forked from bcgov/jag-file-submission
-
Notifications
You must be signed in to change notification settings - Fork 0
Bump splunk-library-javalogging from 1.8.0 to 1.11.1 in /src/backend/efiling-api #153
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
dependabot
wants to merge
1
commit into
master
Choose a base branch
from
dependabot/maven/src/backend/efiling-api/com.splunk.logging-splunk-library-javalogging-1.11.1
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Bumps [splunk-library-javalogging](https://github.com/splunk/splunk-library-javalogging) from 1.8.0 to 1.11.1. - [Release notes](https://github.com/splunk/splunk-library-javalogging/releases) - [Changelog](https://github.com/splunk/splunk-library-javalogging/blob/main/CHANGELOG.md) - [Commits](splunk/splunk-library-javalogging@1.8.0...1.11.1) --- updated-dependencies: - dependency-name: com.splunk.logging:splunk-library-javalogging dependency-type: direct:production ... Signed-off-by: dependabot[bot] <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Mergebase Code Green
Updated Vulnerability Report
The report below shows the state of the repository after the pull request.
Critical
Vulnerability | Dependency | Source Path |
---|---|---|
CVE-2017-5929 | ch.qos.logback/logback-access:UNKNOWN.VERSION | src/backend/efiling-api/pom.xml |
CVE-2017-5929 | ch.qos.logback/logback-classic:UNKNOWN.VERSION | src/backend/efiling-api/pom.xml |
CVE-2017-5929 | ch.qos.logback/logback-core:UNKNOWN.VERSION | src/backend/efiling-api/pom.xml |
CVE-2021-26707 | npm:merge-deep:3.0.2 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-26707 | npm:merge-deep:3.0.2 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-15256 | npm:object-path:0.11.4 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-15256 | npm:object-path:0.11.4 | src/frontend/efiling-frontend/yarn.lock |
NSWG-ECO-433 | npm:open:7.3.0 | src/frontend/efiling-demo/yarn.lock |
NSWG-ECO-433 | npm:open:7.3.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2016-6809 | org.apache.tika/tika-core:UNKNOWN.VERSION | src/backend/efiling-api/pom.xml |
CVE-2021-26987 | org.springframework.boot/spring-boot-starter-actuator:UNKNOWN.VERSION | src/backend/efiling-api/pom.xml |
CVE-2021-26987 | org.springframework.boot/spring-boot-starter-actuator:UNKNOWN.VERSION | src/backend/efiling-reviewer-api/pom.xml |
CVE-2021-26987 | org.springframework.boot/spring-boot-starter-security:UNKNOWN.VERSION | src/backend/efiling-api/pom.xml |
CVE-2021-26987 | org.springframework.boot/spring-boot-starter:UNKNOWN.VERSION | src/backend/efiling-reviewer-api/pom.xml |
CVE-2021-26987 | org.springframework.boot/spring-boot-starter:UNKNOWN.VERSION | src/backend/libs/efiling-demo-starter/pom.xml |
CVE-2021-26987 | org.springframework.boot/spring-boot-starter:UNKNOWN.VERSION | src/backend/libs/efiling-diligen-client-starter/pom.xml |
Extra High
Vulnerability | Dependency | Source Path |
---|---|---|
CVE-2020-8265 | npm:@types/node:14.11.5 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-8265 | npm:@types/node:14.14.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2018-8039 | org.apache.cxf/cxf-rt-transports-http:UNKNOWN.VERSION | src/backend/libs/efiling-cso-client/pom.xml |
CVE-2018-8039 | org.apache.cxf/cxf-rt-transports-http:UNKNOWN.VERSION | src/backend/libs/efiling-cso-starter/pom.xml |
High
Vulnerability | Dependency | Source Path |
---|---|---|
CVE-2021-22884, CVE-2021-22883, CVE-2020-8277 | npm:@types/node:14.11.5 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-22884, CVE-2021-22883, CVE-2020-8277 | npm:@types/node:14.14.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28469 | npm:glob-parent:2.0.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28469 | npm:glob-parent:2.0.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28469 | npm:glob-parent:3.1.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28469 | npm:glob-parent:3.1.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28469 | npm:glob-parent:5.1.1 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28469 | npm:glob-parent:5.1.1 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-7788 | npm:ini:1.3.5 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-7788 | npm:ini:1.3.5 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28488 | npm:jquery:3.5.1 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28488 | npm:jquery:3.5.1 | src/frontend/efiling-frontend/yarn.lock |
CVE-2019-20149 | npm:kind-of:2.0.1 | src/frontend/efiling-demo/yarn.lock |
CVE-2019-20149 | npm:kind-of:2.0.1 | src/frontend/efiling-frontend/yarn.lock |
CVE-2019-20149 | npm:kind-of:3.2.2 | src/frontend/efiling-demo/yarn.lock |
CVE-2019-20149 | npm:kind-of:3.2.2 | src/frontend/efiling-frontend/yarn.lock |
CVE-2019-20149 | npm:kind-of:4.0.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2019-20149 | npm:kind-of:4.0.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2019-20149 | npm:kind-of:5.1.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2019-20149 | npm:kind-of:5.1.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23337 | npm:lodash._reinterpolate:3.0.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23337 | npm:lodash._reinterpolate:3.0.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23337 | npm:lodash.escape:4.0.1 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23337 | npm:lodash.escape:4.0.1 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23337 | npm:lodash.flattendeep:4.4.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23337 | npm:lodash.flattendeep:4.4.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23337 | npm:lodash.includes:4.3.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23337 | npm:lodash.includes:4.3.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23337 | npm:lodash.isboolean:3.0.3 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23337 | npm:lodash.isboolean:3.0.3 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23337 | npm:lodash.isequal:4.5.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23337 | npm:lodash.isequal:4.5.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23337 | npm:lodash.isinteger:4.0.4 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23337 | npm:lodash.isinteger:4.0.4 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23337 | npm:lodash.isnumber:3.0.3 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23337 | npm:lodash.isnumber:3.0.3 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23337 | npm:lodash.isplainobject:4.0.6 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23337 | npm:lodash.isplainobject:4.0.6 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23337 | npm:lodash.isstring:4.0.1 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23337 | npm:lodash.isstring:4.0.1 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23337 | npm:lodash.memoize:4.1.2 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23337 | npm:lodash.memoize:4.1.2 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23337 | npm:lodash.once:4.1.1 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23337 | npm:lodash.once:4.1.1 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23337 | npm:lodash.sortby:4.7.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23337 | npm:lodash.sortby:4.7.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23337 | npm:lodash.template:4.5.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23337 | npm:lodash.template:4.5.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23337 | npm:lodash.templatesettings:4.2.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23337 | npm:lodash.templatesettings:4.2.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23337 | npm:lodash.uniq:4.5.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23337 | npm:lodash.uniq:4.5.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23337 | npm:lodash:4.17.20 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23337 | npm:lodash:4.17.20 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-33502 | npm:normalize-url:1.9.1 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-33502 | npm:normalize-url:1.9.1 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-33502 | npm:normalize-url:3.3.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-33502 | npm:normalize-url:3.3.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23341, CVE-2020-15138 | npm:prismjs:1.17.1 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23341, CVE-2020-15138 | npm:prismjs:1.17.1 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23341 | npm:prismjs:1.21.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23341 | npm:prismjs:1.22.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23341 | npm:prismjs:1.22.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-27290 | npm:ssri:6.0.1 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-27290 | npm:ssri:6.0.1 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-27290 | npm:ssri:8.0.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-27290 | npm:ssri:8.0.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-7774 | npm:y18n:4.0.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-7774 | npm:y18n:4.0.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-30468, CVE-2021-22696 | org.apache.cxf/cxf-rt-transports-http:3.4.1 | src/backend/libs/efiling-bom/pom.xml |
CVE-2021-30468, CVE-2021-22696, CVE-2017-3156, CVE-2016-8739 | org.apache.cxf/cxf-rt-transports-http:UNKNOWN.VERSION | src/backend/libs/efiling-cso-client/pom.xml |
CVE-2021-30468, CVE-2021-22696, CVE-2017-3156, CVE-2016-8739 | org.apache.cxf/cxf-rt-transports-http:UNKNOWN.VERSION | src/backend/libs/efiling-cso-starter/pom.xml |
CVE-2016-4434 | org.apache.tika/tika-core:UNKNOWN.VERSION | src/backend/efiling-api/pom.xml |
Medium
Vulnerability | Dependency | Source Path |
---|---|---|
CVE-2020-8287 | npm:@types/node:14.11.5 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-8287 | npm:@types/node:14.14.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2018-6341 | npm:@types/prop-types:15.7.3 | src/frontend/efiling-demo/yarn.lock |
CVE-2018-6341 | npm:@types/prop-types:15.7.3 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-7608 | npm:@types/yargs-parser:15.0.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-7608 | npm:@types/yargs-parser:15.0.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23364 | npm:browserslist:4.10.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23364 | npm:browserslist:4.10.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23364 | npm:browserslist:4.14.5 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23364 | npm:browserslist:4.15.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-29060 | npm:color-string:1.5.3 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-29060 | npm:color-string:1.5.4 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23382 | npm:colorette:1.2.1 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23382 | npm:colorette:1.2.1 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28498 | npm:elliptic:6.5.3 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28498 | npm:elliptic:6.5.3 | src/frontend/efiling-frontend/yarn.lock |
CVE-2018-6341 | npm:eslint-plugin-react-hooks:1.7.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2018-6341 | npm:eslint-plugin-react-hooks:1.7.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2018-6341 | npm:eslint-plugin-react-hooks:4.1.2 | src/frontend/efiling-demo/yarn.lock |
CVE-2018-6341 | npm:eslint-plugin-react-hooks:4.2.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-26237 | npm:highlight.js:9.15.10 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-26237 | npm:highlight.js:9.15.10 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23362 | npm:hosted-git-info:2.8.8 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23362 | npm:hosted-git-info:2.8.8 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28500 | npm:lodash._reinterpolate:3.0.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28500 | npm:lodash._reinterpolate:3.0.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28500 | npm:lodash.escape:4.0.1 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28500 | npm:lodash.escape:4.0.1 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28500 | npm:lodash.flattendeep:4.4.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28500 | npm:lodash.flattendeep:4.4.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28500 | npm:lodash.includes:4.3.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28500 | npm:lodash.includes:4.3.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28500 | npm:lodash.isboolean:3.0.3 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28500 | npm:lodash.isboolean:3.0.3 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28500 | npm:lodash.isequal:4.5.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28500 | npm:lodash.isequal:4.5.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28500 | npm:lodash.isinteger:4.0.4 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28500 | npm:lodash.isinteger:4.0.4 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28500 | npm:lodash.isnumber:3.0.3 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28500 | npm:lodash.isnumber:3.0.3 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28500 | npm:lodash.isplainobject:4.0.6 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28500 | npm:lodash.isplainobject:4.0.6 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28500 | npm:lodash.isstring:4.0.1 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28500 | npm:lodash.isstring:4.0.1 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28500 | npm:lodash.memoize:4.1.2 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28500 | npm:lodash.memoize:4.1.2 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28500 | npm:lodash.once:4.1.1 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28500 | npm:lodash.once:4.1.1 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28500 | npm:lodash.sortby:4.7.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28500 | npm:lodash.sortby:4.7.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28500 | npm:lodash.template:4.5.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28500 | npm:lodash.template:4.5.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28500 | npm:lodash.templatesettings:4.2.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28500 | npm:lodash.templatesettings:4.2.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28500 | npm:lodash.uniq:4.5.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28500 | npm:lodash.uniq:4.5.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-28500 | npm:lodash:4.17.20 | src/frontend/efiling-demo/yarn.lock |
CVE-2020-28500 | npm:lodash:4.17.20 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23382, CVE-2021-23368 | npm:postcss:7.0.21 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23382, CVE-2021-23368 | npm:postcss:7.0.21 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-23382, CVE-2021-23368 | npm:postcss:7.0.35 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-23382, CVE-2021-23368 | npm:postcss:7.0.35 | src/frontend/efiling-frontend/yarn.lock |
CVE-2018-6341 | npm:prop-types:15.7.2 | src/frontend/efiling-demo/yarn.lock |
CVE-2018-6341 | npm:prop-types:15.7.2 | src/frontend/efiling-frontend/yarn.lock |
CVE-2018-6341 | npm:react-refresh:0.8.3 | src/frontend/efiling-demo/yarn.lock |
CVE-2018-6341 | npm:scheduler:0.19.1 | src/frontend/efiling-demo/yarn.lock |
CVE-2018-6341 | npm:scheduler:0.19.1 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-27515 | npm:url-parse:1.4.7 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-27515 | npm:url-parse:1.4.7 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-32640 | npm:ws:6.2.1 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-32640 | npm:ws:6.2.1 | src/frontend/efiling-frontend/yarn.lock |
CVE-2021-32640 | npm:ws:7.3.1 | src/frontend/efiling-demo/yarn.lock |
CVE-2021-32640 | npm:ws:7.3.1 | src/frontend/efiling-frontend/yarn.lock |
CVE-2020-1954, CVE-2020-13954, CVE-2019-12406, CVE-2016-6812, CVE-2015-5253, CVE-2012-5786, CVE-2012-3451 | org.apache.cxf/cxf-rt-transports-http:UNKNOWN.VERSION | src/backend/libs/efiling-cso-client/pom.xml |
CVE-2020-1954, CVE-2020-13954, CVE-2019-12406, CVE-2016-6812, CVE-2015-5253, CVE-2012-5786, CVE-2012-3451 | org.apache.cxf/cxf-rt-transports-http:UNKNOWN.VERSION | src/backend/libs/efiling-cso-starter/pom.xml |
CVE-2021-28657 | org.apache.tika/tika-core:1.24.1 | src/backend/libs/efiling-bom/pom.xml |
CVE-2021-28657, CVE-2015-3271 | org.apache.tika/tika-core:UNKNOWN.VERSION | src/backend/efiling-api/pom.xml |
Low
Vulnerability | Dependency | Source Path |
---|---|---|
CVE-2020-10650 | com.fasterxml.jackson.core/jackson-databind:UNKNOWN.VERSION | src/backend/efiling-api/pom.xml |
CVE-2020-10650 | com.fasterxml.jackson.core/jackson-databind:UNKNOWN.VERSION | src/backend/efiling-reviewer-api/pom.xml |
CVE-2020-10650 | com.fasterxml.jackson.core/jackson-databind:UNKNOWN.VERSION | src/backend/libs/efiling-bambora-api-client/pom.xml |
CVE-2020-10650 | com.fasterxml.jackson.core/jackson-databind:UNKNOWN.VERSION | src/backend/libs/efiling-ceis-api-client/pom.xml |
CVE-2020-10650 | com.fasterxml.jackson.core/jackson-databind:UNKNOWN.VERSION | src/backend/libs/efiling-commons/pom.xml |
CVE-2020-10650 | com.fasterxml.jackson.core/jackson-databind:UNKNOWN.VERSION | src/backend/libs/efiling-cso-client/pom.xml |
CVE-2020-10650 | com.fasterxml.jackson.core/jackson-databind:UNKNOWN.VERSION | src/backend/libs/efiling-cso-starter/pom.xml |
CVE-2020-10650 | com.fasterxml.jackson.core/jackson-databind:UNKNOWN.VERSION | src/backend/libs/efiling-demo-starter/pom.xml |
CVE-2020-10650 | com.fasterxml.jackson.core/jackson-databind:UNKNOWN.VERSION | src/backend/libs/efiling-diligen-client-starter/pom.xml |
CVE-2020-10650 | com.fasterxml.jackson.core/jackson-databind:UNKNOWN.VERSION | src/backend/libs/efiling-diligen-client/pom.xml |
CVE-2013-7035 | npm:@types/prop-types:15.7.3 | src/frontend/efiling-demo/yarn.lock |
CVE-2013-7035 | npm:@types/prop-types:15.7.3 | src/frontend/efiling-frontend/yarn.lock |
CVE-2013-7035 | npm:@types/react-test-renderer:16.9.3 | src/frontend/efiling-demo/yarn.lock |
CVE-2013-7035 | npm:@types/react-test-renderer:16.9.3 | src/frontend/efiling-frontend/yarn.lock |
CVE-2013-7035 | npm:@types/react:16.9.51 | src/frontend/efiling-demo/yarn.lock |
CVE-2013-7035 | npm:@types/react:16.9.53 | src/frontend/efiling-frontend/yarn.lock |
CVE-2013-7035 | npm:eslint-plugin-react-hooks:1.7.0 | src/frontend/efiling-demo/yarn.lock |
CVE-2013-7035 | npm:eslint-plugin-react-hooks:1.7.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2013-7035 | npm:eslint-plugin-react-hooks:4.1.2 | src/frontend/efiling-demo/yarn.lock |
CVE-2013-7035 | npm:eslint-plugin-react-hooks:4.2.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2013-7035 | npm:prop-types:15.7.2 | src/frontend/efiling-demo/yarn.lock |
CVE-2013-7035 | npm:prop-types:15.7.2 | src/frontend/efiling-frontend/yarn.lock |
CVE-2013-7035 | npm:react-dom:16.13.1 | src/frontend/efiling-demo/yarn.lock |
CVE-2013-7035 | npm:react-dom:16.14.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2013-7035 | npm:react-is:16.13.1 | src/frontend/efiling-demo/yarn.lock |
CVE-2013-7035 | npm:react-is:16.13.1 | src/frontend/efiling-frontend/yarn.lock |
CVE-2013-7035 | npm:react-refresh:0.8.3 | src/frontend/efiling-demo/yarn.lock |
CVE-2013-7035 | npm:react-test-renderer:16.13.1 | src/frontend/efiling-demo/yarn.lock |
CVE-2013-7035 | npm:react-test-renderer:16.14.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2013-7035 | npm:react:16.13.1 | src/frontend/efiling-demo/yarn.lock |
CVE-2013-7035 | npm:react:16.14.0 | src/frontend/efiling-frontend/yarn.lock |
CVE-2013-7035 | npm:scheduler:0.19.1 | src/frontend/efiling-demo/yarn.lock |
CVE-2013-7035 | npm:scheduler:0.19.1 | src/frontend/efiling-frontend/yarn.lock |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
0 participants
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Bumps splunk-library-javalogging from 1.8.0 to 1.11.1.
Release notes
Sourced from splunk-library-javalogging's releases.
Changelog
Sourced from splunk-library-javalogging's changelog.
Commits
873187d
Update CHANGELOG.mdf62497c
Merge pull request #222 from manchicken/mainaf151b2
Upgrading log4J per CVE-2021-4422882eabd9
Merge pull request #205 from splunk/fix-timeout-typo6f1b0cd
Remove .factorypathe9885e4
Fix typo in logback terminationTimeout configbfd169b
Merge pull request #201 from splunk/release-1.11.0e211b17
release changesf681fb0
Merge pull request #179 from snorwin/await-termination-timeout4b7f686
Merge pull request #194 from splunk/release/1.10.0Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase
.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebase
will rebase this PR@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it@dependabot merge
will merge this PR after your CI passes on it@dependabot squash and merge
will squash and merge this PR after your CI passes on it@dependabot cancel merge
will cancel a previously requested merge and block automerging@dependabot reopen
will reopen this PR if it is closed@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot ignore this major version
will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor version
will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependency
will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)You can disable automated security fix PRs for this repo from the Security Alerts page.