This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-kamelets.git


The following commit(s) were added to refs/heads/main by this push:
     new b71b7537 Use CycloneDX to generate VEX (#2099)
b71b7537 is described below

commit b71b75377a607e0e77548a4c4048d8e5ad6fbe0b
Author: Andrea Cosentino <[email protected]>
AuthorDate: Tue Jul 9 10:19:37 2024 +0200

    Use CycloneDX to generate VEX (#2099)
    
    Signed-off-by: Andrea Cosentino <[email protected]>
---
 camel-kamelets-sbom/camel-kamelets-sbom.vex.json | 448 +++++++++++++++++++----
 1 file changed, 372 insertions(+), 76 deletions(-)

diff --git a/camel-kamelets-sbom/camel-kamelets-sbom.vex.json 
b/camel-kamelets-sbom/camel-kamelets-sbom.vex.json
index 9557ae0d..5f136be1 100644
--- a/camel-kamelets-sbom/camel-kamelets-sbom.vex.json
+++ b/camel-kamelets-sbom/camel-kamelets-sbom.vex.json
@@ -1,145 +1,441 @@
 {
-  "@context": "https://openvex.dev/ns/v0.2.0";,
-  "@id": 
"https://openvex.dev/docs/public/vex-1825a239e56e9f5a1a6096a98c5f1d3a426a0eb6d4574e602b4a62c0101bbad1";,
-  "author": "Davide Fucci ([email protected])",
-  "timestamp": "2024-06-19T09:27:02.736293+02:00",
-  "last_updated": "2024-06-19T09:42:01.034645+02:00",
-  "version": 11,
-  "statements": [
+  "bomFormat" : "CycloneDX",
+  "specVersion" : "1.5",
+  "serialNumber" : "urn:uuid:37178f3d-7d85-437a-889f-1430b4c23709",
+  "version" : 1,
+  "metadata" : {
+    "timestamp" : "2024-07-09T08:11:09Z",
+    "tools" : [
+      {
+        "vendor" : "OWASP",
+        "name" : "Dependency-Track",
+        "version" : "4.10.1"
+      }
+    ],
+    "component" : {
+      "name" : "Camel-Kamelets",
+      "version" : "4",
+      "externalReferences" : [
+        {
+          "type" : "website",
+          "url" : "https://camel.apache.org/camel-kamelets-parent";
+        },
+        {
+          "type" : "distribution-intake",
+          "url" : 
"https://repository.apache.org/service/local/staging/deploy/maven2";
+        },
+        {
+          "type" : "issue-tracker",
+          "url" : "https://github.com/apache/camel-kamelets/issues";
+        },
+        {
+          "type" : "mailing-list",
+          "url" : "[email protected]"
+        },
+        {
+          "type" : "vcs",
+          "url" : 
"https://gitbox.apache.org/repos/asf?p=camel-kamelets.git;a=summary";
+        }
+      ],
+      "type" : "library",
+      "bom-ref" : "147d79ce-9c2a-498d-b1cb-11029d7fc641"
+    }
+  },
+  "vulnerabilities" : [
     {
-      "vulnerability": {
-        "name": "CVE-2023-3635"
+      "bom-ref" : "8dff54f3-1260-4b15-bdee-f9f1d0bf1b49",
+      "id" : "SNYK-JAVA-ORGCODEHAUSJACKSON-3038425",
+      "source" : {
+        "name" : "SNYK"
       },
-      "timestamp": "2024-06-19T09:27:02.736294+02:00",
-      "products": [
+      "ratings" : [
         {
-          "@id": "pkg:maven/com.squareup.okio/[email protected]?type=jar"
+          "source" : {
+            "name" : "SNYK"
+          },
+          "score" : 7.5,
+          "severity" : "high",
+          "method" : "CVSSv31",
+          "vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
         }
       ],
-      "status": "under_investigation"
+      "cwes" : [
+        400
+      ],
+      "description" : "## Overview 
[org.codehaus.jackson:jackson-mapper-asl](https://mvnrepository.com/artifact/org.codehaus.jackson/jackson-mapper-asl)
 is a high-performance data binding package built on Jackson JSON processor. 
Affected versions of this package are vulnerable to Denial of Service (DoS) in 
the `_deserializeFromArray()` function in `BeanDeserializer`, due to resource 
exhaustion when processing a deeply nested array. **NOTE:** For this 
vulnerability to be exploitable the n [...]
+      "created" : "2022-10-02T09:21:18Z",
+      "updated" : "2023-11-08T09:43:38Z",
+      "affects" : [
+        {
+          "ref" : "147d79ce-9c2a-498d-b1cb-11029d7fc641"
+        }
+      ]
     },
     {
-      "vulnerability": {
-        "name": "CVE-2023-39410"
+      "bom-ref" : "74c3d734-0837-4a8b-bc62-ebdbd7b09d05",
+      "id" : "SNYK-JAVA-ORGCODEHAUSJACKSON-3038427",
+      "source" : {
+        "name" : "SNYK"
       },
-      "timestamp": "2024-06-19T09:29:01.449532+02:00",
-      "products": [
+      "ratings" : [
         {
-          "@id": "pkg:maven/org.apache.avro/[email protected]?type=jar"
+          "source" : {
+            "name" : "SNYK"
+          },
+          "score" : 7.5,
+          "severity" : "high",
+          "method" : "CVSSv31",
+          "vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
         }
       ],
-      "status": "under_investigation"
+      "cwes" : [
+        400
+      ],
+      "description" : "## Overview 
[org.codehaus.jackson:jackson-mapper-asl](https://mvnrepository.com/artifact/org.codehaus.jackson/jackson-mapper-asl)
 is a high-performance data binding package built on Jackson JSON processor. 
Affected versions of this package are vulnerable to Denial of Service (DoS) in 
the `_deserializeWrappedValue()` function in `StdDeserializer.java`, due to 
resource exhaustion when processing deeply nested arrays. **NOTE:** This 
vulnerability is only exploitable w [...]
+      "created" : "2022-10-02T09:41:44Z",
+      "updated" : "2023-11-08T09:43:38Z",
+      "affects" : [
+        {
+          "ref" : "147d79ce-9c2a-498d-b1cb-11029d7fc641"
+        }
+      ]
     },
     {
-      "vulnerability": {
-        "name": "CVE-2019-10202"
+      "bom-ref" : "1ce85ff3-bc60-44fe-963e-b452fffc97c4",
+      "id" : "SNYK-JAVA-ORGCODEHAUSJACKSON-534878",
+      "source" : {
+        "name" : "SNYK"
       },
-      "timestamp": "2024-06-19T09:33:14.931683+02:00",
-      "products": [
+      "ratings" : [
         {
-          "@id": 
"pkg:maven/org.codehaus.jackson/[email protected]?type=jar"
+          "source" : {
+            "name" : "SNYK"
+          },
+          "score" : 7.5,
+          "severity" : "high",
+          "method" : "CVSSv31",
+          "vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
         }
       ],
-      "status": "under_investigation"
+      "description" : "## Overview 
[org.codehaus.jackson:jackson-mapper-asl](https://mvnrepository.com/artifact/org.codehaus.jackson/jackson-mapper-asl)
 is a high-performance data binding package built on Jackson JSON processor. 
Affected versions of this package are vulnerable to XML External Entity (XXE) 
Injection. via the `DOMDeserializer.class` file and its inner classes 
(`DocumentDeserializer.class` and `NodeDeserializer.class`) that uses the 
`_parserFactory` instance without restric [...]
+      "recommendation" : "Upgrade the package version to to fix this 
vulnerability",
+      "created" : "2019-11-19T11:44:30Z",
+      "published" : "2019-11-19T11:56:32Z",
+      "updated" : "2024-03-11T09:54:00Z",
+      "affects" : [
+        {
+          "ref" : "147d79ce-9c2a-498d-b1cb-11029d7fc641"
+        }
+      ]
     },
     {
-      "vulnerability": {
-        "name": "CVE-2019-10172"
+      "bom-ref" : "5cfc8ca5-3e9b-4643-b175-012724d716ed",
+      "id" : "SNYK-JAVA-ORGCODEHAUSJACKSON-3326362",
+      "source" : {
+        "name" : "SNYK"
       },
-      "timestamp": "2024-06-19T09:34:26.033861+02:00",
-      "products": [
+      "ratings" : [
         {
-          "@id": 
"pkg:maven/org.codehaus.jackson/[email protected]?type=jar"
+          "source" : {
+            "name" : "SNYK"
+          },
+          "score" : 9.8,
+          "severity" : "critical",
+          "method" : "CVSSv31",
+          "vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
         }
       ],
-      "status": "under_investigation"
+      "description" : "## Overview 
[org.codehaus.jackson:jackson-mapper-asl](https://mvnrepository.com/artifact/org.codehaus.jackson/jackson-mapper-asl)
 is a high-performance data binding package built on Jackson JSON processor. 
