Trivy Vulnerability Report for branch private/harsh/soc2-scan #80
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🛡️ Trivy Scan Report for branch
private/harsh/soc2-scanFile: cmd/go.mod
• Vulnerability ID: CVE-2025-22868
• Pkg: golang.org/x/oauth2 v0.23.0
• Severity: HIGH
• Title: golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws
File: go.mod
• Vulnerability ID: CVE-2024-41110
• Pkg: github.com/docker/docker v24.0.7+incompatible
• Severity: CRITICAL
• Title: moby: Authz zero length regression
File: go.mod
• Vulnerability ID: CVE-2024-45337
• Pkg: golang.org/x/crypto v0.17.0
• Severity: CRITICAL
• Title: golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto
File: go.mod
• Vulnerability ID: CVE-2025-22869
• Pkg: golang.org/x/crypto v0.17.0
• Severity: HIGH
• Title: golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh
File: go.mod
• Vulnerability ID: CVE-2025-22868
• Pkg: golang.org/x/oauth2 v0.6.0
• Severity: HIGH
• Title: golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws