ci #1612
Annotations
7 errors and 11 warnings
Scan for vulnerabilities
CVE-2024-45338 - HIGH severity - golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html vulnerability in golang.org/x/net
|
Scan for vulnerabilities
CVE-2024-34156 - HIGH severity - encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion vulnerability in stdlib
|
Scan for vulnerabilities
CVE-2024-34156 - HIGH severity - encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion vulnerability in stdlib
|
Scan for vulnerabilities
CVE-2024-34156 - HIGH severity - encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion vulnerability in stdlib
|
Scan for vulnerabilities
CVE-2024-34156 - HIGH severity - encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion vulnerability in stdlib
|
Scan for vulnerabilities
CVE-2024-45338 - HIGH severity - golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html vulnerability in golang.org/x/net
|
Scan for vulnerabilities
CVE-2024-45338 - HIGH severity - golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html vulnerability in golang.org/x/net
|
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
Scan for vulnerabilities
Dockerfile not provided. Skipping sarif scan result.
|
Scan for vulnerabilities
CVE-2024-24791 - MEDIUM severity - net/http: Denial of service due to improper 100-continue handling in net/http vulnerability in stdlib
|
Scan for vulnerabilities
CVE-2024-34155 - MEDIUM severity - go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion vulnerability in stdlib
|
Scan for vulnerabilities
CVE-2024-34158 - MEDIUM severity - go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion vulnerability in stdlib
|
Scan for vulnerabilities
CVE-2024-24791 - MEDIUM severity - net/http: Denial of service due to improper 100-continue handling in net/http vulnerability in stdlib
|
Scan for vulnerabilities
CVE-2024-34155 - MEDIUM severity - go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion vulnerability in stdlib
|
Scan for vulnerabilities
CVE-2024-34158 - MEDIUM severity - go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion vulnerability in stdlib
|
Scan for vulnerabilities
CVE-2024-24791 - MEDIUM severity - net/http: Denial of service due to improper 100-continue handling in net/http vulnerability in stdlib
|
Scan for vulnerabilities
CVE-2024-34155 - MEDIUM severity - go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion vulnerability in stdlib
|
Scan for vulnerabilities
CVE-2024-34158 - MEDIUM severity - go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion vulnerability in stdlib
|
Loading