Skip to content

Conversation

@github-actions
Copy link

🛡️ Trivy Scan Report for branch main

  • File: cmd/go.mod
    • Vulnerability ID: CVE-2025-22868
    • Pkg: golang.org/x/oauth2 v0.23.0
    • Severity: HIGH
    • Title: golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws

  • File: go.mod
    • Vulnerability ID: CVE-2024-41110
    • Pkg: github.com/docker/docker v24.0.7+incompatible
    • Severity: CRITICAL
    • Title: moby: Authz zero length regression

  • File: go.mod
    • Vulnerability ID: CVE-2024-45337
    • Pkg: golang.org/x/crypto v0.17.0
    • Severity: CRITICAL
    • Title: golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto

  • File: go.mod
    • Vulnerability ID: CVE-2025-22869
    • Pkg: golang.org/x/crypto v0.17.0
    • Severity: HIGH
    • Title: golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh

  • File: go.mod
    • Vulnerability ID: CVE-2025-22868
    • Pkg: golang.org/x/oauth2 v0.6.0
    • Severity: HIGH
    • Title: golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant