzo | egress-operator | github.com/caddyserver/caddy | v1.0.4 / v1.0.4 |
["require"] | coredns-plugin/go.mod | SECURITY | Package is vulnerable to CVE GHSA-2927-hv3p-f3vp | |
github | monzo | egress-operator | github.com/caddyserver/caddy | v1.0.4 / v1.0.4 |
["require"] | coredns-plugin/go.mod | SECURITY | Package is vulnerable to CVE GHSA-m7gr-5w5g-36jf | |
github | monzo | egress-operator | github.com/coredns/coredns | v1.6.5 / v1.6.5 |
["require"] | coredns-plugin/go.mod | SECURITY | Package is vulnerable to CVE GHSA-ch7v-37xg-75ph | |
github | monzo | egress-operator | github.com/coredns/coredns | v1.6.5 / v1.6.5 |
["require"] | coredns-plugin/go.mod | SECURITY | Package is vulnerable to CVE GHSA-gv9j-4w24-q7vx | |
github | monzo | egress-operator | github.com/coredns/coredns | v1.6.5 / v1.6.5 |
["require"] | coredns-plugin/go.mod | SECURITY | Package is vulnerable to CVE GHSA-h828-v5pv-33qx | |
github | monzo | egress-operator | golang.org/x/net | v0.12.0 / v0.12.0 |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE GO-2023-1988 | |
github | monzo | egress-operator | k8s.io/apimachinery | v0.0.0-20190612205821-1799e75a0719 / v0.0.0-20190612205821-1799e75a0719 |
["require"] | coredns-plugin/go.mod | SECURITY | Package is vulnerable to CVE GHSA-74fp-r6jw-h4mp | |
github | monzo | egress-operator | k8s.io/apimachinery | v0.0.0-20190612205821-1799e75a0719 / v0.0.0-20190612205821-1799e75a0719 |
["require"] | coredns-plugin/go.mod | SECURITY | Package is vulnerable to CVE GO-2022-0965 | |
github | monzo | egress-operator | k8s.io/client-go | v0.0.0-20190620085101-78d2af792bab / v0.0.0-20190620085101-78d2af792bab |
["require"] | coredns-plugin/go.mod | SECURITY | Package is vulnerable to CVE GHSA-8cfg-vx93-jvxw | |
github | monzo | egress-operator | k8s.io/client-go | v0.0.0-20190620085101-78d2af792bab / v0.0.0-20190620085101-78d2af792bab |
["require"] | coredns-plugin/go.mod | SECURITY | Package is vulnerable to CVE GHSA-jmrx-5g74-6v2f | |
github | monzo | egress-operator | k8s.io/client-go | v0.0.0-20190620085101-78d2af792bab / v0.0.0-20190620085101-78d2af792bab |
["require"] | coredns-plugin/go.mod | SECURITY | Package is vulnerable to CVE GO-2021-0064 | |
github | monzo | egress-operator | k8s.io/client-go | v0.0.0-20190620085101-78d2af792bab / v0.0.0-20190620085101-78d2af792bab |
["require"] | coredns-plugin/go.mod | SECURITY | Package is vulnerable to CVE GO-2021-0065 | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE GHSA-2gwj-7jmv-h26r | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE GHSA-53qw-q765-4fww | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE GHSA-68w8-qjq3-2gfm | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE GHSA-6cw3-g6wv-c2xv | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE GHSA-8c5j-9r9f-c6w8 | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE GHSA-95rw-fx8r-36v6 | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE GHSA-jrh2-hc4r-7jwx | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE GHSA-p99v-5w3c-jqq9 | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE GHSA-qm57-vhq3-3fwf | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE GHSA-v6rh-hp5x-86rv | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE GHSA-w24h-v9qh-8gxj | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE PYSEC-2021-439 | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE PYSEC-2021-8 | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE PYSEC-2021-98 | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE PYSEC-2021-99 | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE PYSEC-2022-1 | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE PYSEC-2022-19 | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE PYSEC-2022-190 | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE PYSEC-2022-191 | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE PYSEC-2022-2 | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE PYSEC-2022-20 | |
github | monzo | response | Django | ==2.2.21 / 2.2.21 |
[] | demo/requirements.txt | SECURITY | Package is vulnerable to CVE PYSEC-2022-3 | |
github | monzo | response | bleach | ==3.1.4 / 3.1.4 |
[] | setup.py | SECURITY | Package is vulnerable to CVE GHSA-vv2x-vrpj-qqpq | |
github | monzo | response | bleach | ==3.1.4 / 3.1.4 |
[] | setup.py | SECURITY | Package is vulnerable to CVE PYSEC-2021-865 | |
