The only supported version is the latest major version. Security fixes are not backported to earlier releases.
If you find a vulnerability in Maven-Lockfile, there are two preferred ways to report it.
If none of these ways work for you, please reach out to us by email without disclosing the vulnerability to discuss alternatives.
Send an email to any of the CHAINS project members listed in [https://github.com/chains-project](Github Page), and say that you've found a vulnerability. Do not disclose any details. The member will create a Security Advisory and invite you to it, where you can then safely disclose the vulnerability.
Some members have public PGP keys that you can use to encrypt a
message, for example using gpg. If you write down the vulnerability
in a file vuln.txt, you can encrypt it with gpg like so:
$ gpg --recv-keys <key_fingerprint> # fetch the key
$ gpg --encrypt --armor -r <key_fingerprints> vuln.txt # encrypt the messageThis creates a file vuln.txt.asc that you can then attach to an email.