admin-center |
CVE-2025-24970 |
HIGH |
io.netty:netty-handler: SslHandler doesn’t correctly validate packets which can lead to native crash when using native SSLEngine |
3.2.0-funcrel |
admin-center |
CVE-2019-17495 |
CRITICAL |
Cross-site scripting in Swagger-UI |
3.2.0-funcrel |
admin-center |
CVE-2024-41909 |
HIGH |
mina-sshd: integrity check bypass vulnerability |
3.2.0-funcrel |
admin-center |
CVE-2025-24813 |
CRITICAL |
tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT |
3.2.0-funcrel |
admin-center |
CVE-2025-22228 |
HIGH |
spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length |
3.2.0-funcrel |
admin-center |
CVE-2016-1000027 |
CRITICAL |
spring: HttpInvokerServiceExporter readRemoteInvocation method untrusted java deserialization |
3.2.0-funcrel |
admin-center |
CVE-2024-38816 |
HIGH |
spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource |
3.2.0-funcrel |
admin-center |
CVE-2024-38819 |
HIGH |
org.springframework:spring-webmvc: Path traversal vulnerability in functional web frameworks |
3.2.0-funcrel |
admin-center |
CVE-2024-38816 |
HIGH |
spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource |
3.2.0-funcrel |
admin-center |
CVE-2024-38819 |
HIGH |
org.springframework:spring-webmvc: Path traversal vulnerability in functional web frameworks |
3.2.0-funcrel |
admin-center |
CVE-2022-1471 |
HIGH |
SnakeYaml: Constructor Deserialization Remote Code Execution |
3.2.0-funcrel |
analysis-node |
CVE-2024-7254 |
HIGH |
protobuf: StackOverflow vulnerability in Protocol Buffers |
3.2.0-funcrel |
analysis-node |
CVE-2024-47554 |
HIGH |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader |
3.2.0-funcrel |
analysis-node |
CVE-2024-57699 |
HIGH |
json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370) |
3.2.0-funcrel |
analysis-node |
CVE-2025-24813 |
CRITICAL |
tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT |
3.2.0-funcrel |
analysis-node |
CVE-2022-41404 |
HIGH |
org.ini4j: unspecified DoS |
3.2.0-funcrel |
analysis-node |
CVE-2024-38807 |
HIGH |
Applications that use spring-boot-loaderor spring-boot-loader-classica … |
3.2.0-funcrel |
analysis-node |
CVE-2025-22228 |
HIGH |
spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length |
3.2.0-funcrel |
analysis-node |
CVE-2016-1000027 |
CRITICAL |
spring: HttpInvokerServiceExporter readRemoteInvocation method untrusted java deserialization |
3.2.0-funcrel |
analysis-node |
CVE-2024-38816 |
HIGH |
spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource |
3.2.0-funcrel |
analysis-node |
CVE-2024-38819 |
HIGH |
org.springframework:spring-webmvc: Path traversal vulnerability in functional web frameworks |
3.2.0-funcrel |
analysis-node |
CVE-2022-1471 |
HIGH |
SnakeYaml: Constructor Deserialization Remote Code Execution |
3.2.0-funcrel |
analysis-node |
CVE-2022-1471 |
HIGH |
SnakeYaml: Constructor Deserialization Remote Code Execution |
3.2.0-funcrel |
auth-service |
CVE-2025-24970 |
HIGH |
io.netty:netty-handler: SslHandler doesn’t correctly validate packets which can lead to native crash when using native SSLEngine |
3.2.0-funcrel |
auth-service |
CVE-2024-57699 |
HIGH |
json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370) |
3.2.0-funcrel |
auth-service |
CVE-2024-10039 |
HIGH |
keycloak-core: mTLS passthrough |
3.2.0-funcrel |
auth-service |
CVE-2025-22228 |
HIGH |
spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length |
3.2.0-funcrel |
console |
CVE-2025-24970 |
HIGH |
io.netty:netty-handler: SslHandler doesn’t correctly validate packets which can lead to native crash when using native SSLEngine |
3.2.0-funcrel |
console |
CVE-2025-22228 |
HIGH |
spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length |
3.2.0-funcrel |
console |
CVE-2016-1000027 |
CRITICAL |
spring: HttpInvokerServiceExporter readRemoteInvocation method untrusted java deserialization |
3.2.0-funcrel |
console |
CVE-2024-38816 |
HIGH |
spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource |
3.2.0-funcrel |
console |
CVE-2024-38819 |
HIGH |
org.springframework:spring-webmvc: Path traversal vulnerability in functional web frameworks |
3.2.0-funcrel |
console |
CVE-2024-38816 |
HIGH |
spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource |
3.2.0-funcrel |
console |
CVE-2024-38819 |
HIGH |
org.springframework:spring-webmvc: Path traversal vulnerability in functional web frameworks |
3.2.0-funcrel |
console |
CVE-2022-1471 |
HIGH |
SnakeYaml: Constructor Deserialization Remote Code Execution |
3.2.0-funcrel |
gateway |
CVE-2025-24970 |
HIGH |
io.netty:netty-handler: SslHandler doesn’t correctly validate packets which can lead to native crash when using native SSLEngine |
3.2.0-funcrel |
gateway |
CVE-2025-24813 |
CRITICAL |
tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT |
3.2.0-funcrel |
gateway |
CVE-2025-22228 |
HIGH |
spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length |
3.2.0-funcrel |
sso-service |
CVE-2025-24970 |
HIGH |
