-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Migrate to cstar #137
base: main
Are you sure you want to change the base?
Conversation
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 https://maven.apache.org/xsd/maven-4.0.0.xsd" | ||
xmlns="http://maven.apache.org/POM/4.0.0" | ||
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"> | ||
<?xml version="1.0" encoding="UTF-8"?> |
Check warning
Code scanning / Trivy
io.vertx:vertx-grpc-client: io.vertx:vertx-grpc-server: Vertx gRPC server does not limit the maximum message size Medium
Installed Version: 4.5.9
Vulnerability CVE-2024-8391
Severity: MEDIUM
Fixed Version: 4.5.10
Link: CVE-2024-8391
xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 https://maven.apache.org/xsd/maven-4.0.0.xsd" | ||
xmlns="http://maven.apache.org/POM/4.0.0" | ||
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"> | ||
<?xml version="1.0" encoding="UTF-8"?> |
Check warning
Code scanning / Trivy
io.vertx:vertx-grpc-client: io.vertx:vertx-grpc-server: Vertx gRPC server does not limit the maximum message size Medium
Installed Version: 4.5.9
Vulnerability CVE-2024-8391
Severity: MEDIUM
Fixed Version: 4.5.10
Link: CVE-2024-8391
Quality Gate passedIssues Measures |
xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 https://maven.apache.org/xsd/maven-4.0.0.xsd" | ||
xmlns="http://maven.apache.org/POM/4.0.0" | ||
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"> | ||
<?xml version="1.0" encoding="UTF-8"?> |
Check failure
Code scanning / Trivy
protobuf: StackOverflow vulnerability in Protocol Buffers High
Installed Version: 3.25.3
Vulnerability CVE-2024-7254
Severity: HIGH
Fixed Version: 3.25.5, 4.27.5, 4.28.2
Link: CVE-2024-7254
No description provided.