Skip to content

Conversation

@github-actions
Copy link

🛡️ Trivy Scan Report for branch private/harsh/soc2-scan

  • File: cmd/go.mod
    • Vulnerability ID: CVE-2025-22868
    • Pkg: golang.org/x/oauth2 v0.23.0
    • Severity: HIGH
    • Title: golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws

  • File: go.mod
    • Vulnerability ID: CVE-2024-41110
    • Pkg: github.com/docker/docker v24.0.7+incompatible
    • Severity: CRITICAL
    • Title: moby: Authz zero length regression

  • File: go.mod
    • Vulnerability ID: CVE-2024-45337
    • Pkg: golang.org/x/crypto v0.17.0
    • Severity: CRITICAL
    • Title: golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto

  • File: go.mod
    • Vulnerability ID: CVE-2025-22869
    • Pkg: golang.org/x/crypto v0.17.0
    • Severity: HIGH
    • Title: golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh

  • File: go.mod
    • Vulnerability ID: CVE-2025-22868
    • Pkg: golang.org/x/oauth2 v0.6.0
    • Severity: HIGH
    • Title: golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws

@github-actions github-actions bot force-pushed the auto/trivy-scan/private-harsh-soc2-scan branch from d71a620 to 7003f4a Compare August 28, 2025 09:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant