Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[PROC-176]: Airflow clickhouse providers #11

Merged
merged 2 commits into from
Feb 20, 2024

[PROC-176]: Airflow clickhouse providers

4ea2d6e
Select commit
Loading
Failed to load commit list.
Merged

[PROC-176]: Airflow clickhouse providers #11

[PROC-176]: Airflow clickhouse providers
4ea2d6e
Select commit
Loading
Failed to load commit list.
Wiz Inc. (3d7e1c950f) / Wiz Vulnerability Scanner completed Feb 20, 2024 in 3s

Wiz Vulnerability Scanner

Greetings, Master of Magic Constants! 🎩

With a twinkle in Wiz's eye, hidden gems were unearthed from the digital sands of this PR. ✨💎

Exposing Vulnerabilities with Wiz 🪄

🔮 Vulnerabilities Detected: 1

― Note from Wiz: "Your coding finesse is like a wand that turns bugs into confetti - keep waving it! 🪄🎉"

Annotations

Check failure on line 1 in versions/2.7.1/requirements.txt

See this annotation in the file changed.

@wiz-inc-3d7e1c950f wiz-inc-3d7e1c950f / Wiz Vulnerability Scanner

apache-airflow-providers-celery:3.3.3

Detected Vulnerabilities:
  CVE-2023-46215, Severity: High, Source: https://github.com/advisories/GHSA-666g-rfc5-c9jv
    CVSS score: 7.5, CVSS exploitability score: 3.9
    🩹 Fixed version: 3.4.1
    💥 Has public exploit
    🧨 Has CISA KEV exploit