Hi Manoop,

I was reviewing the portal known vulnerability analysis - thank-you for 
providing that (https://wiki.onap.org/pages/viewpage.action?pageId=27689089
).  It is indicated that there are some changes that cannot be done due to the 
impact (change of all screens).  This lead to a few questions:

  *   Did you analyse the impact of the vulnerability if it was exploted?  Is 
there a work-around in our code to avoid the use of it?
  *   Regarding Jackson mapper, are you using it in such a way it in such a way 
that it exposes the vulnerabilities (see: 
https://wiki.onap.org/pages/viewpage.action?pageId=25439016).

BR,

Steve.

[Ericsson]<http://www.ericsson.com/>

STEPHEN TERRILL
Technology Specialist
POA Architecture and Solutions
Business Unit Digital Services

Ericsson
Ericsson R&D Center, via de los Poblados 13
28033, Madrid, Spain
Phone +34 339 3005
Mobile +34 609 168 515
stephen.terr...@ericsson.com
www.ericsson.com


[http://www.ericsson.com/current_campaign]<http://www.ericsson.com/current_campaign>

Legal entity: Ericsson EspaƱa S.A, compay registration number ESA288568603. 
This Communication is Confidential. We only send and receive email on the basis 
of the terms set out at 
www.ericsson.com/email_disclaimer<http://www.ericsson.com/email_disclaimer>

_______________________________________________
ONAP-TSC mailing list
ONAP-TSC@lists.onap.org
https://lists.onap.org/mailman/listinfo/onap-tsc

Reply via email to