Hi Manoop, I was reviewing the portal known vulnerability analysis - thank-you for providing that (https://wiki.onap.org/pages/viewpage.action?pageId=27689089 ). It is indicated that there are some changes that cannot be done due to the impact (change of all screens). This lead to a few questions:
* Did you analyse the impact of the vulnerability if it was exploted? Is there a work-around in our code to avoid the use of it? * Regarding Jackson mapper, are you using it in such a way it in such a way that it exposes the vulnerabilities (see: https://wiki.onap.org/pages/viewpage.action?pageId=25439016). BR, Steve. [Ericsson]<http://www.ericsson.com/> STEPHEN TERRILL Technology Specialist POA Architecture and Solutions Business Unit Digital Services Ericsson Ericsson R&D Center, via de los Poblados 13 28033, Madrid, Spain Phone +34 339 3005 Mobile +34 609 168 515 stephen.terr...@ericsson.com www.ericsson.com [http://www.ericsson.com/current_campaign]<http://www.ericsson.com/current_campaign> Legal entity: Ericsson EspaƱa S.A, compay registration number ESA288568603. This Communication is Confidential. We only send and receive email on the basis of the terms set out at www.ericsson.com/email_disclaimer<http://www.ericsson.com/email_disclaimer>
_______________________________________________ ONAP-TSC mailing list ONAP-TSC@lists.onap.org https://lists.onap.org/mailman/listinfo/onap-tsc