io.netty:netty-handler: SslHandler doesn’t correctly validate packets which can lead to native crash when using native SSLEngine |
3.2.0-funcrel |
sso-service |
CVE-2024-12397 |
HIGH |
io.quarkus.http/quarkus-http-core: Quarkus HTTP Cookie Smuggling |
3.2.0-funcrel |
sso-service |
CVE-2024-10039 |
HIGH |
keycloak-core: mTLS passthrough |
3.2.0-funcrel |
sso-service |
CVE-2024-10451 |
HIGH |
org.keycloak:keycloak-quarkus-server: Sensitive Data Exposure in Keycloak Build Process |
3.2.0-funcrel |
sso-service |
CVE-2024-10270 |
HIGH |
org.keycloak:keycloak-services: Keycloak Denial of Service |
3.2.0-funcrel |
dashboards |
CVE-2020-36518 |
HIGH |
jackson-databind: denial of service via a large depth of nested objects |
3.2.0-funcrel |
dashboards |
CVE-2021-46877 |
HIGH |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode |
3.2.0-funcrel |
dashboards |
CVE-2022-42003 |
HIGH |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS |
3.2.0-funcrel |
dashboards |
CVE-2022-42004 |
HIGH |
jackson-databind: use of deeply nested arrays |
3.2.0-funcrel |
dashboards |
CVE-2021-22569 |
HIGH |
protobuf-java: potential DoS in the parsing procedure for binary data |
3.2.0-funcrel |
dashboards |
CVE-2021-22570 |
HIGH |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference |
3.2.0-funcrel |
dashboards |
CVE-2022-3509 |
HIGH |
protobuf-java: Textformat parsing issue leads to DoS |
3.2.0-funcrel |
dashboards |
CVE-2022-3510 |
HIGH |
protobuf-java: Message-Type Extensions parsing issue leads to DoS |
3.2.0-funcrel |
dashboards |
CVE-2024-7254 |
HIGH |
protobuf: StackOverflow vulnerability in Protocol Buffers |
3.2.0-funcrel |
dashboards |
CVE-2024-47554 |
HIGH |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader |
3.2.0-funcrel |
dashboards |
CVE-2021-35515 |
HIGH |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive |
3.2.0-funcrel |
dashboards |
CVE-2021-35516 |
HIGH |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive |
3.2.0-funcrel |
dashboards |
CVE-2021-35517 |
HIGH |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive |
3.2.0-funcrel |
dashboards |
CVE-2021-36090 |
HIGH |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive |
3.2.0-funcrel |
dashboards |
CVE-2022-45688 |
HIGH |
json stack overflow vulnerability |
3.2.0-funcrel |
dashboards |
CVE-2023-5072 |
HIGH |
JSON-java: parser confusion leads to OOM |
3.2.0-funcrel |
dashboards |
CVE-2022-1471 |
HIGH |
SnakeYaml: Constructor Deserialization Remote Code Execution |
3.2.0-funcrel |
dashboards |
CVE-2022-25857 |
HIGH |
snakeyaml: Denial of Service due to missing nested depth limitation for collections |
3.2.0-funcrel |
imaging-service |
CVE-2024-24790 |
CRITICAL |
golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses |
3.2.0-funcrel |
imaging-service |
CVE-2023-29403 |
HIGH |
golang: runtime: unexpected behavior of setuid/setgid binaries |
3.2.0-funcrel |
imaging-service |
CVE-2023-39325 |
HIGH |
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) |
3.2.0-funcrel |
imaging-service |
CVE-2023-45283 |
HIGH |
The filepath package does not recognize paths with a ??\ prefix as sp … |
3.2.0-funcrel |
imaging-service |
CVE-2023-45288 |
HIGH |
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS |
3.2.0-funcrel |
imaging-service |
CVE-2024-34156 |
HIGH |
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion |
3.2.0-funcrel |
imaging-service |
CVE-2024-45337 |
CRITICAL |
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto |
3.2.0-funcrel |
imaging-service |
CVE-2025-22869 |
HIGH |
golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh |
3.2.0-funcrel |
imaging-service |
CVE-2024-34156 |
HIGH |
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion |
3.2.0-funcrel |
imaging-service |
CVE-2024-45337 |
CRITICAL |
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto |
3.2.0-funcrel |
imaging-service |
CVE-2025-22869 |
HIGH |
golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh |
3.2.0-funcrel |
imaging-service |
CVE-2024-34156 |
HIGH |
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion |
3.2.0-funcrel |
neo4j |
CVE-2024-7254 |
HIGH |
protobuf: StackOverflow vulnerability in Protocol Buffers |
3.2.0-funcrel |
neo4j |
CVE-2025-24970 |
HIGH |
io.netty:netty-handler: SslHandler doesn’t correctly validate packets which can lead to native crash when using native SSLEngine |
3.2.0-funcrel |
neo4j |
CVE-2024-57699 |
HIGH |
json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370) |
3.2.0-funcrel |
neo4j |
CVE-2024-57699 |
HIGH |
json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370) |
3.2.0-funcrel |
neo4j |
CVE-2024-57699 |
HIGH |
json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370) |
3.2.0-funcrel |
neo4j |
CVE-2024-57699 |
HIGH |
json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370) |
3.2.0-funcrel |
open-ai-services |
CVE-2024-34069 |
HIGH |
python-werkzeug: user may execute code on a developer’s machine |
3.2.0-funcrel |