viadee / vPAV

viadee Process Application Validator
https://www.viadee.de/java/process-application-validator
BSD 3-Clause "New" or "Revised" License
48 stars 14 forks source link

Bump dependency-check-maven from 7.4.1 to 8.0.1 #434

Closed dependabot[bot] closed 1 year ago

dependabot[bot] commented 1 year ago

Bumps dependency-check-maven from 7.4.1 to 8.0.1.

Release notes

Sourced from dependency-check-maven's releases.

Version 8.0.1

Fixed

See the full listing of changes.

Version 8.0.0

Added

  • Utilize the hosted suppression file to allow for faster remediation of reported False Positives (#4723).
  • Include the CISA Known Exploited Vulnerability Catalog (#4878).
  • The gradle and maven plugins now have the capability to scan the build plugins (#4035).
  • The gradle and maven plugins, for transitive dependencies, will report the root dependency in the project that included the transitive dependency (#5001).
  • Added properties.security-severity to SARIF report for better integration with GitHub Security Code scanning (#5277).
  • Allow for HTTP auth settings for Retire JS respository (#5209).
  • New schema for the XML report was added to support some of the above additions (#5296).
  • Added missing gradle option to only warn on remote errors from the OSS Index Analyzer ([gradle #303](dependency-check/dependency-check-gradle#303)).

Changed

  • Breaking: the database schema updated - if using an external database the update scripts must be run!
  • The exit codes from the CLI have been changed to be in the range from 0-255 (#4511.
  • The OSS Index Analyzer will automatically disable itself if a transport error occurs - preventing copious errors from being reported (#5300).

Fixed

  • Added an additional check for rejected CVEs to reduce FP (#5268.
  • Corrected the analysis of node_modules to prevent NPEs (#5266).
  • Fixed error when scanning node packages with local dependencies (#5235).
  • Fixed NPE in the MSBuild Analyzer (#5293).
  • Several False Positives have been resolved.

See the full listing of changes.

Version 7.4.4

Fixed

  • Resolved issue processing NVD CVE data due to column width (#5229)

See the full listing of changes.

Version 7.4.3

Fixed

... (truncated)

Changelog

Sourced from dependency-check-maven's changelog.

Version 8.0.1 (2023-01-18)

Fixed

See the full listing of changes.

Version 8.0.0 (2023-01-15)

Added

  • Utilize the hosted suppression file to allow for faster remediation of reported False Positives (#4723).
  • Include the CISA Known Exploited Vulnerability Catalog (#4878).
  • The gradle and maven plugins now have the capability to scan the build plugins (#4035).
  • The gradle and maven plugins, for transitive dependencies, will report the root dependency in the project that included the transitive dependency (#5001).
  • Added properties.security-severity to SARIF report for better integration with GitHub Security Code scanning (#5277).
  • Allow for HTTP auth settings for Retire JS respository (#5209).
  • New schema for the XML report was added to support some of the above additions (#5296).
  • Added missing gradle option to only warn on remote errors from the OSS Index Analyzer ([gradle #303](dependency-check/dependency-check-gradle#303)).

Changed

  • Breaking: the database schema updated - if using an external database the update scripts must be run!
  • The exit codes from the CLI have been changed to be in the range from 0-255 (#4511.
  • The OSS Index Analyzer will automatically disable itself if a transport error occurs - preventing copious errors from being reported (#5300).

Fixed

  • Added an additional check for rejected CVEs to reduce FP (#5268.
  • Corrected the analysis of node_modules to prevent NPEs (#5266).
  • Fixed error when scanning node packages with local dependencies (#5235).
  • Fixed NPE in the MSBuild Analyzer (#5293).
  • Several False Positives have been resolved.

See the full listing of changes.

Version 7.4.4 (2023-01-06)

Fixed

  • Resolved issue processing NVD CVE data due to column width (#5229)

See the full listing of changes.

... (truncated)

Commits


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
dependabot[bot] commented 1 year ago

Superseded by #435.