github | monzo | terrors | gopkg.in/yaml.v3 | v3.0.0-20200615113413-eeeca48fe776 / v3.0.0-20200615113413-eeeca48fe776 |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE GHSA-hp87-p4gw-j4gq | |
github | monzo | terrors | gopkg.in/yaml.v3 | v3.0.0-20200615113413-eeeca48fe776 / v3.0.0-20200615113413-eeeca48fe776 |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE GO-2022-0603 | |
github | monzo | typhon | golang.org/x/net | v0.7.0 / v0.7.0 |
["require"] | go.mod | SECURITY | Package is vulnerable to CVE GO-2023-1988 | |
github | oapi-codegen | fiber-middleware | github.com/gofiber/fiber/v2 | v2.49.1 / v2.49.1 |
["require"] | go.mod | SECURITY | Package is vulnerable to CVE GHSA-3q5p-3558-364f | |
github | oapi-codegen | fiber-middleware | github.com/gofiber/fiber/v2 | v2.49.1 / v2.49.1 |
["require"] | go.mod | SECURITY | Package is vulnerable to CVE GO-2023-2052 | |
github | oapi-codegen | iris-middleware | github.com/gomarkdown/markdown | v0.0.0-20230716120725-531d2d74bc12 / v0.0.0-20230716120725-531d2d74bc12 |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE GHSA-m9xq-6h2j-65r2 | |
github | oapi-codegen | iris-middleware | github.com/gomarkdown/markdown | v0.0.0-20230716120725-531d2d74bc12 / v0.0.0-20230716120725-531d2d74bc12 |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE GO-2023-2074 | |
github | oapi-codegen | runtime | github.com/gomarkdown/markdown | v0.0.0-20230716120725-531d2d74bc12 / v0.0.0-20230716120725-531d2d74bc12 |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE GHSA-m9xq-6h2j-65r2 | |
github | oapi-codegen | runtime | github.com/gomarkdown/markdown | v0.0.0-20230716120725-531d2d74bc12 / v0.0.0-20230716120725-531d2d74bc12 |
["indirect"] | go.mod | SECURITY | Package is vulnerable to CVE GO-2023-2074 | |
github | opentofu | opentofu | github.com/aws/aws-sdk-go | v1.44.122 / v1.44.122 |
["require"] | go.mod | SECURITY | Package is vulnerable to CVE GO-2022-0646 | |
github | opentofu | opentofu | golang.org/x/net | v0.11.0 / v0.11.0 |
["require"] | go.mod | SECURITY | Package is vulnerable to CVE GO-2023-1988 | |
github | opentofu | opentofu | got | 9.6.0 / 9.6.0 |
["dependencies","lockfile"] | website/package.json | SECURITY | Package is vulnerable to CVE GHSA-pfrx-2q88-qq97 | |
github | renovatebot | renovate | Werkzeug | >=0.15.3,<0.16 / 0.15.6 |
[] | lib/modules/manager/pip_setup/__fixtures__/setup.py | SECURITY | Package is vulnerable to CVE GHSA-px8h-6qxv-m22q | |
github | renovatebot | renovate | Werkzeug | >=0.15.3,<0.16 / 0.15.6 |
[] | lib/modules/manager/pip_setup/__fixtures__/setup.py | SECURITY | Package is vulnerable to CVE GHSA-xg9f-g7g7-2323 | |
github | renovatebot | renovate | Werkzeug | >=0.15.3,<0.16 / 0.15.6 |
[] | lib/modules/manager/pip_setup/__fixtures__/setup.py | SECURITY | Package is vulnerable to CVE PYSEC-2022-203 | |
github | renovatebot | renovate | Werkzeug | >=0.15.3,<0.16 / 0.15.6 |
[] | lib/modules/manager/pip_setup/__fixtures__/setup.py | SECURITY | Package is vulnerable to CVE PYSEC-2023-57 | |
github | renovatebot | renovate | Werkzeug | >=0.15.3,<0.16 / 0.15.6 |
[] | lib/modules/manager/pip_setup/__fixtures__/setup.py | SECURITY | Package is vulnerable to CVE PYSEC-2023-58 | |
github | renovatebot | renovate | celery | >=3.1.13.0,<5.0 / 4.4.7 |
[] | lib/modules/manager/pip_setup/__fixtures__/setup.py | SECURITY | Package is vulnerable to CVE GHSA-q4xr-rc97-m4xx | |
github | renovatebot | renovate | celery | >=3.1.13.0,<5.0 / 4.4.7 |
[] | lib/modules/manager/pip_setup/__fixtures__/setup.py | SECURITY | Package is vulnerable to CVE PYSEC-2021-858 | |
github | renovatebot | renovate | com.google.guava:guava | 18.0 / 18.0 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 | |
github | renovatebot | renovate | com.google.guava:guava | 18.0 / 18.0 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 | |
github | renovatebot | renovate | com.google.guava:guava | 18.0 / 18.0 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-mvr2-9pj6-7w5j | |
github | renovatebot | renovate | com.google.guava:guava | 18.0 / 18.0 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 | |
github | renovatebot | renovate | com.google.guava:guava | 18.0 / 18.0 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 | |
github | renovatebot | renovate | com.google.guava:guava | 18.0 / 18.0 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-mvr2-9pj6-7w5j | |
github | renovatebot | renovate | com.google.guava:guava | 30.1-jre / 30.1-jre |
["dependencies","missing-data"] | lib/modules/manager/gradle/__fixtures__/1/libs.versions.toml | SECURITY | Package is vulnerable to CVE GHSA-5mg8-w23w-74h3 | |
github | renovatebot | renovate | com.google.guava:guava | 30.1-jre / 30.1-jre |
["dependencies","missing-data"] | lib/modules/manager/gradle/__fixtures__/1/libs.versions.toml | SECURITY | Package is vulnerable to CVE GHSA-7g45-4rm6-3mm3 | |
github | renovatebot | renovate | com.jcraft:jsch | 0.1.38 / 0.1.38 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-q446-82vq-w674 | |
github | renovatebot | renovate | com.jcraft:jsch | 0.1.38 / 0.1.38 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-q446-82vq-w674 | |
github | renovatebot | renovate | com.jcraft:jsch | 0.1.53 / 0.1.53 |
["missing-data"] | lib/modules/manager/kotlin-script/__fixtures__/custom-repositories.main.kts | SECURITY | Package is vulnerable to CVE GHSA-q446-82vq-w674 | |
github | renovatebot | renovate | com.jcraft:jsch | 0.1.53 / 0.1.53 |
["missing-data"] | lib/modules/manager/kotlin-script/__fixtures__/generic-case.main.kts | SECURITY | Package is vulnerable to CVE GHSA-q446-82vq-w674 | |
github | renovatebot | renovate | com.puppycrawl.tools:checkstyle | 6.11.2 / 6.11.2 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-763g-fqq7-48wg | |
github | renovatebot | renovate | com.puppycrawl.tools:checkstyle | 6.11.2 / 6.11.2 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-gp32-7h29-rpxm | |
github | renovatebot | renovate | com.puppycrawl.tools:checkstyle | 6.11.2 / 6.11.2 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-763g-fqq7-48wg | |
github | renovatebot | renovate | com.puppycrawl.tools:checkstyle | 6.11.2 / 6.11.2 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-gp32-7h29-rpxm | |
github | renovatebot | renovate | com.squareup.okio:okio | 1.17.2 / 1.17.2 |
["dependencies","missing-data"] | lib/modules/manager/gradle/__fixtures__/2/libs.versions.toml | SECURITY | Package is vulnerable to CVE GHSA-w33c-445m-f8w7 | |
github | renovatebot | renovate | com.squareup.okio:okio | 2.8.0 / 2.8.0 |
["dependencies"] | lib/modules/manager/gradle/__fixtures__/2/libs.versions.toml | SECURITY | Package is vulnerable to CVE GHSA-w33c-445m-f8w7 | |
github | renovatebot | renovate | commons-beanutils:commons-beanutils | 1.9.2 / 1.9.2 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-6phf-73q6-gh87 | |
github | renovatebot | renovate | commons-beanutils:commons-beanutils | 1.9.2 / 1.9.2 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-6phf-73q6-gh87 | |
github | renovatebot | renovate | commons-collections:commons-collections | 3.2.1 / 3.2.1 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-6hgm-866r-3cjv | |
github | renovatebot | renovate | commons-collections:commons-collections | 3.2.1 / 3.2.1 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-fjq5-5j5f-mvxh | |
github | renovatebot | renovate | commons-collections:commons-collections | 3.2.1 / 3.2.1 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-6hgm-866r-3cjv | |
github | renovatebot | renovate | commons-collections:commons-collections | 3.2.1 / 3.2.1 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-fjq5-5j5f-mvxh | |
github | renovatebot | renovate | commons-io:commons-io | 1.4 / 1.4 | ["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-gwrp-pvrq-jmwv | |
github | renovatebot | renovate | commons-io:commons-io | 1.4 / 1.4 | ["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-gwrp-pvrq-jmwv | |
github | renovatebot | renovate | django | >=1.11.23,<2.0 / 1.11.29 |
[] | lib/modules/manager/pip_setup/__fixtures__/setup.py | SECURITY | Package is vulnerable to CVE GHSA-68w8-qjq3-2gfm | |
github | renovatebot | renovate | django | >=1.11.23,<2.0 / 1.11.29 |
[] | lib/modules/manager/pip_setup/__fixtures__/setup.py | SECURITY | Package is vulnerable to CVE GHSA-v6rh-hp5x-86rv | |
github | renovatebot | renovate | django | >=1.11.23,<2.0 / 1.11.29 |
[] | lib/modules/manager/pip_setup/__fixtures__/setup.py | SECURITY | Package is vulnerable to CVE PYSEC-2021-98 | |
github | renovatebot | renovate | dom4j:dom4j | 1.1 / 1.1 | ["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-6pcc-3rfx-4gpm | |
github | renovatebot | renovate | dom4j:dom4j | 1.1 / 1.1 | ["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-hwj3-m3p6-hj38 | |
github | renovatebot | renovate | dom4j:dom4j | 1.1 / 1.1 | ["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-6pcc-3rfx-4gpm | |
github | renovatebot | renovate | dom4j:dom4j | 1.1 / 1.1 | ["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-hwj3-m3p6-hj38 | |
github | renovatebot | renovate | express | 4.0.0 / 4.0.0 |
["dependencies"] | lib/modules/manager/npm/update/locked-dependency/package-lock/__fixtures__/package.json | SECURITY | Package is vulnerable to CVE GHSA-gpvr-g6gh-9mc2 | |
github | renovatebot | renovate | flask | >=0.11,<2.0 / 1.1.4 |
[] | lib/modules/manager/pip_setup/__fixtures__/setup.py | SECURITY | Package is vulnerable to CVE GHSA-m2qf-hxjv-5gpq | |
github | renovatebot | renovate | flask | >=0.11,<2.0 / 1.1.4 |
[] | lib/modules/manager/pip_setup/__fixtures__/setup.py | SECURITY | Package is vulnerable to CVE PYSEC-2023-62 | |
github | renovatebot | renovate | future | >=0.15.2,<0.17 / 0.16.0 |
[] | lib/modules/manager/pip_setup/__fixtures__/setup.py | SECURITY | Package is vulnerable to CVE GHSA-v3c5-jqr6-7qm8 | |
github | renovatebot | renovate | future | >=0.15.2,<0.17 / 0.16.0 |
[] | lib/modules/manager/pip_setup/__fixtures__/setup.py | SECURITY | Package is vulnerable to CVE PYSEC-2022-42991 | |
github | renovatebot | renovate | org.apache.httpcomponents:httpclient | 4.0.1 / 4.0.1 |
["dependencies","missing-data"] | lib/modules/manager/gradle/__fixtures__/2/libs.versions.toml | SECURITY | Package is vulnerable to CVE GHSA-2x83-r56g-cv47 | |
github | renovatebot | renovate | org.apache.httpcomponents:httpclient | 4.0.1 / 4.0.1 |
["dependencies","missing-data"] | lib/modules/manager/gradle/__fixtures__/2/libs.versions.toml | SECURITY | Package is vulnerable to CVE GHSA-7r82-7xv7-xcpj | |
github | renovatebot | renovate | org.apache.httpcomponents:httpclient | 4.0.1 / 4.0.1 |
["dependencies","missing-data"] | lib/modules/manager/gradle/__fixtures__/2/libs.versions.toml | SECURITY | Package is vulnerable to CVE GHSA-cfh5-3ghh-wfjx | |
github | renovatebot | renovate | org.apache.httpcomponents:httpclient | 4.0.1 / 4.0.1 |
["dependencies","missing-data"] | lib/modules/manager/gradle/__fixtures__/2/libs.versions.toml | SECURITY | Package is vulnerable to CVE GHSA-fmj5-wv96-r2ch | |
github | renovatebot | renovate | org.apache.httpcomponents:httpclient | 4.0.1 / 4.0.1 |
["dependencies","missing-data"] | lib/modules/manager/gradle/__fixtures__/2/libs.versions.toml | SECURITY | Package is vulnerable to CVE GHSA-gw85-4gmf-m7rh | |
github | renovatebot | renovate | org.apache.httpcomponents:httpclient | 4.0.2 / 4.0.2 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-2x83-r56g-cv47 | |
github | renovatebot | renovate | org.apache.httpcomponents:httpclient | 4.0.2 / 4.0.2 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7r82-7xv7-xcpj | |
github | renovatebot | renovate | org.apache.httpcomponents:httpclient | 4.0.2 / 4.0.2 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-cfh5-3ghh-wfjx | |
github | renovatebot | renovate | org.apache.httpcomponents:httpclient | 4.0.2 / 4.0.2 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-fmj5-wv96-r2ch | |
github | renovatebot | renovate | org.apache.httpcomponents:httpclient | 4.0.2 / 4.0.2 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-gw85-4gmf-m7rh | |
github | renovatebot | renovate | org.apache.httpcomponents:httpclient | 4.0.2 / 4.0.2 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-2x83-r56g-cv47 | |
github | renovatebot | renovate | org.apache.httpcomponents:httpclient | 4.0.2 / 4.0.2 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7r82-7xv7-xcpj | |
github | renovatebot | renovate | org.apache.httpcomponents:httpclient | 4.0.2 / 4.0.2 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-cfh5-3ghh-wfjx | |
github | renovatebot | renovate | org.apache.httpcomponents:httpclient | 4.0.2 / 4.0.2 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-fmj5-wv96-r2ch | |
github | renovatebot | renovate | org.apache.httpcomponents:httpclient | 4.0.2 / 4.0.2 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-gw85-4gmf-m7rh | |
github | renovatebot | renovate | org.apache.httpcomponents:httpclient | 4.3.6 / 4.3.6 |
