Trivy is reporting false vulnerability for com.fasterxml.jackson.core:jackson-databind #5150
pranjali35
started this conversation in
False Detection
Replies: 2 comments 2 replies
-
Hi @pranjali35 ! You can provide your |
Beta Was this translation helpful? Give feedback.
0 replies
-
Not sure if it's the same issue but I have this CVE being reported on cos_api-bundle-5.6.69 instead of jackson-databind |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
IDs
CVE-2020-36518, CVE-2021-46877, CVE-2022-42003, CVE-2022-42004
Description
I am using the latest aquasec image to scan my pom file and Trivy is reporting following vulnerabilities.
It says installed version is : 2.12.0
But my dependecy tree says it is
$ mvn dependency:tree | grep "jackson-databind"
[INFO] | - com.fasterxml.jackson.core:jackson-databind:jar:2.13.5:compile
I checked everything and I am clueless at this point that why Trivy is reporting that I am using a vulnerable version of jackson-databind
Reproduction Steps
Target
Container Image
Scanner
Vulnerability
Target OS
No response
Debug Output
Version
Checklist
-f json
that shows data sources and confirmed that the security advisory in data sources was correctBeta Was this translation helpful? Give feedback.
All reactions