Hi Amichai and Ofir, Thank-you for your known vulnerability analysis of vid (https://wiki.onap.org/pages/viewpage.action?pageId=28378623).
For the vulnerabilities for where there is no fix, do you have an analysis of how VID uses the imported code so that the implications of the risk can be evaluated? For example for the Jackson mapper, see: https://wiki.onap.org/pages/viewpage.action?pageId=25439016 Best Regards, Steve [Ericsson]<http://www.ericsson.com/> STEPHEN TERRILL Technology Specialist POA Architecture and Solutions Business Unit Digital Services Ericsson Ericsson R&D Center, via de los Poblados 13 28033, Madrid, Spain Phone +34 339 3005 Mobile +34 609 168 515 [email protected] www.ericsson.com [http://www.ericsson.com/current_campaign]<http://www.ericsson.com/current_campaign> Legal entity: Ericsson EspaƱa S.A, compay registration number ESA288568603. This Communication is Confidential. We only send and receive email on the basis of the terms set out at www.ericsson.com/email_disclaimer<http://www.ericsson.com/email_disclaimer>
_______________________________________________ ONAP-TSC mailing list [email protected] https://lists.onap.org/mailman/listinfo/onap-tsc
