You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Affected versions of this package are vulnerable to Integer Overflow by allowing remote authenticated attackers to cause a heap-based buffer overflow in serialisation process.
The text was updated successfully, but these errors were encountered:
lbeaufort
changed the title
[High]fecgov/openFEC:data/flyway/build.gradle - need a fix by May 17, 2019
[High] fecgov/openFEC:data/flyway/build.gradle - need a fix by May 17, 2019
Apr 26, 2019
jason-upchurch
changed the title
[High] fecgov/openFEC:data/flyway/build.gradle - need a fix by May 17, 2019
[High] Snyk: Integer Overflow (due 5/17/19)
May 16, 2019
Integer Overflow
Vulnerable module: com.google.protobuf:protobuf-java
Introduced through: org.flywaydb:[email protected]
Detailed paths
Introduced through: [email protected] › org.flywaydb:[email protected] › mysql:[email protected] › com.google.protobuf:[email protected]
Overview
com.google.protobuf:protobuf-java is a Google's language-neutral, platform-neutral, extensible mechanism for serializing structured data.
Affected versions of this package are vulnerable to Integer Overflow by allowing remote authenticated attackers to cause a heap-based buffer overflow in serialisation process.
The text was updated successfully, but these errors were encountered: