Best regards,
The content of this email is confidential and intended for the recipient specified in message only. It is strictly prohibited to share any part of this message with any third party, without a written consent of the sender. If you received this message by mistake, please reply to this message and follow with its deletion, so that we can ensure such a mistake does not occur in the future.
--
You received this message because you are subscribed to the Google Groups "jackson-user" group.
To unsubscribe from this group and stop receiving emails from it, send an email to jackson-user...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/jackson-user/2fb7c750-4f62-4154-a753-808e79c64a7an%40googlegroups.com.
Hello,Sorry if I wasn't clear, let me just enumerate some assumptions, if any of this is not true, please let me know and we can clarify if needed:* You know what NVD from NIST identifies the CVEs of public components;* You know that jackson-databind vulnerabilities are identified on NVD;* You know that vulnerability scan tools (such as Synopsys Blackduck or Snyk) rely on NVD as Source of Truth.When I first contacted you, the vulnerabilities identified by NVD were not complete correct. There were a lot of CVEs that you already have fixed on jackson-databind:2.6.7.4.I also contacted NIST about this issue and they already update their database. Now, they only identify 4 CVEs check this link.I think that right know, you just need to validate that the remaining CVEs are accurr, and if not, contact them too with further information.
Why this is important?Companies rely on Vulnerability scan tools, and those tools rely on this NVD database. It's essential for your project that this information is up to date, in order to give the exact information for risk assessment analysis and, since the CVEs are wrongly reported, you want that info to be shared and show that your product is safe.Right now, there is a tool (Blackduck) that reports jackson-databind:2.6.7.4 to have 50+ CVEs, which is not true.I think that I don't have more information to give. Please use this as your will, if you have more doubts please let me know.
To view this discussion on the web visit https://groups.google.com/d/msgid/jackson-user/8b7f72f1-f458-41ce-8602-14c5d6241a94n%40googlegroups.com.
On Tue, Feb 23, 2021 at 3:22 AM Mario Arzileiro <mario.a...@feedzai.com> wrote:Hello,Sorry if I wasn't clear, let me just enumerate some assumptions, if any of this is not true, please let me know and we can clarify if needed:* You know what NVD from NIST identifies the CVEs of public components;* You know that jackson-databind vulnerabilities are identified on NVD;* You know that vulnerability scan tools (such as Synopsys Blackduck or Snyk) rely on NVD as Source of Truth.When I first contacted you, the vulnerabilities identified by NVD were not complete correct. There were a lot of CVEs that you already have fixed on jackson-databind:2.6.7.4.I also contacted NIST about this issue and they already update their database. Now, they only identify 4 CVEs check this link.I think that right know, you just need to validate that the remaining CVEs are accurr, and if not, contact them too with further information.I think that at this point if you want this information, you will go and do that.I do not recall you paying my salary, or being a customer of any sort.Why this is important?Companies rely on Vulnerability scan tools, and those tools rely on this NVD database. It's essential for your project that this information is up to date, in order to give the exact information for risk assessment analysis and, since the CVEs are wrongly reported, you want that info to be shared and show that your product is safe.Right now, there is a tool (Blackduck) that reports jackson-databind:2.6.7.4 to have 50+ CVEs, which is not true.I think that I don't have more information to give. Please use this as your will, if you have more doubts please let me know.You are free to do whatever work you want, but it seems extremely arrogant to come here to demand I (or anyone else) do things you need. This is not far removed from "I got this homework for my CS class can you please write a solution for me", as I see it.I work with community members on things reported but this only works when everyone collaborates and contributes something. You are just posting a big laundry list of stuff that you are worried about asking for someone else doing something; others to spend their time.In fact I hate having spent time even responding, at this point.
The content of this email is confidential and intended for the recipient specified in message only. It is strictly prohibited to share any part of this message with any third party, without a written consent of the sender. If you received this message by mistake, please reply to this message and follow with its deletion, so that we can ensure such a mistake does not occur in the future. --
You received this message because you are subscribed to the Google Groups "jackson-user" group.
To unsubscribe from this group and stop receiving emails from it, send an email to jackson-user...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/jackson-user/856412d8-edac-4a47-b7f1-e3ccfe29ea71n%40googlegroups.com.