You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description: A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity.
Description: This affects the package com.fasterxml.jackson.dataformat:jackson-dataformat-cbor from 0 and before 2.11.4, from 2.12.0-rc1 and before 2.12.1. Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception.
Description: Versions <1.13 of this package are vulnerable to Information Exposure. When there is no byte array value that can be encoded into a string, the Base32 implementation does not reject it, and instead decodes it into an arbitrary value which can be re-encoded again using the same implementation. This allows for information exposure exploits such as tunneling additional information via seemingly valid base 32 strings.
Severity: low
Status: fixed in 1.13
Package Name: commons-codec_commons-codec
Should try and attempt to use the fixed versions of these jars even if the vulnerable code paths are not used in the product to assure consumers the product is vulnerability free.
The text was updated successfully, but these errors were encountered:
Can you pls share the relevant findings for twistlock? And what version of tt are you using? Are the findings against 1.1.4 version of the jar? IBM-SDK version / with dependencies etc..?
Several dependencies used by this project have logged security vulnerabilities:
Should try and attempt to use the fixed versions of these jars even if the vulnerable code paths are not used in the product to assure consumers the product is vulnerability free.
The text was updated successfully, but these errors were encountered: