Unless you can gain full visibility into how data flows to and through your dependencies, you cant be sure if you are affected by this vulnerability.
Unless you can gain full visibility into how data flows to and through your dependencies, you cant be sure if you are affected by this vulnerability.