Affected versions of this package are vulnerable to Improper Input Validation 
which results in several instances of deserialization of untrusted data. This 
issue is parallel to vulnerabilities reported and fixed in jackson-databind 
(CVE-2017-17485, CVE-2017-7525, [...]
+      "recommendation" : "Upgrade the package version to to fix this 
vulnerability",
+      "created" : "2023-02-21T07:30:54Z",
+      "published" : "2023-03-01T08:47:56Z",
+      "updated" : "2024-03-11T09:54:00Z",
+      "affects" : [
+        {
+          "ref" : "147d79ce-9c2a-498d-b1cb-11029d7fc641"
+        }
+      ]
     },
     {
-      "vulnerability": {
-        "name": "CVE-2024-25710"
+      "bom-ref" : "ef05c048-e001-4375-8306-9eecce182cfc",
+      "id" : "SNYK-JAVA-ORGAPACHECOMMONS-1316638",
+      "source" : {
+        "name" : "SNYK"
       },
-      "timestamp": "2024-06-19T09:35:44.392635+02:00",
-      "products": [
+      "ratings" : [
         {
-          "@id": "pkg:maven/org.apache.commons/[email protected]?type=jar"
+          "source" : {
+            "name" : "SNYK"
+          },
+          "score" : 7.5,
+          "severity" : "high",
+          "method" : "CVSSv31",
+          "vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
         }
       ],
-      "status": "under_investigation"
+      "description" : "## Overview 
[org.apache.commons:commons-compress](https://github.com/apache/commons-compress)
 is an API for working with compression and archive formats. Affected versions 
of this package are vulnerable to Denial of Service (DoS). When reading a 
specially crafted 7Z archive, Compress can be made to allocate large amounts of 
memory that finally leads to an out-of-memory error even for very small inputs. 
This could be used to mount a denial of service attack against  [...]
+      "recommendation" : "Upgrade the package version to 1.21 to fix this 
vulnerability",
+      "created" : "2021-07-13T11:27:28Z",
+      "published" : "2021-07-13T15:29:21Z",
+      "updated" : "2024-03-11T09:53:57Z",
+      "affects" : [
+        {
+          "ref" : "147d79ce-9c2a-498d-b1cb-11029d7fc641"
+        }
+      ]
     },
     {
-      "vulnerability": {
-        "name": "CVE-2021-35515"
+      "bom-ref" : "557ace8c-3ba0-4b34-b3bd-7475ecb0de6a",
+      "id" : "SNYK-JAVA-ORGAPACHECOMMONS-1316639",
+      "source" : {
+        "name" : "SNYK"
       },
-      "timestamp": "2024-06-19T09:36:23.804341+02:00",
-      "products": [
+      "ratings" : [
         {
-          "@id": "pkg:maven/org.apache.commons/[email protected]?type=jar"
+          "source" : {
+            "name" : "SNYK"
+          },
+          "score" : 7.5,
+          "severity" : "high",
+          "method" : "CVSSv31",
+          "vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
         }
       ],
-      "status": "under_investigation"
+      "description" : "## Overview 
[org.apache.commons:commons-compress](https://github.com/apache/commons-compress)
 is an API for working with compression and archive formats. Affected versions 
of this package are vulnerable to Denial of Service (DoS). When reading a 
specially crafted 7Z archive, the construction of the list of codecs that 
decompress an entry can result in an infinite loop. This could be used to mount 
a denial of service attack against services that use Compress' sevenz [...]
