| Vulnerabilities | |||||
|---|---|---|---|---|---|
| Version | Suggest | Low | Medium | High | Critical |
| 2.0.0 | 0 | 0 | 0 | 0 | 0 |
| 1.37.5 | 0 | 0 | 0 | 0 | 0 |
| 1.37.4 | 0 | 0 | 0 | 0 | 0 |
| 1.37.3 | 0 | 0 | 0 | 0 | 0 |
| 1.37.2 | 0 | 0 | 1 | 0 | 0 |
| 1.37.1 | 0 | 0 | 1 | 0 | 0 |
| 1.37.0 | 0 | 0 | 1 | 0 | 0 |
| 1.36.0 | 0 | 0 | 1 | 0 | 0 |
| 1.35.0 | 0 | 0 | 1 | 0 | 0 |
| 1.34.2 | 0 | 0 | 0 | 0 | 0 |
| 1.34.1 | 0 | 0 | 1 | 0 | 0 |
| 1.34.0 | 0 | 0 | 1 | 0 | 0 |
| 1.33.0 | 0 | 0 | 1 | 0 | 0 |
| 1.32.0 | 0 | 0 | 1 | 0 | 0 |
| 1.31.0 | 0 | 0 | 1 | 0 | 0 |
| 1.30.0 | 0 | 0 | 1 | 0 | 0 |
| 1.29.0 | 0 | 0 | 1 | 0 | 0 |
| 1.28.0 | 0 | 0 | 1 | 0 | 0 |
| 1.27.1 | 0 | 0 | 1 | 0 | 0 |
| 1.27.0 | 0 | 0 | 1 | 0 | 0 |
| 1.26.0 | 0 | 0 | 1 | 0 | 0 |
| 1.25.1 | 0 | 0 | 1 | 0 | 0 |
| 1.25.0 | 0 | 0 | 1 | 0 | 0 |
| 1.24.0 | 0 | 0 | 1 | 0 | 0 |
| 1.23.0 | 0 | 0 | 1 | 0 | 0 |
| 1.22.0 | 0 | 0 | 1 | 0 | 0 |
| 1.21.0 | 0 | 0 | 1 | 0 | 0 |
| 1.20 | 0 | 0 | 1 | 0 | 0 |
| 1.19 | 0 | 0 | 1 | 0 | 0 |
| 1.18 | 0 | 0 | 1 | 0 | 0 |
| 1.17.0 | 0 | 0 | 1 | 0 | 0 |
| 1.16.0 | 0 | 0 | 1 | 0 | 0 |
| 1.15.0 | 0 | 0 | 1 | 0 | 0 |
| 1.14.0 | 0 | 0 | 1 | 0 | 0 |
| 1.13.0 | 0 | 0 | 1 | 0 | 0 |
| 1.12.0 | 0 | 0 | 1 | 0 | 0 |
| 1.11.0 | 0 | 0 | 1 | 0 | 0 |
| 1.10.0 | 0 | 0 | 1 | 0 | 0 |
| 1.9.0 | 0 | 0 | 1 | 0 | 0 |
| 1.8.0 | 0 | 0 | 1 | 0 | 0 |
| 1.7.0 | 0 | 0 | 1 | 0 | 0 |
| 1.6.0 | 0 | 0 | 1 | 0 | 0 |
| 1.5.0 | 0 | 0 | 1 | 0 | 0 |
| 1.4.0 | 0 | 0 | 1 | 0 | 0 |
| 1.3.0 | 0 | 0 | 1 | 0 | 0 |
| 1.2.0 | 0 | 0 | 1 | 0 | 0 |
| 1.1.0 | 0 | 0 | 1 | 0 | 0 |
| 1.0.4 | 0 | 0 | 1 | 0 | 0 |
| 1.0.3 | 0 | 0 | 1 | 0 | 0 |
| 1.0.2 | 0 | 0 | 1 | 0 | 0 |
| 1.0.1 | 0 | 0 | 1 | 0 | 0 |
| 1.0.0b2 | 0 | 0 | 1 | 0 | 0 |
| 1.0.0b1 | 0 | 0 | 1 | 0 | 0 |
| 1.0.0 | 0 | 0 | 1 | 0 | 0 |
| 0.1.6 | 0 | 0 | 1 | 0 | 0 |
| 0.1.5 | 0 | 0 | 1 | 0 | 0 |
| 0.1.4 | 0 | 0 | 1 | 0 | 0 |
| 0.1.3 | 0 | 0 | 1 | 0 | 0 |
| 0.1.1 | 0 | 0 | 1 | 0 | 0 |
| 0.1.0a1 | 0 | 0 | 1 | 0 | 0 |
| 0.1.0 | 0 | 0 | 1 | 0 | 0 |
2.0.0 - This version is safe to use because it has no known security vulnerabilities at this time. Find out if your coding project uses this component and get notified of any reported security vulnerabilities with Meterian-X Open Source Security Platform
Maintain your licence declarations and avoid unwanted licences to protect your IP the way you intended.
Apache-1.0 - Apache License 1.0The shared common utilities for dbt-core and adapter implementations use
To release a new version of dbt-common to pypi, you'll need to:
dbt-common in dbt-core and dbt-adapters if you're releasing a new major version or a pre-release:
dbt-core: setup.py
dbt-adapters: pyproject.toml
dbt-postgres: pyproject.toml
dbt-snowflake: setup.py
dbt-bigquery: setup.py
dbt-redshift: setup.py
dbt-spark: setup.py
Everyone interacting in the dbt project's codebases, issue trackers, chat rooms, and mailing lists is expected to follow the dbt Code of Conduct.