github-advanced-security[bot] commented on code in PR #1350: URL: https://github.com/apache/plc4x/pull/1350#discussion_r1460363642
########## plc4j/tools/ui/pom.xml: ########## @@ -0,0 +1,110 @@ +<?xml version="1.0" encoding="UTF-8"?> Review Comment: ## A cleverly devised username might bypass LDAP authentication checks. I ... Package: org.apache.derby:derby\nInstalled Version: 10.16.1.1\nVulnerability CVE-2022-46337\nSeverity: CRITICAL\nFixed Version: 10.17.1.0\nLink: [CVE-2022-46337](https://avd.aquasec.com/nvd/cve-2022-46337) [Show more details](https://github.com/apache/plc4x/security/code-scanning/1740) ########## plc4j/tools/ui/backend/pom.xml: ########## @@ -0,0 +1,203 @@ +<?xml version="1.0" encoding="UTF-8"?> Review Comment: ## A cleverly devised username might bypass LDAP authentication checks. I ... Package: org.apache.derby:derby\nInstalled Version: 10.16.1.1\nVulnerability CVE-2022-46337\nSeverity: CRITICAL\nFixed Version: 10.17.1.0\nLink: [CVE-2022-46337](https://avd.aquasec.com/nvd/cve-2022-46337) [Show more details](https://github.com/apache/plc4x/security/code-scanning/1739) -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: dev-unsubscr...@plc4x.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org