Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies; false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.

How to read the report | Suppressing false positives | Getting Help: github issues

 Sponsor

Project: Bedework: logging classes

org.bedework:bw-util-logging:6.0.1-SNAPSHOT

Scan Information (show all):

Summary

Summary of Vulnerable Dependencies (click to show all)

DependencyVulnerability IDsPackageHighest SeverityCVE CountConfidenceEvidence Count
jackson-annotations-2.18.2.jarcpe:2.3:a:fasterxml:jackson-core:2.18.2:*:*:*:*:*:*:*
cpe:2.3:a:fasterxml:jackson-modules-java8:2.18.2:*:*:*:*:*:*:*
pkg:maven/com.fasterxml.jackson.core/jackson-annotations@2.18.2 0Highest38

Dependencies (vulnerable)

jackson-annotations-2.18.2.jar

Description:

Core annotations used for value types, used by Jackson data binding package.
  

License:

The Apache Software License, Version 2.0: https://www.apache.org/licenses/LICENSE-2.0.txt
File Path: /home/runner/.m2/repository/com/fasterxml/jackson/core/jackson-annotations/2.18.2/jackson-annotations-2.18.2.jar
MD5: 79d38d3c51068a2bbc40268d02f80763
SHA1: 985d77751ebc7fce5db115a986bc9aa82f973f4a
SHA256:581bd61000ef7648943f781ca05689e56d03f6052748365a8e2b3a9b5d3fa32f
Referenced In Project/Scope: Bedework: logging classes:compile
jackson-annotations-2.18.2.jar is in the transitive dependency tree of the listed items.Included by: pkg:maven/org.bedework/bw-util-logging@6.0.1-SNAPSHOT

Identifiers



This report contains data retrieved from the National Vulnerability Database.
This report may contain data retrieved from the CISA Known Exploited Vulnerability Catalog.
This report may contain data retrieved from the Github Advisory Database (via NPM Audit API).
This report may contain data retrieved from RetireJS.
This report may contain data retrieved from the Sonatype OSS Index.