["missing-data"] | lib/modules/manager/kotlin-script/__fixtures__/custom-repositories.main.kts | SECURITY | Package is vulnerable to CVE GHSA-7r82-7xv7-xcpj | |
github | renovatebot | renovate | org.apache.httpcomponents:httpclient | 4.3.6 / 4.3.6 |
["missing-data"] | lib/modules/manager/kotlin-script/__fixtures__/generic-case.main.kts | SECURITY | Package is vulnerable to CVE GHSA-7r82-7xv7-xcpj | |
github | renovatebot | renovate | org.apache.maven.shared:maven-shared-utils | 0.6 / 0.6 | ["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-rhgr-952r-6p8q | |
github | renovatebot | renovate | org.apache.maven.shared:maven-shared-utils | 0.6 / 0.6 | ["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-rhgr-952r-6p8q | |
github | renovatebot | renovate | org.apache.maven:maven-core | 2.2.1 / 2.2.1 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-2f88-5hg8-9x2x | |
github | renovatebot | renovate | org.apache.maven:maven-core | 2.2.1 / 2.2.1 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-2f88-5hg8-9x2x | |
github | renovatebot | renovate | org.apache.struts:struts-core | 1.3.8 / 1.3.8 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-5ggr-mpgw-3mgx | |
github | renovatebot | renovate | org.apache.struts:struts-core | 1.3.8 / 1.3.8 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7jw3-5q4w-89qg | |
github | renovatebot | renovate | org.apache.struts:struts-core | 1.3.8 / 1.3.8 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-cvvx-r33m-v7pq | |
github | renovatebot | renovate | org.apache.struts:struts-core | 1.3.8 / 1.3.8 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-5ggr-mpgw-3mgx | |
github | renovatebot | renovate | org.apache.struts:struts-core | 1.3.8 / 1.3.8 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7jw3-5q4w-89qg | |
github | renovatebot | renovate | org.apache.struts:struts-core | 1.3.8 / 1.3.8 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-cvvx-r33m-v7pq | |
github | renovatebot | renovate | org.apache.velocity:velocity | 1.5 / 1.5 | ["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-59j4-wjwp-mw9m | |
github | renovatebot | renovate | org.apache.velocity:velocity | 1.5 / 1.5 | ["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-59j4-wjwp-mw9m | |
github | renovatebot | renovate | org.apache.velocity:velocity-tools | 2.0 / 2.0 | ["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-fh63-4r66-jc7v | |
github | renovatebot | renovate | org.apache.velocity:velocity-tools | 2.0 / 2.0 | ["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-fh63-4r66-jc7v | |
github | renovatebot | renovate | org.codehaus.plexus:plexus-utils | 3.0.20 / 3.0.20 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-g6ph-x5wf-g337 | |
github | renovatebot | renovate | org.codehaus.plexus:plexus-utils | 3.0.20 / 3.0.20 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-jcwr-x25h-x5fh | |
github | renovatebot | renovate | org.codehaus.plexus:plexus-utils | 3.0.20 / 3.0.20 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-g6ph-x5wf-g337 | |
github | renovatebot | renovate | org.codehaus.plexus:plexus-utils | 3.0.20 / 3.0.20 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-jcwr-x25h-x5fh | |
github | renovatebot | renovate | org.eclipse.jgit:org.eclipse.jgit | 4.6.0.201612231935-r / 4.6.0.201612231935-r |
[] | lib/modules/manager/kotlin-script/__fixtures__/generic-case.main.kts | SECURITY | Package is vulnerable to CVE GHSA-3p86-9955-h393 | |
github | renovatebot | renovate | org.jdom:jdom | 1.1 / 1.1 | ["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-2363-cqg2-863c | |
github | renovatebot | renovate | org.jdom:jdom | 1.1 / 1.1 | ["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-2363-cqg2-863c | |
github | renovatebot | renovate | org.jetbrains.kotlin:kotlin-stdlib | 1.4.0 / 1.4.0 |
["dependencies","missing-data"] | lib/modules/manager/gradle/__fixtures__/2/libs.versions.toml | SECURITY | Package is vulnerable to CVE GHSA-2qp4-g3q3-f92w | |
github | renovatebot | renovate | org.jetbrains.kotlin:kotlin-stdlib | 1.4.0 / 1.4.0 |
["dependencies","missing-data"] | lib/modules/manager/gradle/__fixtures__/2/libs.versions.toml | SECURITY | Package is vulnerable to CVE GHSA-cqj8-47ch-rvvq | |
github | renovatebot | renovate | org.jetbrains.kotlin:kotlin-stdlib | 1.4.32 / 1.4.32 |
["dependencies","missing-data"] | lib/modules/manager/gradle/__fixtures__/1/libs.versions.toml | SECURITY | Package is vulnerable to CVE GHSA-2qp4-g3q3-f92w | |
github | renovatebot | renovate | org.jetbrains.kotlin:kotlin-stdlib | 1.5.21 / 1.5.21 |
["missing-data"] | lib/modules/manager/kotlin-script/__fixtures__/generic-case.main.kts | SECURITY | Package is vulnerable to CVE GHSA-2qp4-g3q3-f92w | |
github | renovatebot | renovate | org.json:json | 20080701 / 20080701 |
["dependencies","missing-data"] | lib/modules/manager/gradle/__fixtures__/2/libs.versions.toml | SECURITY | Package is vulnerable to CVE GHSA-3vqj-43w4-2q58 | |
github | renovatebot | renovate | org.scala-lang:scala-library | 2.13.7 / 2.13.7 |
["compile","missing-data"] | lib/modules/manager/maven/__fixtures__/recursive_props.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-8qv5-68g4-248j | |
github | renovatebot | renovate | pnpm | 6 / 6.35.1 | ["engines"] | lib/modules/manager/npm/__fixtures__/pnpm-monorepo/package.json | SECURITY | Package is vulnerable to CVE GHSA-5r98-f33j-g8h7 | |
github | renovatebot | renovate | pnpm | 6.15.0 / 6.15.0 |
["packageManager"] | lib/modules/manager/npm/post-update/__fixtures__/manager-field/package.json | SECURITY | Package is vulnerable to CVE GHSA-5r98-f33j-g8h7 | |
github | renovatebot | renovate | pnpm | 6.15.0 / 6.15.0 |
["packageManager"] | lib/modules/manager/npm/post-update/__fixtures__/manager-field/package.json | SECURITY | Package is vulnerable to CVE GHSA-9m87-6fj3-c5xh | |
github | renovatebot | renovate | pnpm | =6.15.0 / 6.15.0 |
["engines"] | lib/modules/manager/npm/post-update/__fixtures__/manager-field/package.json | SECURITY | Package is vulnerable to CVE GHSA-5r98-f33j-g8h7 | |
github | renovatebot | renovate | pnpm | =6.15.0 / 6.15.0 |
["engines"] | lib/modules/manager/npm/post-update/__fixtures__/manager-field/package.json | SECURITY | Package is vulnerable to CVE GHSA-9m87-6fj3-c5xh | |
github | renovatebot | renovate | pnpm | =6.16.0 / 6.16.0 |
["engines"] | lib/modules/manager/npm/post-update/__fixtures__/parent/package.json | SECURITY | Package is vulnerable to CVE GHSA-5r98-f33j-g8h7 | |
github | renovatebot | renovate | xerces:xercesImpl | 2.9.1 / 2.9.1 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-334p-wv2m-w3vp | |
github | renovatebot | renovate | xerces:xercesImpl | 2.9.1 / 2.9.1 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7j4h-8wpf-rqfh | |
github | renovatebot | renovate | xerces:xercesImpl | 2.9.1 / 2.9.1 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-h65f-jvqw-m9fj | |
github | renovatebot | renovate | xerces:xercesImpl | 2.9.1 / 2.9.1 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-vmqm-g3vh-847m | |
github | renovatebot | renovate | xerces:xercesImpl | 2.9.1 / 2.9.1 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/child.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-w4jq-qh47-hvjq | |
github | renovatebot | renovate | xerces:xercesImpl | 2.9.1 / 2.9.1 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-334p-wv2m-w3vp | |
github | renovatebot | renovate | xerces:xercesImpl | 2.9.1 / 2.9.1 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-7j4h-8wpf-rqfh | |
github | renovatebot | renovate | xerces:xercesImpl | 2.9.1 / 2.9.1 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-h65f-jvqw-m9fj | |
github | renovatebot | renovate | xerces:xercesImpl | 2.9.1 / 2.9.1 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-vmqm-g3vh-847m | |
github | renovatebot | renovate | xerces:xercesImpl | 2.9.1 / 2.9.1 |
["build","missing-data"] | lib/modules/manager/maven/__fixtures__/simple.pom.xml | SECURITY | Package is vulnerable to CVE GHSA-w4jq-qh47-hvjq | |
github | snarfed | bridgy-----cyclone | setuptools | 39.0.1 / 39.0.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-r9hx-vwmv-q579 | ||
github | snarfed | bridgy-----cyclone | setuptools | 39.0.1 / 39.0.1 |
[] | SECURITY | Package is vulnerable to CVE PYSEC-2022-43012 | ||
github | snarfed | bridgy-----spdx | setuptools | 39.0.1 / 39.0.1 |
[] | SECURITY | Package is vulnerable to CVE GHSA-r9hx-vwmv-q579 | ||
github | snarfed | bridgy-----spdx | setuptools | 39.0.1 / 39.0.1 |
[] | SECURITY | Package is vulnerable to CVE PYSEC-2022-43012 | ||
github | stoplightio | spectral | engine.io | ~6.2.0 / 6.2.1 |
["lockfile","lockfile-yarn-pinning-~6.2.0"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | stoplightio | spectral | engine.io | ~6.2.0 / 6.2.1 |
["lockfile","lockfile-yarn-pinning-~6.2.0"] | packages/cli/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | stoplightio | spectral | engine.io | ~6.2.0 / 6.2.1 |
["lockfile","lockfile-yarn-pinning-~6.2.0"] | packages/core/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | stoplightio | spectral | engine.io | ~6.2.0 / 6.2.1 |
["lockfile","lockfile-yarn-pinning-~6.2.0"] | packages/formats/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | stoplightio | spectral | engine.io | ~6.2.0 / 6.2.1 |
["lockfile","lockfile-yarn-pinning-~6.2.0"] | packages/formatters/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | stoplightio | spectral | engine.io | ~6.2.0 / 6.2.1 |
["lockfile","lockfile-yarn-pinning-~6.2.0"] | packages/functions/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | stoplightio | spectral | engine.io | ~6.2.0 / 6.2.1 |
["lockfile","lockfile-yarn-pinning-~6.2.0"] | packages/parsers/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | stoplightio | spectral | engine.io | ~6.2.0 / 6.2.1 |
["lockfile","lockfile-yarn-pinning-~6.2.0"] | packages/ref-resolver/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | stoplightio | spectral | engine.io | ~6.2.0 / 6.2.1 |
["lockfile","lockfile-yarn-pinning-~6.2.0"] | packages/ruleset-bundler/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | stoplightio | spectral | engine.io | ~6.2.0 / 6.2.1 |
["lockfile","lockfile-yarn-pinning-~6.2.0"] | packages/ruleset-migrator/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | stoplightio | spectral | engine.io | ~6.2.0 / 6.2.1 |
["lockfile","lockfile-yarn-pinning-~6.2.0"] | packages/rulesets/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | stoplightio | spectral | engine.io | ~6.2.0 / 6.2.1 |
["lockfile","lockfile-yarn-pinning-~6.2.0"] | packages/runtime/package.json | SECURITY | Package is vulnerable to CVE GHSA-q9mw-68c2-j6m5 | |
github | stoplightio | spectral | json5 | ^2.2.1 / 2.2.1 |
["lockfile","lockfile-yarn-pinning-^2.2.1"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | stoplightio | spectral | json5 | ^2.2.1 / 2.2.1 |
["lockfile","lockfile-yarn-pinning-^2.2.1"] | packages/cli/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | stoplightio | spectral | json5 | ^2.2.1 / 2.2.1 |
["lockfile","lockfile-yarn-pinning-^2.2.1"] | packages/core/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | stoplightio | spectral | json5 | ^2.2.1 / 2.2.1 |
["lockfile","lockfile-yarn-pinning-^2.2.1"] | packages/formats/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | stoplightio | spectral | json5 | ^2.2.1 / 2.2.1 |
["lockfile","lockfile-yarn-pinning-^2.2.1"] | packages/formatters/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | stoplightio | spectral | json5 | ^2.2.1 / 2.2.1 |
["lockfile","lockfile-yarn-pinning-^2.2.1"] | packages/functions/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | stoplightio | spectral | json5 | ^2.2.1 / 2.2.1 |
["lockfile","lockfile-yarn-pinning-^2.2.1"] | packages/parsers/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | stoplightio | spectral | json5 | ^2.2.1 / 2.2.1 |
["lockfile","lockfile-yarn-pinning-^2.2.1"] | packages/ref-resolver/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | stoplightio | spectral | json5 | ^2.2.1 / 2.2.1 |
["lockfile","lockfile-yarn-pinning-^2.2.1"] | packages/ruleset-bundler/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | stoplightio | spectral | json5 | ^2.2.1 / 2.2.1 |
["lockfile","lockfile-yarn-pinning-^2.2.1"] | packages/ruleset-migrator/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | stoplightio | spectral | json5 | ^2.2.1 / 2.2.1 |
["lockfile","lockfile-yarn-pinning-^2.2.1"] | packages/rulesets/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | stoplightio | spectral | json5 | ^2.2.1 / 2.2.1 |
["lockfile","lockfile-yarn-pinning-^2.2.1"] | packages/runtime/package.json | SECURITY | Package is vulnerable to CVE GHSA-9c47-m6qq-7p4h | |
github | stoplightio | spectral | qs | 6.7.0 / 6.7.0 |
["lockfile","lockfile-yarn-pinning-6.7.0"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | stoplightio | spectral | qs | 6.7.0 / 6.7.0 |
["lockfile","lockfile-yarn-pinning-6.7.0"] | packages/cli/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | stoplightio | spectral | qs | 6.7.0 / 6.7.0 |
