gyokketto commented on PR #8991: URL: https://github.com/apache/pinot/pull/8991#issuecomment-1185404270
Scan on the latest published snapshot (apachepinot/pinot:0.11.0-SNAPSHOT-438c53b-20220715): ``` low commons-codec_commons-codec version 1.11 has 1 vulnerability low org.eclipse.jetty_jetty-http version 9.4.45.v20220203 has 1 vulnerability medi com.google.guava_guava version 20.0 has 2 vulnerabilities medi io.netty_netty-all version 4.1.74.Final has 1 vulnerability medi io.netty_netty-codec version 4.1.74.Final has 1 vulnerability mode io.netty_netty-codec-http version 4.1.74.Final has 1 vulnerability high com.google.oauth-client_google-oauth-client version 1.31.0 has 1 vulnerability high com.google.protobuf_protobuf-java version 2.4.1 has 1 vulnerability high com.google.protobuf_protobuf-java version 3.11.4 has 1 vulnerability high org.apache.zookeeper_zookeeper version 3.5.8 has 1 vulnerability high org.yaml_snakeyaml version 1.16 has 1 vulnerability crit com.fasterxml.jackson.core_jackson-databind version 2.4.0 has 4 vulnerabilities crit com.fasterxml.jackson.core_jackson-databind version 2.9.10 has 40 vulnerabilities crit io.netty_netty version 3.10.6.Final has 10 vulnerabilities crit log4j_log4j version 1.2.17 has 6 vulnerabilities crit net.minidev_json-smart version 2.3 has 1 vulnerability crit org.apache.hadoop_hadoop-common version 2.10.1 has 2 vulnerabilities crit org.apache.hadoop_hadoop-hdfs version 2.10.1 has 2 vulnerabilities ``` -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: [email protected] For queries about this service, please contact Infrastructure at: [email protected] --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
