Find out if you have vulnerabilities that put you at risk

Test your applications
Toggle filtering controls
Expand this section

APPLICATION

Expand this section

OPERATING SYSTEM

Report a new vulnerability
VULNERABILITY AFFECTS TYPE PUBLISHED
  • C
CVE-2020-1938
spark-3.5.0-compat <3.5.0-r2 chainguard:latest 15 Nov 2023
  • M
CVE-2020-1938
javassist <0:3.18.1-8.module+el8.3.0+74+855e3f5d rocky:8 3 Feb 2023
  • M
CVE-2020-1938
jakarta-commons-httpclient <1:3.1-28.module+el8.3.0+74+855e3f5d rocky:8 3 Feb 2023
  • M
CVE-2020-1938
jackson-module-jaxb-annotations <0:2.7.6-4.module+el8.3.0+53+ea062990 rocky:8 3 Feb 2023
  • M
CVE-2020-1938
jackson-jaxrs-providers <0:2.9.9-1.module+el8.3.0+53+ea062990 rocky:8 3 Feb 2023
  • M
CVE-2020-1938
jackson-jaxrs-json-provider <0:2.9.9-1.module+el8.3.0+53+ea062990 rocky:8 3 Feb 2023
  • M
CVE-2020-1938
jackson-databind <0:2.10.0-1.module+el8.3.0+53+ea062990 rocky:8 3 Feb 2023
  • M
CVE-2020-1938
jackson-core <0:2.10.0-1.module+el8.3.0+53+ea062990 rocky:8 3 Feb 2023
  • M
CVE-2020-1938
jackson-annotations <0:2.10.0-1.module+el8.3.0+53+ea062990 rocky:8 3 Feb 2023
  • M
CVE-2020-1938
glassfish-jaxb <0:2.2.11-11.module+el8.3.0+53+ea062990 rocky:8 3 Feb 2023
  • M
CVE-2020-1938
glassfish-jaxb-runtime <0:2.2.11-11.module+el8.3.0+53+ea062990 rocky:8 3 Feb 2023
  • M
CVE-2020-1938
glassfish-fastinfoset <0:1.2.13-9.module+el8.3.0+53+ea062990 rocky:8 3 Feb 2023
  • M
CVE-2020-1938
glassfish-jaxb-txw2 <0:2.2.11-11.module+el8.3.0+53+ea062990 rocky:8 3 Feb 2023
  • M
CVE-2020-1938
pki-servlet-engine <1:9.0.30-1.module+el8.3.0+53+ea062990 rocky:8 3 Feb 2023
  • M
CVE-2020-1938
ldapjdk-javadoc <0:4.22.0-1.module+el8.4.0+418+b7ae1d4a rocky:8 3 Feb 2023
  • M
CVE-2020-1938
ldapjdk <0:4.22.0-1.module+el8.4.0+418+b7ae1d4a rocky:8 3 Feb 2023
  • M
CVE-2020-1938
javassist-javadoc <0:3.18.1-8.module+el8.3.0+74+855e3f5d rocky:8 3 Feb 2023
  • M
CVE-2020-1938
xmlstreambuffer <0:1.5.4-8.module+el8.3.0+53+ea062990 rocky:8 3 Feb 2023
  • M
CVE-2020-1938
relaxngDatatype <0:2011.1-7.module+el8.3.0+53+ea062990 rocky:8 3 Feb 2023
  • M
CVE-2020-1938
python-nss-doc <0:1.0.1-10.module+el8.3.0+53+ea062990 rocky:8 3 Feb 2023
  • M
CVE-2020-1938
python-nss-debugsource <0:1.0.1-10.module+el8.3.0+53+ea062990 rocky:8 3 Feb 2023
  • M
CVE-2020-1938
python-nss <0:1.0.1-10.module+el8.3.0+53+ea062990 rocky:8 3 Feb 2023
  • M
CVE-2020-1938
glassfish-jaxb-core <0:2.2.11-11.module+el8.3.0+53+ea062990 rocky:8 3 Feb 2023
  • M
CVE-2020-1938
glassfish-jaxb-api <0:2.2.12-8.module+el8.3.0+53+ea062990 rocky:8 3 Feb 2023
  • M
CVE-2020-1938
bea-stax-api <0:1.2.0-16.module+el8.3.0+53+ea062990 rocky:8 3 Feb 2023
  • M
CVE-2020-1938
bea-stax <0:1.2.0-16.module+el8.3.0+53+ea062990 rocky:8 3 Feb 2023
  • M
CVE-2020-1938
apache-commons-net <0:3.6-3.module+el8.3.0+74+855e3f5d rocky:8 3 Feb 2023
  • M
CVE-2020-1938
apache-commons-lang <0:2.6-21.module+el8.3.0+74+855e3f5d rocky:8 3 Feb 2023
  • M
CVE-2020-1938
apache-commons-collections <0:3.2.2-10.module+el8.3.0+74+855e3f5d rocky:8 3 Feb 2023
  • M
CVE-2020-1938
resteasy <0:3.0.26-3.module+el8.3.0+53+ea062990 rocky:8 3 Feb 2023