-
Notifications
You must be signed in to change notification settings - Fork 9
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
9 changed files
with
17 additions
and
12 deletions.
There are no files selected for viewing
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -26,7 +26,7 @@ fixtures/locks-e2e/1-yarn.lock: found 1678 packages | |
[email protected] is affected by the following vulnerabilities: | ||
GHSA-6h5x-7c5m-7cr7: Exposure of Sensitive Information in eventsource (https://github.com/advisories/GHSA-6h5x-7c5m-7cr7) | ||
[email protected] is affected by the following vulnerabilities: | ||
GHSA-ww39-953v-wcq6: glob-parent before 5.1.2 vulnerable to Regular Expression Denial of Service in enclosure regex (https://github.com/advisories/GHSA-ww39-953v-wcq6) | ||
GHSA-ww39-953v-wcq6: glob-parent vulnerable to Regular Expression Denial of Service in enclosure regex (https://github.com/advisories/GHSA-ww39-953v-wcq6) | ||
[email protected] is affected by the following vulnerabilities: | ||
GHSA-6g8v-hpgw-h2v7: Prototype pollution in gsap (https://github.com/advisories/GHSA-6g8v-hpgw-h2v7) | ||
[email protected] is affected by the following vulnerabilities: | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -10,8 +10,8 @@ fixtures/locks-e2e/2-go.mod: found 73 packages | |
GHSA-6jvc-q2x7-pchv: AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field (https://github.com/advisories/GHSA-6jvc-q2x7-pchv) | ||
GHSA-7f33-f4f5-xwgw: In-band key negotiation issue in AWS S3 Crypto SDK for golang (https://github.com/advisories/GHSA-7f33-f4f5-xwgw) | ||
github.com/hashicorp/[email protected] is affected by the following vulnerabilities: | ||
GHSA-27rq-4943-qcwp: Insertion of Sensitive Information into Log File in Hashicorp go-getter (https://github.com/advisories/GHSA-27rq-4943-qcwp) | ||
GHSA-28r2-q6m8-9hpx: HashiCorp go-getter unsafe downloads could lead to asymmetric resource exhaustion (https://github.com/advisories/GHSA-28r2-q6m8-9hpx) | ||
GHSA-27rq-4943-qcwp: Insertion of Sensitive Information into Log File in Hashicorp go-getter (https://github.com/advisories/GHSA-27rq-4943-qcwp) | ||
GHSA-cjr4-fv6c-f3mv: HashiCorp go-getter unsafe downloads could lead to arbitrary host access (https://github.com/advisories/GHSA-cjr4-fv6c-f3mv) | ||
GHSA-fcgg-rvwg-jv58: HashiCorp go-getter unsafe downloads (https://github.com/advisories/GHSA-fcgg-rvwg-jv58) | ||
GHSA-jpxj-2jvg-6jv9: Data Amplification in HashiCorp go-getter (https://github.com/advisories/GHSA-jpxj-2jvg-6jv9) | ||
|
@@ -26,6 +26,7 @@ fixtures/locks-e2e/2-go.mod: found 73 packages | |
GHSA-69cg-p879-7622: golang.org/x/net/http2 Denial of Service vulnerability (https://github.com/advisories/GHSA-69cg-p879-7622) | ||
GHSA-83g2-8m93-v3w7: golang.org/x/net/html Infinite Loop vulnerability (https://github.com/advisories/GHSA-83g2-8m93-v3w7) | ||
GHSA-h86h-8ppg-mxmh: golang.org/x/net/http/httpguts vulnerable to Uncontrolled Recursion (https://github.com/advisories/GHSA-h86h-8ppg-mxmh) | ||
GHSA-qppj-fm5r-hxr3: swift-nio-http2 vulnerable to HTTP/2 Stream Cancellation Attack (https://github.com/advisories/GHSA-qppj-fm5r-hxr3) | ||
GHSA-vvpx-j8f3-3w6h: Uncontrolled Resource Consumption (https://github.com/advisories/GHSA-vvpx-j8f3-3w6h) | ||
GO-2022-0288: Unbounded memory growth in net/http and golang.org/x/net/http2 | ||
GO-2022-1144: Excessive memory growth in net/http and golang.org/x/net/http2 | ||
|
@@ -38,4 +39,4 @@ fixtures/locks-e2e/2-go.mod: found 73 packages | |
GHSA-m425-mq94-257g: gRPC-Go HTTP/2 Rapid Reset vulnerability (https://github.com/advisories/GHSA-m425-mq94-257g) | ||
GHSA-qppj-fm5r-hxr3: swift-nio-http2 vulnerable to HTTP/2 Stream Cancellation Attack (https://github.com/advisories/GHSA-qppj-fm5r-hxr3) | ||
|
||
25 known vulnerabilities found in fixtures/locks-e2e/2-go.mod | ||
26 known vulnerabilities found in fixtures/locks-e2e/2-go.mod |
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -45,9 +45,9 @@ fixtures/locks-e2e/2-yarn.lock: found 1991 packages | |
[email protected] is affected by the following vulnerabilities: | ||
GHSA-4q6p-r6v2-jvc5: Chaijs/get-func-name vulnerable to ReDoS (https://github.com/advisories/GHSA-4q6p-r6v2-jvc5) | ||
[email protected] is affected by the following vulnerabilities: | ||
GHSA-ww39-953v-wcq6: glob-parent before 5.1.2 vulnerable to Regular Expression Denial of Service in enclosure regex (https://github.com/advisories/GHSA-ww39-953v-wcq6) | ||
GHSA-ww39-953v-wcq6: glob-parent vulnerable to Regular Expression Denial of Service in enclosure regex (https://github.com/advisories/GHSA-ww39-953v-wcq6) | ||
[email protected] is affected by the following vulnerabilities: | ||
GHSA-ww39-953v-wcq6: glob-parent before 5.1.2 vulnerable to Regular Expression Denial of Service in enclosure regex (https://github.com/advisories/GHSA-ww39-953v-wcq6) | ||
GHSA-ww39-953v-wcq6: glob-parent vulnerable to Regular Expression Denial of Service in enclosure regex (https://github.com/advisories/GHSA-ww39-953v-wcq6) | ||
[email protected] is affected by the following vulnerabilities: | ||
GHSA-7wwv-vh3v-89cq: ReDOS vulnerabities: multiple grammars (https://github.com/advisories/GHSA-7wwv-vh3v-89cq) | ||
[email protected] is affected by the following vulnerabilities: | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -17,7 +17,7 @@ fixtures/locks-e2e/3-yarn.lock: found 1225 packages | |
[email protected] is affected by the following vulnerabilities: | ||
GHSA-w573-4hg7-7wgq: decode-uri-component vulnerable to Denial of Service (DoS) (https://github.com/advisories/GHSA-w573-4hg7-7wgq) | ||
[email protected] is affected by the following vulnerabilities: | ||
GHSA-ww39-953v-wcq6: glob-parent before 5.1.2 vulnerable to Regular Expression Denial of Service in enclosure regex (https://github.com/advisories/GHSA-ww39-953v-wcq6) | ||
GHSA-ww39-953v-wcq6: glob-parent vulnerable to Regular Expression Denial of Service in enclosure regex (https://github.com/advisories/GHSA-ww39-953v-wcq6) | ||
[email protected] is affected by the following vulnerabilities: | ||
GHSA-pfrx-2q88-qq97: Got allows a redirect to a UNIX socket (https://github.com/advisories/GHSA-pfrx-2q88-qq97) | ||
[email protected] is affected by the following vulnerabilities: | ||
|