Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: exclude copilot from javadoc generation [skip ci] (#7179) (CP: 24.6) #7180

Merged
merged 1 commit into from
Jan 9, 2025

Conversation

vaadin-bot
Copy link
Contributor

No description provided.

@ZheSun88 ZheSun88 enabled auto-merge (squash) January 9, 2025 09:44
@ZheSun88 ZheSun88 merged commit 757fe4a into 24.6 Jan 9, 2025
3 of 4 checks passed
@ZheSun88 ZheSun88 deleted the cherry-pick-7179-to-24.6-1736415837229 branch January 9, 2025 09:53
Copy link

github-actions bot commented Jan 9, 2025

Dependencies Report

  • 🚫 Vulnerabilities:

    • Vulnerabilities in: pkg:maven/ch.qos.logback/logback-core@1.5.12 [CVE-2024-12801, CVE-2024-12798] (osv-scan,owasp)
      · cpe:2.3:a:ch.qos.logback:logback-core:1.5.12:::::::*
    • Vulnerabilities in: pkg:npm/libxmljs2@0.35.0 [CVE-2024-34394] (osv-scan)
      👌 This is coming from the tools, @cyclonedx/cyclonedx, we have used for sbom module, FP for us.
      ·
    • Vulnerabilities in: pkg:maven/com.squareup.okhttp3/logging-interceptor@3.12.12 [CVE-2023-0833] (owasp)
      · cpe:2.3:a:redhat:a-mq_streams::::::::
      · cpe:2.3:a:squareup:okhttp::::::::
  • 🟠 Known Vulnerabilities:

    • Vulnerabilities in: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.15.3 [CVE-2023-35116] (owasp)
      👌 Not a valid CVE report based on the vendor analysis and research
      · cpe:2.3:a:fasterxml:jackson-databind::::::::
    • Vulnerabilities in: pkg:maven/me.friwi/jcef-api@jcef-99c2f7a%2Bcef-127.3.1%2Bg6cbb30e%2Bchromium-127.0.6533.100 [CVE-2024-21639, CVE-2024-21640] (owasp)
      👌 Wait for the update from the jcefmaven community. Meanwhile the swing-kit is supposed to be used with fixed websites and not to browse the internet, we have a check for that, so the only possible attacker would be the same person that created the swing application, aka our customer devs. so this vulnerability is not classified by us as critical issue
      · cpe:2.3:a:chromiumembedded:chromium_embedded_framework::::::::
  • 📔 No Core License Issues

  • 📔 No License Issues

  • 🟠 Changes in 24.6-SNAPSHOT since V24.6.1

    • 5 packages modified (5 external, 0 vaadin)
    • 1097 packages same (871 external, 226 vaadin)

[Click for more Details]

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants