Hi,
There is two security vulnerabilities present in netty-4.1.61.Final version present in readonlyrest-1.34.0_es7.10.0.zip.
Netty is vulnerable to excessive memory usage due to being unable to set size restrictions on decompressed data input. An attacker could exploit this by supplying crafted input in order to cause a denial-of-service (DoS).
Netty is susceptible to excessive memory usage due to missing chunk length restrictions and the potential buffering of reserved skippable chunks until the complete chunk has been received. An attacker could exploit this by supplying crafted input in order to cause a denial-of-service (DoS).
Please look into this.