← All images

minio

Updated: 2026-04-29 05:50 UTC  |  Commit: d48be5a

PackageVersionSeverityCVEFix VersionDescription
google.golang.org/grpcv1.72.0CRITICALGHSA-p77j-4mvh-x3m31.79.3gRPC-Go has an authorization bypass via missing leading slash in :path
github.com/buger/jsonparserv1.1.1HIGHGHSA-6g7g-w4f8-9c9x1.1.2github.com/buger/jsonparser has a denial of service vulnerability
go.opentelemetry.io/otel/sdkv1.35.0HIGHGHSA-9h8m-3fm2-qjrq1.40.0OpenTelemetry Go SDK Vulnerable to Arbitrary Code Execution via PATH Hijacking
go.opentelemetry.io/otel/sdkv1.35.0HIGHGHSA-hfvc-g4fc-pqhx1.43.0opentelemetry-go: BSD kenv command not using absolute path enables PATH hijacking
golang.org/x/cryptov0.42.0MEDIUMGHSA-j5w8-q4qc-rx2x0.45.0golang.org/x/crypto/ssh allows an attacker to cause unbounded memory consumption
github.com/prometheus/prometheusv0.303.0MEDIUMGHSA-vffh-x6r8-xx990.311.2-0.20260410083055-07c6232d159bPrometheus has Stored XSS via metric names and label values in Prometheus web UI tooltips and metrics explorer
golang.org/x/cryptov0.42.0MEDIUMGHSA-f6x5-jh6r-wrfv0.45.0golang.org/x/crypto/ssh/agent vulnerable to panic if message is malformed due to out of bounds read