castimaging/admin-center |
CVE-2024-47072 |
HIGH |
com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream |
3.2.0-funcrel |
castimaging/admin-center |
CVE-2019-17495 |
CRITICAL |
Cross-site scripting in Swagger-UI |
3.2.0-funcrel |
castimaging/admin-center |
CVE-2024-12797 |
HIGH |
openssl: RFC7250 handshakes with unauthenticated servers don’t abort as expected |
3.2.0-funcrel |
castimaging/admin-center |
CVE-2024-7254 |
HIGH |
protobuf: StackOverflow vulnerability in Protocol Buffers |
3.2.0-funcrel |
castimaging/admin-center |
CVE-2024-56337 |
HIGH |
tomcat: Incomplete fix for |
3.2.0-funcrel |
castimaging/admin-center |
CVE-2025-24813 |
CRITICAL |
tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT |
3.2.0-funcrel |
castimaging/admin-center |
CVE-2024-50379 |
HIGH |
tomcat: RCE due to TOCTOU issue in JSP compilation |
3.2.0-funcrel |
castimaging/admin-center |
CVE-2025-24970 |
HIGH |
Upgrade io.netty:netty-handler to version 4.1.118.Final |
3.1.1-funcrel |
castimaging/admin-center |
CVE-2016-1000027 |
CRITICAL |
Upgrade org.springframework:spring-web to version 6.0.0 |
3.1.1-funcrel |
castimaging/admin-center |
CVE-2024-38816 |
HIGH |
Upgrade org.springframework:spring-webflux to version 6.1.13; Upgrade org.springframework:spring-webmvc to version 6.1.13 |
3.1.1-funcrel |
castimaging/admin-center |
CVE-2024-38819 |
HIGH |
Upgrade org.springframework:spring-webflux to version 6.1.14; Upgrade org.springframework:spring-webmvc to version 6.1.14 |
3.1.1-funcrel |
castimaging/admin-center |
CVE-2022-1471 |
HIGH |
Upgrade org.yaml:snakeyaml to version 2.0 |
3.1.1-funcrel |
castimaging/ai-service |
CVE-2024-39689 |
HIGH |
Upgrade certifi to version 2024.07.04 |
3.1.1-funcrel |
castimaging/ai-service |
CVE-2024-1135 |
HIGH |
Upgrade gunicorn to version 22.0.0 |
3.1.1-funcrel |
castimaging/ai-service |
CVE-2024-3651 |
HIGH |
Upgrade idna to version 3.7 |
3.1.1-funcrel |
castimaging/ai-service |
CVE-2024-6345 |
HIGH |
Upgrade setuptools to version 70.0.0 |
3.1.1-funcrel |
castimaging/ai-service |
CVE-2023-6730 |
CRITICAL |
Upgrade transformers to version 4.36.0 |
3.1.1-funcrel |
castimaging/ai-service |
CVE-2023-7018 |
HIGH |
Upgrade transformers to version 4.36.0 |
3.1.1-funcrel |
castimaging/ai-service |
CVE-2024-49768 |
HIGH |
Upgrade waitress to version 3.0.1 |
3.1.1-funcrel |
castimaging/ai-service |
CVE-2024-49769 |
HIGH |
Upgrade waitress to version 3.0.1 |
3.1.1-funcrel |
castimaging/analysis-node |
CVE-2024-47175 |
HIGH |
cups: libppd: remote command injection via attacker controlled data in PPD file |
3.2.0-funcrel |
castimaging/analysis-node |
CVE-2025-21172 |
HIGH |
dotnet: .NET and Visual Studio Remote Code Execution Vulnerability |
3.2.0-funcrel |
castimaging/analysis-node |
CVE-2025-21173 |
HIGH |
dotnet: .NET Elevation of Privilege Vulnerability |
3.2.0-funcrel |
castimaging/analysis-node |
CVE-2025-21176 |
HIGH |
dotnet: .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability |
3.2.0-funcrel |
castimaging/analysis-node |
CVE-2024-2961 |
HIGH |
glibc: Out of bounds write in iconv may lead to remote code execution |
3.2.0-funcrel |
castimaging/analysis-node |
CVE-2024-10963 |
HIGH |
pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass |
3.2.0-funcrel |
castimaging/analysis-node |
CVE-2024-10041 |
HIGH |
pam: libpam: Libpam vulnerable to read hashed password |
3.2.0-funcrel |
castimaging/analysis-node |
CVE-2024-12085 |
HIGH |
rsync: Info Leak via Uninitialized Stack Contents |
3.2.0-funcrel |
castimaging/analysis-node |
CVE-2024-8508 |
HIGH |
unbound: Unbounded name compression could lead to Denial of Service |
3.2.0-funcrel |
castimaging/analysis-node |
CVE-2024-1488 |
HIGH |
unbound: unrestricted reconfiguration enabled to anyone that may lead to local privilege escalation |
3.2.0-funcrel |
castimaging/analysis-node |
CVE-2025-21171 |
HIGH |
dotnet: .NET Remote Code Execution Vulnerability |
3.2.0-funcrel |
castimaging/analysis-node |
CVE-2024-7254 |
HIGH |
Upgrade com.google.protobuf:protobuf-java to version 3.25.5, 4.27.5, 4.28.2 |
3.1.1-funcrel |
castimaging/analysis-node |
CVE-2023-24998 |
HIGH |
Upgrade commons-fileupload:commons-fileupload to version 1.5 |
3.1.1-funcrel |
castimaging/analysis-node |
CVE-2024-47554 |
HIGH |
Upgrade commons-io:commons-io to version 2.14.0 |
3.1.1-funcrel |
castimaging/analysis-node |
CVE-2012-6153 |
HIGH |
Upgrade org.apache.httpcomponents:httpclient to version 4.2.3 |
3.1.1-funcrel |
castimaging/analysis-node |
CVE-2022-41404 |
HIGH |
Upgrade org.ini4j:ini4j to version 0.5.4 |
3.1.1-funcrel |
castimaging/analysis-node |
CVE-2024-1597 |
HIGH |
Upgrade org.postgresql:postgresql to version 42.2.28, 42.3.9, 42.4.4, 42.5.5, 42.6.1, 42.7.2 |
3.1.1-funcrel |
castimaging/analysis-node |
CVE-2024-4340 |
HIGH |
Upgrade sqlparse to version 0.5.0 |
3.1.1-funcrel |
castimaging/auth-service |
CVE-2024-47554 |
HIGH |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader |
3.2.0-funcrel |
castimaging/auth-service |
CVE-2024-47072 |
HIGH |
com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream |
3.2.0-funcrel |
castimaging/auth-service |
CVE-2024-12797 |
HIGH |
openssl: RFC7250 handshakes with unauthenticated servers don’t abort as expected |
3.2.0-funcrel |
castimaging/auth-service |
CVE-2024-38819 |
HIGH |
org.springframework:spring-webmvc: Path traversal vulnerability in functional web frameworks |
3.2.0-funcrel |
castimaging/auth-service |
CVE-2024-38821 |
CRITICAL |
Spring-WebFlux: Authorization Bypass of Static Resources in WebFlux Applications |
3.2.0-funcrel |
castimaging/auth-service |
CVE-2024-38816 |
HIGH |
spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource |
3.2.0-funcrel |
castimaging/auth-service |
CVE-2025-24970 |
HIGH |
Upgrade io.netty:netty-handler to version 4.1.118.Final |
3.1.1-funcrel |
castimaging/auth-service |
CVE-2024-57699 |
HIGH |
Upgrade net.minidev:json-smart to version 2.5.2 |
3.1.1-funcrel |
castimaging/console |
CVE-2024-47072 |
HIGH |
com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream |
3.1.1-funcrel |
castimaging/console |
CVE-2024-12797 |
HIGH |
Upgrade libcrypto3 to version 3.3.3-r0; Upgrade libssl3 to version 3.3.3-r0; Upgrade openssl to version 3.3.3-r0 |
3.1.1-funcrel |
castimaging/etl-service |
CVE-2021-43565 |
HIGH |
Upgrade golang.org/x/crypto to version 0.0.0-20211202192323-5770296d904e |
3.1.1-funcrel |
castimaging/etl-service |
CVE-2022-27191 |
HIGH |
Upgrade golang.org/x/crypto to version 0.0.0-20220314234659-1baeb1ce4c0b |
3.1.1-funcrel |
castimaging/etl-service |
CVE-2024-45337 |
HIGH |
Upgrade golang.org/x/crypto to version 0.31.0 |
3.1.1-funcrel |
castimaging/etl-service |
CVE-2022-29526 |
HIGH |
Upgrade golang.org/x/sys to version 0.0.0-20220412211240-33da011f77ad |
3.1.1-funcrel |
castimaging/etl-service |
CVE-2023-29403 |
CRITICAL |
Upgrade stdlib to version 1.19.10, 1.20.5 |
3.1.1-funcrel |
castimaging/etl-service |
CVE-2023-29406 |
HIGH |
Upgrade stdlib to version 1.19.11, 1.20.6 |
3.1.1-funcrel |
castimaging/etl-service |
CVE-2023-29409 |
HIGH |
Upgrade stdlib to version 1.19.12, 1.20.7, 1.21.0-rc.4 |
3.1.1-funcrel |
castimaging/etl-service |
CVE-2023-39325 |
HIGH |
Upgrade stdlib to version 1.20.10, 1.21.3 |
3.1.1-funcrel |
castimaging/etl-service |
CVE-2023-45283 |
HIGH |
Upgrade stdlib to version 1.20.11, 1.21.4, 1.20.12, 1.21.5 |
3.1.1-funcrel |
castimaging/etl-service |
CVE-2024-24790 |
CRITICAL |
Upgrade stdlib to version 1.21.11, 1.22.4 |
3.1.1-funcrel |
castimaging/etl-service |
CVE-2024-24791 |
HIGH |
Upgrade stdlib to version 1.21.12, 1.22.5 |
3.1.1-funcrel |
castimaging/etl-service |
CVE-2023-45289 |
HIGH |
Upgrade stdlib to version 1.21.8, 1.22.1 |
3.1.1-funcrel |
castimaging/etl-service |
CVE-2023-45290 |
HIGH |
Upgrade stdlib to version 1.21.8, 1.22.1 |
3.1.1-funcrel |
castimaging/etl-service |
CVE-2024-24783 |
HIGH |
Upgrade stdlib to version 1.21.8, 1.22.1 |
3.1.1-funcrel |
castimaging/etl-service |
CVE-2024-24784 |
HIGH |
Upgrade stdlib to version 1.21.8, 1.22.1 |
3.1.1-funcrel |
castimaging/etl-service |
CVE-2024-24785 |
HIGH |
Upgrade stdlib to version 1.21.8, 1.22.1 |
3.1.1-funcrel |
castimaging/etl-service |
CVE-2023-45288 |
HIGH |
Upgrade stdlib to version 1.21.9, 1.22.2 |
3.1.1-funcrel |
castimaging/etl-service |
CVE-2025-22866 |
HIGH |
Upgrade stdlib to version 1.22.12, 1.23.6, 1.24.0-rc.3 |
3.1.1-funcrel |
castimaging/etl-service |
CVE-2024-34155 |
HIGH |
Upgrade stdlib to version 1.22.7, 1.23.1 |
3.1.1-funcrel |
castimaging/etl-service |
CVE-2024-34156 |
HIGH |
Upgrade stdlib to version 1.22.7, 1.23.1 |
3.1.1-funcrel |
castimaging/etl-service |
CVE-2024-34158 |
HIGH |
Upgrade stdlib to version 1.22.7, 1.23.1 |
3.1.1-funcrel |
castimaging/gateway |
CVE-2024-47072 |
HIGH |
com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream |
3.2.0-funcrel |
castimaging/gateway |
CVE-2024-47072 |
HIGH |
com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream |
3.2.0-funcrel |
castimaging/gateway |
CVE-2024-38819 |
HIGH |
org.springframework:spring-webmvc: Path traversal vulnerability in functional web frameworks |
3.2.0-funcrel |
castimaging/gateway |
CVE-2024-38819 |
HIGH |
org.springframework:spring-webmvc: Path traversal vulnerability in functional web frameworks |
3.2.0-funcrel |
castimaging/gateway |
CVE-2024-7254 |
HIGH |
protobuf: StackOverflow vulnerability in Protocol Buffers |
3.2.0-funcrel |
castimaging/gateway |
CVE-2024-38816 |
HIGH |
spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource |
3.2.0-funcrel |
castimaging/gateway |
CVE-2024-38816 |
HIGH |
spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource |
3.2.0-funcrel |
castimaging/gateway |
CVE-2024-56337 |
HIGH |
tomcat: Incomplete fix for |
3.2.0-funcrel |
castimaging/gateway |
CVE-2024-50379 |
HIGH |
tomcat: RCE due to TOCTOU issue in JSP compilation |
3.2.0-funcrel |
castimaging/gateway |
CVE-2025-24813 |
HIGH |
tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT |
3.2.0-funcrel |
castimaging/gateway |
CVE-2025-24970 |
HIGH |
Upgrade io.netty:netty-handler to version 4.1.118.Final |
3.1.1-funcrel |
castimaging/gateway |
CVE-2025-24970 |
HIGH |
Upgrade io.netty:netty-handler to version 4.1.118.Final |
3.1.1-funcrel |
castimaging/gateway |
CVE-2024-12797 |
HIGH |
Upgrade libcrypto3 to version 3.3.3-r0; Upgrade libssl3 to version 3.3.3-r0; Upgrade openssl to version 3.3.3-r0 |
3.1.1-funcrel |
castimaging/gateway |
CVE-2024-12797 |
HIGH |
Upgrade libcrypto3 to version 3.3.3-r0; Upgrade libssl3 to version 3.3.3-r0; Upgrade openssl to version 3.3.3-r0 |
3.1.1-funcrel |
castimaging/sso-service |
CVE-2024-7341 |
HIGH |
wildfly-elytron: org.keycloak/keycloak-services: session fixation in elytron saml adapters |
3.2.0-funcrel |
castimaging/sso-service |
CVE-2024-8698 |
HIGH |
keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak |
3.2.0-funcrel |
castimaging/viewer |
CVE-2024-45337 |
HIGH |
Upgrade golang.org/x/crypto to version 0.31.0 |
3.1.1-funcrel |
castimaging/viewer |
CVE-2024-45337 |
HIGH |
Upgrade golang.org/x/crypto to version 0.31.0 |
3.1.1-funcrel |
castimaging/viewer |
CVE-2024-45338 |
HIGH |
Upgrade golang.org/x/net to version 0.33.0 |
3.1.1-funcrel |
castimaging/viewer |
CVE-2024-24791 |
HIGH |
Upgrade stdlib to version 1.21.12, 1.22.5 |
3.1.1-funcrel |
castimaging/viewer |
CVE-2025-22866 |
HIGH |
Upgrade stdlib to version 1.22.12, 1.23.6, 1.24.0-rc.3 |
3.1.1-funcrel |
castimaging/viewer |
CVE-2024-34155 |
HIGH |
Upgrade stdlib to version 1.22.7, 1.23.1 |
3.1.1-funcrel |
castimaging/viewer |
CVE-2024-34156 |
HIGH |
Upgrade stdlib to version 1.22.7, 1.23.1 |
3.1.1-funcrel |
castimaging/viewer |
CVE-2024-34158 |
HIGH |
Upgrade stdlib to version 1.22.7, 1.23.1 |
3.1.1-funcrel |