gyokketto commented on PR #8991:
URL: https://github.com/apache/pinot/pull/8991#issuecomment-1185404270

   Scan on the latest published snapshot 
(apachepinot/pinot:0.11.0-SNAPSHOT-438c53b-20220715):
   
   ```
   low  commons-codec_commons-codec version 1.11        has 1 vulnerability
   low  org.eclipse.jetty_jetty-http version 9.4.45.v20220203   has 1 
vulnerability
   medi com.google.guava_guava version 20.0     has 2 vulnerabilities
   medi io.netty_netty-all version 4.1.74.Final has 1 vulnerability
   medi io.netty_netty-codec version 4.1.74.Final       has 1 vulnerability
   mode io.netty_netty-codec-http version 4.1.74.Final  has 1 vulnerability
   high com.google.oauth-client_google-oauth-client version 1.31.0      has 1 
vulnerability
   high com.google.protobuf_protobuf-java version 2.4.1 has 1 vulnerability
   high com.google.protobuf_protobuf-java version 3.11.4        has 1 
vulnerability
   high org.apache.zookeeper_zookeeper version 3.5.8    has 1 vulnerability
   high org.yaml_snakeyaml version 1.16 has 1 vulnerability
   crit com.fasterxml.jackson.core_jackson-databind version 2.4.0       has 4 
vulnerabilities
   crit com.fasterxml.jackson.core_jackson-databind version 2.9.10      has 40 
vulnerabilities
   crit io.netty_netty version 3.10.6.Final     has 10 vulnerabilities
   crit log4j_log4j version 1.2.17      has 6 vulnerabilities
   crit net.minidev_json-smart version 2.3      has 1 vulnerability
   crit org.apache.hadoop_hadoop-common version 2.10.1  has 2 vulnerabilities
   crit org.apache.hadoop_hadoop-hdfs version 2.10.1    has 2 vulnerabilities
   ```
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to