["lockfile","lockfile-yarn-pinning-6.7.0"] | packages/core/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | stoplightio | spectral | qs | 6.7.0 / 6.7.0 |
["lockfile","lockfile-yarn-pinning-6.7.0"] | packages/formats/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | stoplightio | spectral | qs | 6.7.0 / 6.7.0 |
["lockfile","lockfile-yarn-pinning-6.7.0"] | packages/formatters/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | stoplightio | spectral | qs | 6.7.0 / 6.7.0 |
["lockfile","lockfile-yarn-pinning-6.7.0"] | packages/functions/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | stoplightio | spectral | qs | 6.7.0 / 6.7.0 |
["lockfile","lockfile-yarn-pinning-6.7.0"] | packages/parsers/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | stoplightio | spectral | qs | 6.7.0 / 6.7.0 |
["lockfile","lockfile-yarn-pinning-6.7.0"] | packages/ref-resolver/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | stoplightio | spectral | qs | 6.7.0 / 6.7.0 |
["lockfile","lockfile-yarn-pinning-6.7.0"] | packages/ruleset-bundler/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | stoplightio | spectral | qs | 6.7.0 / 6.7.0 |
["lockfile","lockfile-yarn-pinning-6.7.0"] | packages/ruleset-migrator/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | stoplightio | spectral | qs | 6.7.0 / 6.7.0 |
["lockfile","lockfile-yarn-pinning-6.7.0"] | packages/rulesets/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | stoplightio | spectral | qs | 6.7.0 / 6.7.0 |
["lockfile","lockfile-yarn-pinning-6.7.0"] | packages/runtime/package.json | SECURITY | Package is vulnerable to CVE GHSA-hrpp-h998-j3pp | |
github | stoplightio | spectral | semver | 7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-7.0.0"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-7.0.0"] | packages/cli/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-7.0.0"] | packages/core/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-7.0.0"] | packages/formats/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-7.0.0"] | packages/formatters/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-7.0.0"] | packages/functions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-7.0.0"] | packages/parsers/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-7.0.0"] | packages/ref-resolver/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-7.0.0"] | packages/ruleset-bundler/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-7.0.0"] | packages/ruleset-migrator/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-7.0.0"] | packages/rulesets/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.0.0 / 7.0.0 |
["lockfile","lockfile-yarn-pinning-7.0.0"] | packages/runtime/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.3.5 / 7.3.5 |
["lockfile","lockfile-yarn-pinning-7.3.5"] | package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.3.5 / 7.3.5 |
["lockfile","lockfile-yarn-pinning-7.3.5"] | packages/cli/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.3.5 / 7.3.5 |
["lockfile","lockfile-yarn-pinning-7.3.5"] | packages/core/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.3.5 / 7.3.5 |
["lockfile","lockfile-yarn-pinning-7.3.5"] | packages/formats/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.3.5 / 7.3.5 |
["lockfile","lockfile-yarn-pinning-7.3.5"] | packages/formatters/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.3.5 / 7.3.5 |
["lockfile","lockfile-yarn-pinning-7.3.5"] | packages/functions/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.3.5 / 7.3.5 |
["lockfile","lockfile-yarn-pinning-7.3.5"] | packages/parsers/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.3.5 / 7.3.5 |
["lockfile","lockfile-yarn-pinning-7.3.5"] | packages/ref-resolver/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.3.5 / 7.3.5 |
["lockfile","lockfile-yarn-pinning-7.3.5"] | packages/ruleset-bundler/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.3.5 / 7.3.5 |
["lockfile","lockfile-yarn-pinning-7.3.5"] | packages/ruleset-migrator/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.3.5 / 7.3.5 |
["lockfile","lockfile-yarn-pinning-7.3.5"] | packages/rulesets/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qqgw | |
github | stoplightio | spectral | semver | 7.3.5 / 7.3.5 |
["lockfile","lockfile-yarn-pinning-7.3.5"] | packages/runtime/package.json | SECURITY | Package is vulnerable to CVE GHSA-c2qf-rxjj-qq |