forked from nihonium/linux-auth
25 lines
985 B
Text
25 lines
985 B
Text
=== Symbol Results ===
|
|
|
|
Vulnerability #1: GO-2026-4341
|
|
Memory exhaustion in query parameter parsing in net/url
|
|
More info: https://pkg.go.dev/vuln/GO-2026-4341
|
|
Standard library
|
|
Found in: net/url@go1.24.4
|
|
Fixed in: net/url@go1.24.12
|
|
Example traces found:
|
|
#1: internal/db/sqlite.go:32:26: db.Init calls sql.Open, which eventually calls url.ParseQuery
|
|
|
|
Vulnerability #2: GO-2025-3849
|
|
Incorrect results returned from Rows.Scan in database/sql
|
|
More info: https://pkg.go.dev/vuln/GO-2025-3849
|
|
Standard library
|
|
Found in: database/sql@go1.24.4
|
|
Fixed in: database/sql@go1.24.6
|
|
Example traces found:
|
|
#1: internal/db/sqlite.go:89:17: db.GetUser calls sql.Row.Scan
|
|
|
|
Your code is affected by 2 vulnerabilities from the Go standard library.
|
|
This scan also found 4 vulnerabilities in packages you import and 29
|
|
vulnerabilities in modules you require, but your code doesn't appear to call
|
|
these vulnerabilities.
|
|
Use '-show verbose' for more details.
|