Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

build: failures on illumos-amd64 #59379

Closed
gopherbot opened this issue Apr 2, 2023 · 37 comments
Closed

build: failures on illumos-amd64 #59379

gopherbot opened this issue Apr 2, 2023 · 37 comments
Labels
Builders x/build issues (builders, bots, dashboards) NeedsInvestigation Someone must examine and confirm this is a valid issue and not a duplicate of an existing one. OS-illumos
Milestone

Comments

@gopherbot
Copy link

gopherbot commented Apr 2, 2023

#!watchflakes
default <- builder == "illumos-amd64" && date < "2023-05-01"

Issue created automatically to collect these failures.

Example (log):

go tool dist: unexpected stale targets reported by go list -gcflags="" -ldflags="" for [std cmd] (consider rerunning with GOMAXPROCS=1 GODEBUG=gocachehash=1):
	STALE cmd/go: not installed but available in build cache
	STALE cmd/pprof: not installed but available in build cache
	STALE cmd/trace: not installed but available in build cache


tests failed: dist test failed: go_test:archive/tar: exit status 1

watchflakes

@gopherbot gopherbot added the NeedsInvestigation Someone must examine and confirm this is a valid issue and not a duplicate of an existing one. label Apr 2, 2023
@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
post <- builder == "illumos-amd64" && repo == "go" && section == "" && pkg == "" && test == ""
2023-03-23 17:51 illumos-amd64 go@65fa8a69 (log)
go tool dist: unexpected stale targets reported by go list -gcflags="" -ldflags="" for [std cmd] (consider rerunning with GOMAXPROCS=1 GODEBUG=gocachehash=1):
	STALE cmd/go: not installed but available in build cache
	STALE cmd/pprof: not installed but available in build cache
	STALE cmd/trace: not installed but available in build cache


tests failed: dist test failed: go_test:archive/tar: exit status 1

watchflakes

@bcmills bcmills changed the title build: unrecognized failures on illumos-amd64 build: failures on illumos-amd64 Apr 3, 2023
@bcmills
Copy link
Contributor

bcmills commented Apr 3, 2023

watchflakes filed a bunch of additional issues for this builder, but it looks like a builder issue. I'm repurposing this issue as a catchall for the builder until it is fixed.

(attn @jclulow; CC @golang/illumos)

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-03-13 19:26 illumos-amd64 go@7c019c62 cmd/compile/internal/test.TestIntendedInlining (log)
--- FAIL: TestIntendedInlining (95.98s)
    exec.go:146: test timed out while running command: /var/tmp/workdir-host-illumos-amd64-jclulow/go/bin/go build -gcflags=-m -m -tags=math_big_pure_go bytes sync/atomic runtime runtime/internal/math regexp net sync unicode/utf8 reflect unicode/utf16 compress/flate encoding/base64 math/rand runtime/internal/sys math/big
    inl_test.go:325: exit status 2
2023-03-14 08:10 illumos-amd64 go@cedfcba3 cmd/compile/internal/test.TestStmtLines (log)
--- FAIL: TestStmtLines (172.25s)
    exec.go:146: test timed out while running command: /var/tmp/workdir-host-illumos-amd64-jclulow/go/bin/go build -ldflags=-w=0 -o /var/tmp/workdir-host-illumos-amd64-jclulow/tmp/TestStmtLines1982184918/001/test.exe cmd/go
    stmtlines_test.go:82: go build: exit status 2
        SIGQUIT: quit (ASCII FS)
        PC=0xfffffc7fef1f7f47 m=0 sigcode=0

