Not for review #2156
Not for review #2156
7 new alerts including 4 high severity security vulnerabilities
New alerts in code changed by this pull request
Security Alerts:
- 4 high
- 3 medium
Alerts not introduced by this pull request might have been detected because the code changes were too large.
See annotations below for details.
Annotations
Code scanning / trivy-fs
gRPC-Go HTTP/2 Rapid Reset vulnerability High test
Code scanning / trivy-fs
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) Medium test
Code scanning / trivy-fs
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON High test
Code scanning / trivy-fs
gRPC-Go HTTP/2 Rapid Reset vulnerability High test
Code scanning / trivy-fs
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) Medium test
Code scanning / trivy-fs
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON High test
Check warning on line 1 in src/stirling/testing/demo_apps/go_https/client/testdata/go.mod
Code scanning / trivy-fs
golang.org/x/net/proxy: golang.org/x/net/http/httpproxy: HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net Medium test