+      "recommendation" : "Upgrade the package version to 1.21 to fix this 
vulnerability",
+      "created" : "2021-07-13T11:33:38Z",
+      "published" : "2021-07-13T15:29:20Z",
+      "updated" : "2024-03-11T09:53:53Z",
+      "affects" : [
+        {
+          "ref" : "147d79ce-9c2a-498d-b1cb-11029d7fc641"
+        }
+      ]
     },
     {
-      "vulnerability": {
-        "name": "CVE-2021-35565"
+      "bom-ref" : "fb8cad05-1fe6-4f5f-aa40-a4835cfe597a",
+      "id" : "SNYK-JAVA-ORGAPACHECOMMONS-1316640",
+      "source" : {
+        "name" : "SNYK"
       },
-      "timestamp": "2024-06-19T09:36:45.465007+02:00",
-      "products": [
+      "ratings" : [
         {
-          "@id": "pkg:maven/org.apache.commons/[email protected]?type=jar"
+          "source" : {
+            "name" : "SNYK"
+          },
+          "score" : 7.5,
+          "severity" : "high",
+          "method" : "CVSSv31",
+          "vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
         }
       ],
-      "status": "under_investigation"
+      "description" : "## Overview 
[org.apache.commons:commons-compress](https://github.com/apache/commons-compress)
 is an API for working with compression and archive formats. Affected versions 
of this package are vulnerable to Denial of Service (DoS). When reading a 
specially crafted TAR archive, Compress can be made to allocate large amounts 
of memory that finally leads to an out-of-memory error even for very small 
inputs. This could be used to mount a denial of service attack against [...]
+      "recommendation" : "Upgrade the package version to 1.21 to fix this 
vulnerability",
+      "created" : "2021-07-13T11:35:27Z",
+      "published" : "2021-07-13T15:29:20Z",
+      "updated" : "2024-03-11T09:53:51Z",
+      "affects" : [
+        {
+          "ref" : "147d79ce-9c2a-498d-b1cb-11029d7fc641"
+        }
+      ]
     },
     {
-      "vulnerability": {
-        "name": "CVE-2018-11771"
+      "bom-ref" : "f8de35b3-546f-4ad9-99c0-9cfb6bb26ae1",
+      "id" : "SNYK-JAVA-ORGAPACHECOMMONS-1316641",
+      "source" : {
+        "name" : "SNYK"
       },
-      "timestamp": "2024-06-19T09:37:11.953898+02:00",
-      "products": [
+      "ratings" : [
         {
-          "@id": "pkg:maven/org.apache.commons/[email protected]?type=jar"
+          "source" : {
+            "name" : "SNYK"
+          },
+          "score" : 7.5,
+          "severity" : "high",
+          "method" : "CVSSv31",
+          "vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
         }
       ],
-      "status": "under_investigation"
+      "description" : "## Overview 
[org.apache.commons:commons-compress](https://github.com/apache/commons-compress)
 is an API for working with compression and archive formats. Affected versions 
of this package are vulnerable to Denial of Service (DoS). When reading a 
specially crafted ZIP archive, Compress can be made to allocate large amounts 
of memory that finally leads to an out-of-memory error even for very small 
inputs. This could be used to mount a denial of service attack against [...]
+      "recommendation" : "Upgrade the package version to 1.21 to fix this 
vulnerability",
+      "created" : "2021-07-13T11:39:11Z",
+      "published" : "2021-07-13T15:29:20Z",
+      "updated" : "2024-03-11T09:53:57Z",
+      "affects" : [
+        {
+          "ref" : "147d79ce-9c2a-498d-b1cb-11029d7fc641"
+        }
+      ]
     },
     {
-      "vulnerability": {
-        "name": "CVE-2021-36090"
+      "bom-ref" : "6f944446-3332-440c-9eb2-967f6f500727",
+      "id" : "SNYK-JAVA-ORGAPACHECOMMONS-6254296",
+      "source" : {
+        "name" : "SNYK"
       },
-      "timestamp": "2024-06-19T09:37:37.997898+02:00",
-      "products": [
+      "ratings" : [
         {
-          "@id": "pkg:maven/org.apache.commons/[email protected]?type=jar"
+          "source" : {
+            "name" : "SNYK"
+          },
+          "score" : 5.5,
+          "severity" : "medium",
+          "method" : "CVSSv31",
+          "vector" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
         }
       ],
-      "status": "under_investigation"
+      "description" : "## Overview 
[org.apache.commons:commons-compress](https://github.com/apache/commons-compress)
 is an API for working with compression and archive formats. Affected versions 
of this package are vulnerable to Infinite loop due to the improper handling of 
certain inputs during the parsing of dump files. An attacker can cause the 
application to enter an infinite loop by supplying crafted inputs. ## 
Remediation Upgrade `org.apache.commons:commons-compress` to version 1.2 [...]
+      "recommendation" : "Upgrade the package version to 1.26.0 to fix this 
vulnerability",
+      "created" : "2024-02-20T10:52:07Z",
+      "published" : "2024-02-20T10:52:07Z",
+      "updated" : "2024-04-27T13:35:10Z",
+      "affects" : [
+        {
+          "ref" : "147d79ce-9c2a-498d-b1cb-11029d7fc641"
+        }
+      ]
     },
     {
-      "vulnerability": {
-        "name": "CVE-2021-35517"
+      "bom-ref" : "40cee64e-b16b-464a-a368-253adeac0cf7",
+      "id" : "SNYK-JAVA-COMSQUAREUPOKHTTP3-2958044",
+      "source" : {
+        "name" : "SNYK"
       },
-      "timestamp": "2024-06-19T09:38:00.592205+02:00",
-      "products": [
+      "ratings" : [
         {
-          "@id": "pkg:maven/org.apache.commons/[email protected]?type=jar"
+          "source" : {
+            "name" : "SNYK"
+          },
+          "score" : 5.5,
+          "severity" : "medium",
+          "method" : "CVSSv31",
+          "vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
         }
       ],
-      "status": "under_investigation"
+      "description" : "## Overview 
[com.squareup.okhttp3:okhttp](https://mvnrepository.com/artifact/com.squareup.okhttp3/okhttp)
 is a HTTP & HTTP/2 client for Android and Java applications Affected versions 
of this package are vulnerable to Information Exposure. When there's an illegal 
character in a header value, an `IllegalArgumentException` is thrown whose 
message includes the full header value. ## PoC ``` package 
com.launchdarkly.eventsource; import okhttp3.*; import org.junit.Test;  [...]
+      "recommendation" : "Upgrade the package version to 4.9.2 to fix this 
vulnerability",
+      "created" : "2022-07-22T06:59:36Z",
+      "published" : "2022-07-22T06:59:36Z",
+      "updated" : "2024-03-11T09:53:38Z",
+      "affects" : [
+        {
+          "ref" : "147d79ce-9c2a-498d-b1cb-11029d7fc641"
+        }
+      ]
     },
     {
-      "vulnerability": {
-        "name": "CVE-2024-35255"
+      "bom-ref" : "85b4750f-b399-4e42-bc2d-abd7be2c4a71",
+      "id" : "SNYK-JAVA-COMSQUAREUPOKIO-5773320",
+      "source" : {
+        "name" : "SNYK"
       },
-      "timestamp": "2024-06-19T09:42:01.034646+02:00",
-      "products": [
+      "ratings" : [
         {
-          "@id": "pkg:maven/com.microsoft.azure/[email protected]?type=jar"
-        },
+          "source" : {
+            "name" : "SNYK"
+          },
+          "score" : 7.5,
+          "severity" : "high",
+          "method" : "CVSSv31",
+          "vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
+        }
+      ],
+      "description" : "## Overview Affected versions of this package are 
vulnerable to Denial of Service (DoS) due to improper exception handling by the 
`GzipSource` class when parsing a malformed gzip buffer. This vulnerability can 
be exploited on the Okio client when handling a crafted GZIP archive. ## PoC 
```java val gzBuf: Buffer = Buffer() try { val gzByteString: ByteString = 
(\"1f8b41ff424242424343ffff\").decodeHex() gzBuf.write(gzByteString) val gz: 
GzipSource = GzipSource(gzBuf)  [...]
