Skip to content

feat: Migrate to cstar#137

Draft
lucaconsalvi wants to merge 21 commits intomainfrom
migrate-to-cstar
Draft

feat: Migrate to cstar#137
lucaconsalvi wants to merge 21 commits intomainfrom
migrate-to-cstar

Conversation

@lucaconsalvi
Copy link

No description provided.

@github-advanced-security
Copy link

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.

xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 https://maven.apache.org/xsd/maven-4.0.0.xsd"
xmlns="http://maven.apache.org/POM/4.0.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<?xml version="1.0" encoding="UTF-8"?>

Check warning

Code scanning / Trivy

io.vertx:vertx-grpc-client: io.vertx:vertx-grpc-server: Vertx gRPC server does not limit the maximum message size

Package: io.vertx:vertx-grpc-client Installed Version: 4.5.9 Vulnerability CVE-2024-8391 Severity: MEDIUM Fixed Version: 4.5.10 Link: [CVE-2024-8391](https://avd.aquasec.com/nvd/cve-2024-8391)
xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 https://maven.apache.org/xsd/maven-4.0.0.xsd"
xmlns="http://maven.apache.org/POM/4.0.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<?xml version="1.0" encoding="UTF-8"?>

Check warning

Code scanning / Trivy

io.vertx:vertx-grpc-client: io.vertx:vertx-grpc-server: Vertx gRPC server does not limit the maximum message size

Package: io.vertx:vertx-grpc-server Installed Version: 4.5.9 Vulnerability CVE-2024-8391 Severity: MEDIUM Fixed Version: 4.5.10 Link: [CVE-2024-8391](https://avd.aquasec.com/nvd/cve-2024-8391)
@sonarqubecloud
Copy link

xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 https://maven.apache.org/xsd/maven-4.0.0.xsd"
xmlns="http://maven.apache.org/POM/4.0.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<?xml version="1.0" encoding="UTF-8"?>

Check failure

Code scanning / Trivy

protobuf: StackOverflow vulnerability in Protocol Buffers

Package: com.google.protobuf:protobuf-java Installed Version: 3.25.3 Vulnerability CVE-2024-7254 Severity: HIGH Fixed Version: 3.25.5, 4.27.5, 4.28.2 Link: [CVE-2024-7254](https://avd.aquasec.com/nvd/cve-2024-7254)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant