Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[DepShield] (CVSS 5.9) Vulnerability due to usage of golang.org/x:crypto:0.0.0-20180904163835-0709b304e793 #5

Closed
sonatype-depshield bot opened this issue Sep 15, 2019 · 1 comment
Labels
type/bug Something isn't working

Comments

@sonatype-depshield
Copy link

Vulnerabilities

DepShield reports that this application's usage of golang.org/x:crypto:0.0.0-20180904163835-0709b304e793 results in the following vulnerability(s):


Occurrences

golang.org/x:crypto:0.0.0-20180904163835-0709b304e793 is a transitive dependency introduced by the following direct dependency(s):

github.com/kpango:gache:1.1.22
        └─ github.com/prologic:bitcask:0.3.4
              └─ github.com/spf13:viper:1.4.0
                    └─ github.com/prometheus:client_golang:0.9.3
                          └─ github.com/prometheus:common:0.4.0
                                └─ github.com/sirupsen:logrus:1.2.0
                                      └─ golang.org/x:crypto:0.0.0-20180904163835-0709b304e793

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

@issue-label-bot
Copy link

Issue-Label Bot is automatically applying the label bug to this issue, with a confidence of 0.94. Please mark this comment with 👍 or 👎 to give our bot feedback!

Links: app homepage, dashboard and code for this bot.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
type/bug Something isn't working
Projects
None yet
Development

No branches or pull requests

1 participant