+      "recommendation" : "Upgrade the package version to 1.17.6,3.4.0 to fix 
this vulnerability",
+      "created" : "2023-07-13T08:54:58Z",
+      "published" : "2023-07-13T09:04:26Z",
+      "updated" : "2024-04-08T08:36:20Z",
+      "affects" : [
+        {
+          "ref" : "147d79ce-9c2a-498d-b1cb-11029d7fc641"
+        }
+      ]
+    },
+    {
+      "bom-ref" : "f7d6d98d-008b-4bf9-8b2c-b0f193b30a39",
+      "id" : "SNYK-JAVA-ORGAPACHEAVRO-5926693",
+      "source" : {
+        "name" : "SNYK"
+      },
+      "ratings" : [
+        {
+          "source" : {
+            "name" : "SNYK"
+          },
+          "score" : 7.5,
+          "severity" : "high",
+          "method" : "CVSSv31",
+          "vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
+        }
+      ],
+      "description" : "## Overview 
[org.apache.avro:avro](https://avro.apache.org/) is an Avro core components 
Affected versions of this package are vulnerable to Improper Input Validation 
when deserializing untrusted or corrupted data. An attacker can consume memory 
beyond the allowed constraints, resulting in the system being out of memory. ## 
Remediation Upgrade `org.apache.avro:avro` to version 1.11.3 or higher. ## 
References - [Apache List](https://lists.apache.org/thread/q142wj99cw [...]
+      "recommendation" : "Upgrade the package version to 1.11.3 to fix this 
vulnerability",
+      "created" : "2023-10-01T10:48:46Z",
+      "published" : "2023-10-01T11:21:06Z",
+      "updated" : "2024-03-11T09:54:02Z",
+      "affects" : [
+        {
+          "ref" : "147d79ce-9c2a-498d-b1cb-11029d7fc641"
+        }
+      ]
+    },
+    {
+      "bom-ref" : "54bb58b0-d5ec-47bf-a2b2-4301f1c1bbf3",
+      "id" : "SNYK-JAVA-ORGAPACHECOMMONS-32473",
+      "source" : {
+        "name" : "SNYK"
+      },
+      "ratings" : [
         {
-          @id: "pkg:maven/com.azure/[email protected]?type=jar"
+          "source" : {
+            "name" : "SNYK"
+          },
+          "score" : 5.5,
+          "severity" : "medium",
+          "method" : "CVSSv31",
+          "vector" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
         }
       ],
-      "status": "under_investigation"
+      "description" : "## Overview 
[org.apache.commons:commons-compress](https://github.com/apache/commons-compress)
 is an API for working with compression and archive formats. Affected versions 
of this package are vulnerable to Denial of Service (DoS). When reading a 
specially crafted ZIP archive, the read method might fail to return the correct 
`EOF` indication after the end of the stream has been reached. If it combined 
with a `java.io.InputStreamReader`, it can lead to an infinite st [...]
+      "recommendation" : "Upgrade the package version to 1.18-RC1 to fix this 
vulnerability",
+      "created" : "2018-08-16T14:26:43Z",
+      "published" : "2018-08-19T13:36:14Z",
+      "updated" : "2024-03-11T09:48:50Z",
+      "affects" : [
+        {
+          "ref" : "147d79ce-9c2a-498d-b1cb-11029d7fc641"
+        }
+      ]
+    },
+    {
+      "bom-ref" : "d8dd9c4f-d279-4c67-996c-10c28a29895f",
+      "id" : "SNYK-JAVA-IONETTY-1042268",
+      "source" : {
+        "name" : "SNYK"
+      },
+      "ratings" : [
+        {
+          "source" : {
+            "name" : "SNYK"
+          },
+          "score" : 7.4,
+          "severity" : "high",
+          "method" : "CVSSv31",
+          "vector" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
+        }
+      ],
+      "cwes" : [
+        295
+      ],
+      "description" : "## Overview 
[io.netty:netty-handler](https://github.com/netty/netty.git/netty-handler) is a 
library that provides an asynchronous event-driven network application 
framework and tools for rapid development of maintainable high performance and 
high scalability protocol servers and clients. In other words, Netty is a NIO 
client server framework which enables quick and easy development of network 
applications such as protocol servers and clients. It greatly simplifies  [...]
+      "created" : "2020-11-20T15:44:58Z",
+      "updated" : "2023-10-11T01:10:45Z",
+      "affects" : [
+        {
+          "ref" : "147d79ce-9c2a-498d-b1cb-11029d7fc641"
+        }
+      ]
     }
   ]
-}
+}
\ No newline at end of file

Reply via email to