        rax    0x5b
        rbx    0xfffffc7fef302a40
        rcx    0xfffffc7feed76000
        rdx    0x0
        rdi    0x0
        rsi    0x0
        rbp    0xfffffc7fffdff358
        rsp    0xfffffc7fffdff2f0
        r8     0x0
        r9     0xfffffc7feed6dcc0
        r10    0xfffffc7feed76000
        r11    0xfffffc7fffdff408
        r12    0xe93c50
        r13    0xfffffc7feed6dc80
        r14    0xe5dc60
        r15    0x0
        rip    0xfffffc7fef1f7f47
        rflags 0x247
        cs     0x53
        fs     0x0
        gs     0x0
2023-03-14 08:10 illumos-amd64 go@cedfcba3 cmd/compile/internal/test.TestIntendedInlining (log)
--- FAIL: TestIntendedInlining (90.60s)
    exec.go:146: test timed out while running command: /var/tmp/workdir-host-illumos-amd64-jclulow/go/bin/go build -gcflags=-m -m -tags=math_big_pure_go bytes sync math/big runtime/internal/math reflect regexp math/rand compress/flate unicode/utf8 encoding/base64 unicode/utf16 net sync/atomic runtime runtime/internal/sys
    inl_test.go:325: exit status 2
2023-03-14 08:10 illumos-amd64 go@cedfcba3 cmd/compile/internal/test.TestReproducibleBuilds (log)
--- FAIL: TestReproducibleBuilds (0.00s)
    --- FAIL: TestReproducibleBuilds/issue27013.go (2.12s)
        exec.go:146: test timed out while running command: /var/tmp/workdir-host-illumos-amd64-jclulow/go/bin/go tool compile -p=p -c 2 -o /var/tmp/workdir-host-illumos-amd64-jclulow/tmp/809123350 testdata/reproducible/issue27013.go
        reproduciblebuilds_test.go:44: failed to compile: signal: killed
            SIGQUIT: quit (ASCII FS)
            PC=0xfffffc7fef1f7f47 m=0 sigcode=0

            rax    0x5b
            rbx    0xfffffc7fef302a40
            rcx    0xfffffc7feed79000
            rdx    0x0
            rdi    0x0
            rsi    0x0
            rbp    0xfffffc7fffdff1e8
            rsp    0xfffffc7fffdff180
            r8     0x0
            r9     0xfffffc7feed68cc0
            r10    0xfffffc7feed79000
            r11    0xf5bfe0
            r12    0x14271f0
            r13    0xfffffc7feed68c80
            r14    0x13cf400
            r15    0x0
            rip    0xfffffc7fef1f7f47
            rflags 0x247
            cs     0x53
            fs     0x0
            gs     0x0
2023-03-14 13:17 illumos-amd64 go@035db07d cmd/compile/internal/test.TestPGOIntendedInliningShiftedLines (log)
--- FAIL: TestPGOIntendedInliningShiftedLines (18.62s)
    pgo_inl_test.go:99: child: # example.com/pgo/inline [example.com/pgo/inline.test]
    pgo_inl_test.go:99: child: ./inline_hot.go:26:6: can inline D with cost 7 as: func(uint) int { return int((i + (wSize - 1)) >> lWSize) }
    pgo_inl_test.go:99: child: ./inline_hot.go:30:6: can inline N with cost 20 as: func(uint) *BS { bs = &BS{...}; return bs }
    pgo_inl_test.go:99: child: ./inline_hot.go:33:19: inlining call to D
    pgo_inl_test.go:99: child: ./inline_hot.go:39:6: can inline (*BS).S with cost 14 as: method(*BS) func(uint) *BS { b.s[i >> lWSize] |= 1 << (i & (wSize - 1)); return b }
    pgo_inl_test.go:99: child: ./inline_hot.go:51:6: can inline T with cost 12 as: func(uint64) uint { return uint(jn[v & -v * 0x03f79d71b4ca8b09 >> 58]) }
    pgo_inl_test.go:99: child: ./inline_hot.go:55:6: can inline (*BS).NS with cost 106 as: method(*BS) func(uint) (uint, bool) { x := int(i >> lWSize); if x >= len(b.s) { return 0, false }; w := b.s[x]; w = w >> (i & (wSize - 1)); if w != 0 { return i + T(w), true }; x = x + 1; for loop; return 0, false }
    pgo_inl_test.go:99: child: ./inline_hot.go:63:15: inlining call to T
    pgo_inl_test.go:99: child: ./inline_hot.go:68:28: inlining call to T
...
    pgo_inl_test.go:99: child: r12    0xe94c90
    pgo_inl_test.go:99: child: r13    0xfffffc7feed6c300
    pgo_inl_test.go:99: child: r14    0xe5ec60
    pgo_inl_test.go:99: child: r15    0x0
    pgo_inl_test.go:99: child: rip    0xfffffc7fef1f7f47
    pgo_inl_test.go:99: child: rflags 0x247
    pgo_inl_test.go:99: child: cs     0x53
    pgo_inl_test.go:99: child: fs     0x0
    pgo_inl_test.go:99: child: gs     0x0
    pgo_inl_test.go:132: error running go test: exit status 2
2023-03-14 13:17 illumos-amd64 go@035db07d cmd/compile/internal/test.TestIntendedInlining (log)
--- FAIL: TestIntendedInlining (36.73s)
    exec.go:146: test timed out while running command: /var/tmp/workdir-host-illumos-amd64-jclulow/go/bin/go build -gcflags=-m -m -tags=math_big_pure_go runtime encoding/base64 unicode/utf8 math/big net sync bytes regexp runtime/internal/sys unicode/utf16 runtime/internal/math compress/flate reflect math/rand sync/atomic
    inl_test.go:325: exit status 2
2023-03-15 00:12 illumos-amd64 go@9ae97f8b cmd/compile/internal/test.TestStmtLines (log)
--- FAIL: TestStmtLines (168.02s)
    exec.go:146: test timed out while running command: /var/tmp/workdir-host-illumos-amd64-jclulow/go/bin/go build -ldflags=-w=0 -o /var/tmp/workdir-host-illumos-amd64-jclulow/tmp/TestStmtLines2847358691/001/test.exe cmd/go
    stmtlines_test.go:82: go build: exit status 2
        SIGQUIT: quit (ASCII FS)
        PC=0xfffffc7fef1ff33a m=0 sigcode=0

        rax    0x5b
        rbx    0xfffffc7fef302a40
        rcx    0x3
        rdx    0xfffffc7fffdff338
        rdi    0x0
        rsi    0x37dc
        rbp    0xfffffc7fffdff2e8
        rsp    0xfffffc7fffdff2b0
        r8     0x0
        r9     0x2d00000
        r10    0x3
        r11    0xc00067c480
        r12    0x37dc
        r13    0x0
        r14    0xc00024e280
        r15    0xfffffc7fffdff338
        rip    0xfffffc7fef1ff33a
        rflags 0x247
        cs     0x53
        fs     0x0
        gs     0x0
2023-03-15 00:12 illumos-amd64 go@9ae97f8b cmd/compile/internal/test.TestCode (log)
--- FAIL: TestCode (52.05s)
    exec.go:146: test timed out while running command: /var/tmp/workdir-host-illumos-amd64-jclulow/go/bin/go test -c -gcflags=-d=ssa/check/on -o /var/tmp/workdir-host-illumos-amd64-jclulow/tmp/TestCode1599781149/001/code.test testdata/addressed_test.go testdata/append_test.go testdata/arithBoundary_test.go testdata/arithConst_test.go testdata/arith_test.go testdata/array_test.go testdata/assert_test.go testdata/break_test.go testdata/chan_test.go testdata/closure_test.go testdata/cmpConst_test.go testdata/cmp_test.go testdata/compound_test.go testdata/copy_test.go testdata/ctl_test.go testdata/deferNoReturn_test.go testdata/divbyzero_test.go testdata/dupLoad_test.go testdata/fp_test.go testdata/loadstore_test.go testdata/map_test.go testdata/namedReturn_test.go testdata/phi_test.go testdata/regalloc_test.go testdata/short_test.go testdata/slice_test.go testdata/sqrtConst_test.go testdata/string_test.go testdata/unsafe_test.go testdata/zero_test.go
    ssa_test.go:161: Build failed: exit status 2
        SIGQUIT: quit (ASCII FS)
        PC=0xfffffc7fef1f7f47 m=0 sigcode=0

        rax    0x5b
        rbx    0xfffffc7fef302a40
        rcx    0xfffffc7feed7b000
        rdx    0x0
...
panic: test timed out after 3m0s
running tests:
	TestPGOIntendedInlining (6s)
	TestPGOIntendedInliningShiftedLines (5s)
	TestReproducibleBuilds (5s)

goroutine 247 [running]:
panic({0x809a40?, 0xc00052aba0?})
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/panic.go:1016 +0x3ac fp=0xc000064f10 sp=0xc000064e60 pc=0x435c2c
testing.(*M).startAlarm.func1()
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/testing/testing.go:2260 +0x3b4 fp=0xc000064fe0 sp=0xc000064f10 pc=0x50dfb4
runtime.goexit()
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/asm_amd64.s:1619 +0x1 fp=0xc000064fe8 sp=0xc000064fe0 pc=0x469a21
created by time.goFunc
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/time/sleep.go:176 +0x2d

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-03-13 14:20 illumos-amd64 go@b6f29d23 cmd/compile/internal/test.TestIntendedInlining (log)
panic: test timed out after 3m0s
running tests:
	TestIntendedInlining (29s)
	TestPGOIntendedInlining (1m26s)
	TestReproducibleBuilds (1m27s)

runtime.gopark(0xc00032d7e0?, 0x2?, 0xb?, 0x0?, 0xc00032d7c4?)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/proc.go:381 +0xce fp=0xc00032d650 sp=0xc00032d630 pc=0x438b0e
runtime.selectgo(0xc00032d7e0, 0xc00032d7c0, 0xc000376080?, 0x0, 0xfffffc7fee6fa880?, 0x1)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/select.go:327 +0x765 fp=0xc00032d780 sp=0xc00032d650 pc=0x448645
io.(*pipe).read(0xc00053c960, {0xc000653049, 0xfb7, 0xa?})
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/io/pipe.go:57 +0xa5 fp=0xc00032d810 sp=0xc00032d780 pc=0x496785
io.(*PipeReader).Read(0xc00065303e?, {0xc000653049?, 0xfc2?, 0xc00032d908?})
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/io/pipe.go:136 +0x1b fp=0xc00032d840 sp=0xc00032d810 pc=0x496edb
bufio.(*Scanner).Scan(0xc00032dd38)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/bufio/scan.go:214 +0x833 fp=0xc00032d918 sp=0xc00032d840 pc=0x512e33
cmd/compile/internal/test.TestIntendedInlining(0xc0004101a0)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/compile/internal/test/inl_test.go:294 +0x16d9 fp=0xc00032df70 sp=0xc00032d918 pc=0x7cd9d9
testing.tRunner(0xc0004101a0, 0x8a16d8)
2023-03-13 16:18 illumos-amd64 vuln@8a73a7e4 go@7a21f799 x/vuln/internal/client.TestClientByAlias (log)
--- FAIL: TestClientByAlias (0.01s)
    --- FAIL: TestClientByAlias/http (0.00s)
        client_test.go:402: httpSource.GetByAlias("CVE-2015-5739"): GetByID("GO-2021-0159"): Get "http://127.0.0.1:58958/ID/GO-2021-0159.json": net/http: HTTP/1.x transport connection broken: malformed HTTP response "nonicalMIMEHeaderKey\",\"canonicalMIMEHeaderKey\"]}]}}],\"references\":[{\"type\":\"FIX\",\"url\":\"https://go.dev/cl/11772\"},{\"type\":\"FIX\",\"url\":\"https://go.googlesource.com/go/+/117ddcb83d7f42d6aa72241240af99ded81118e9\"},{\"type\":\"REPORT\",\"url\":\"https://go.dev/issue/53035\"},{\"type\":\"WEB\",\"url\":\"https://groups.google.com/g/golang-announce/c/iSIyW4lM4hY/m/ADuQR4DiDwAJ\"}]}"
2023-03-14 09:07 illumos-amd64 go@a54fe8a2 cmd/compile/internal/ssa.TestStmtLines (log)
--- FAIL: TestStmtLines (169.46s)
    exec.go:146: test timed out while running command: /var/tmp/workdir-host-illumos-amd64-jclulow/go/bin/go build -ldflags=-w=0 -o /var/tmp/workdir-host-illumos-amd64-jclulow/tmp/TestStmtLines3348133811/001/test.exe cmd/go
    stmtlines_test.go:82: go build: exit status 2
        SIGQUIT: quit (ASCII FS)
        PC=0xfffffc7fef1f7f47 m=0 sigcode=0

        rax    0x5b
        rbx    0xfffffc7fef302a40
        rcx    0xfffffc7feed70000
        rdx    0x0
        rdi    0x0
        rsi    0x0
        rbp    0xfffffc7fffdff218
        rsp    0xfffffc7fffdff1b0
        r8     0x0
        r9     0xfffffc7feed67cc0
        r10    0xfffffc7feed70000
        r11    0xfffffc7fffdff408
        r12    0xe93c50
        r13    0xfffffc7feed67c80
        r14    0xe5dc60
        r15    0x0
        rip    0xfffffc7fef1f7f47
        rflags 0x247
        cs     0x53
        fs     0x0
        gs     0x0
2023-03-15 07:19 illumos-amd64 go@71f82df1 runtime.TestDebugLogBuild (log)
panic: test timed out after 3m0s
running tests:
	TestDebugLogBuild (1m42s)

runtime.syscall_wait4(0x75e, 0xc000014800, 0x0, 0xc000106c60)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/syscall_solaris.go:296 +0x85 fp=0xc00005fa88 sp=0xc00005fa30 pc=0x471885
syscall.Wait4(0xc001b382f0?, 0x0?, 0x0?, 0x0?)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/syscall/syscall_solaris.go:275 +0x26 fp=0xc00005fad0 sp=0xc00005fa88 pc=0x47f8a6
os.(*Process).wait(0xc00002a780)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec_unix.go:43 +0x77 fp=0xc00005fb28 sp=0xc00005fad0 pc=0x4a15d7
os.(*Process).Wait(...)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec.go:132
os/exec.(*Cmd).Wait(0xc0000ed4a0)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec/exec.go:890 +0x45 fp=0xc00005fb90 sp=0xc00005fb28 pc=0x530565
os/exec.(*Cmd).Run(0x32?)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec/exec.go:590 +0x2d fp=0xc00005fbb0 sp=0xc00005fb90 pc=0x52f14d
os/exec.(*Cmd).CombinedOutput(0xc0000ed4a0)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec/exec.go:1005 +0x94 fp=0xc00005fbd8 sp=0xc00005fbb0 pc=0x530e34
runtime_test.buildTestProg.func1()
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/crash_test.go:143 +0x3d1 fp=0xc00005fdc8 sp=0xc00005fbd8 pc=0x6ba251
sync.(*Once).doSlow(0x7926a0?, 0xc00233c1b0?)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/sync/once.go:74 +0xbf fp=0xc00005fe28 sp=0xc00005fdc8 pc=0x47bcdf
sync.(*Once).Do(...)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/sync/once.go:65
runtime_test.buildTestProg(0xc0009016c0, {0x7fd5bf, 0x8}, {0xc0007e12d0, 0x1, 0x1})
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/crash_test.go:128 +0x48a fp=0xc00005ff20 sp=0xc00005fe28 pc=0x6b9e0a
runtime_test.TestDebugLogBuild(0xc0009016c0)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/debuglog_test.go:166 +0x65 fp=0xc00005ff70 sp=0xc00005ff20 pc=0x6c2805
testing.tRunner(0xc0009016c0, 0x826118)
2023-03-15 21:35 illumos-amd64 go@3a50af12 runtime.TestCrashDumpsAllThreads (log)
panic: test timed out after 3m0s

runtime.syscall_wait4(0xcf6, 0xc0000aaba4, 0x0, 0xc0002870e0)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/syscall_solaris.go:296 +0x86 fp=0xc00005fd50 sp=0xc00005fcf8 pc=0x472546
syscall.Wait4(0x74afd0?, 0x2?, 0xcf6?, 0x3?)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/syscall/syscall_solaris.go:275 +0x2c fp=0xc00005fd98 sp=0xc00005fd50 pc=0x480d2c
os.(*Process).wait(0xc0000b2780)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec_unix.go:43 +0x85 fp=0xc00005fdf0 sp=0xc00005fd98 pc=0x4a19c5
os.(*Process).Wait(...)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec.go:132
os/exec.(*Cmd).Wait(0xc0001726e0)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec/exec.go:599 +0x4b fp=0xc00005fe68 sp=0xc00005fdf0 pc=0x5321cb
runtime_test.TestCrashDumpsAllThreads(0xc00016eea0)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/crash_unix_test.go:127 +0x646 fp=0xc00005ff70 sp=0xc00005fe68 pc=0x6c2266
testing.tRunner(0xc00016eea0, 0x8133a0)
2023-03-16 18:46 illumos-amd64 go@23e8f43c cmd/compile/internal/ssa.TestStmtLines (log)
--- FAIL: TestStmtLines (162.27s)
    exec.go:146: test timed out while running command: /var/tmp/workdir-host-illumos-amd64-jclulow/go/bin/go build -ldflags=-w=0 -o /var/tmp/workdir-host-illumos-amd64-jclulow/tmp/TestStmtLines3909261522/001/test.exe cmd/go
    stmtlines_test.go:82: go build: exit status 2
        SIGQUIT: quit (ASCII FS)
        PC=0xfffffc7fef1f7f47 m=0 sigcode=0

        rax    0x5b
        rbx    0xfffffc7fef302a40
        rcx    0xfffffc7feed7c000
        rdx    0x0
        rdi    0x0
        rsi    0x0
        rbp    0xfffffc7fffdff218
        rsp    0xfffffc7fffdff1b0
        r8     0x0
        r9     0xfffffc7feed73cc0
        r10    0xfffffc7feed7c000
        r11    0xe63260
        r12    0xe97c70
        r13    0xfffffc7feed73c80
        r14    0xe61c80
        r15    0x0
        rip    0xfffffc7fef1f7f47
        rflags 0x247
        cs     0x53
        fs     0x0
        gs     0x0
2023-03-16 18:46 illumos-amd64 go@23e8f43c cmd/compile/internal/test.TestPGOSingleIndex (log)
panic: test timed out after 3m0s
running tests:
	TestPGOSingleIndex (1m16s)
	TestPGOSingleIndex/originalIndex=0 (1m16s)
	TestPGOSingleIndex/originalIndex=1 (1m16s)

runtime.gopark(0xc000383468?, 0x431ab6?, 0xc0?, 0x97?, 0xc000061000?)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/proc.go:381 +0xce fp=0xc000383440 sp=0xc000383420 pc=0x438b0e
runtime.netpollblock(0xfffffc7fee7d97c0?, 0x72?, 0x0?)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/netpoll.go:527 +0xf7 fp=0xc000383478 sp=0xc000383440 pc=0x4310f7
internal/poll.runtime_pollWait(0xfffffc7fee7d97c0, 0x72)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/netpoll.go:306 +0x90 fp=0xc000383498 sp=0xc000383478 pc=0x463b50
internal/poll.(*pollDesc).wait(0xc000096840?, 0xc000061000?, 0x1)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/internal/poll/fd_poll_runtime.go:84 +0x27 fp=0xc0003834c0 sp=0xc000383498 pc=0x499687
internal/poll.(*pollDesc).waitRead(...)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/internal/poll/fd_poll_runtime.go:89
internal/poll.(*FD).Read(0xc000096840, {0xc000061000, 0x1000, 0x1000})
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/internal/poll/fd_unix.go:167 +0x27a fp=0xc000383558 sp=0xc0003834c0 pc=0x49a99a
os.(*File).read(...)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/file_posix.go:31
os.(*File).Read(0xc000094048, {0xc000061000?, 0x0?, 0xc000383660?})
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/file.go:118 +0x52 fp=0xc000383598 sp=0xc000383558 pc=0x4a42f2
bufio.(*Scanner).Scan(0xc000383a90)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/bufio/scan.go:214 +0x833 fp=0xc000383670 sp=0xc000383598 pc=0x5144f3
cmd/compile/internal/test.testPGOIntendedInlining(0xc00032dba0, {0xc000083860, 0x5f})
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/compile/internal/test/pgo_inl_test.go:97 +0x9d9 fp=0xc000383d60 sp=0xc000383670 pc=0x7d4d79
cmd/compile/internal/test.TestPGOSingleIndex.func1(0xc00032dba0)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/compile/internal/test/pgo_inl_test.go:279 +0x765 fp=0xc000383f70 sp=0xc000383d60 pc=0x7d6845
testing.tRunner(0xc00032dba0, 0xc00008cee0)
2023-03-17 19:45 illumos-amd64 go@2094fd07 cmd/nm.TestExternalLinkerCgoExec (log)
panic: test timed out after 3m0s

runtime.syscall_wait4(0x4414, 0xc000020364, 0x0, 0xc0000f0360)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/syscall_solaris.go:296 +0x86 fp=0xc0000e3a98 sp=0xc0000e3a40 pc=0x4677e6
syscall.Wait4(0x203000?, 0xc00006b110?, 0xc0000e3b68?, 0x40d39f?)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/syscall/syscall_solaris.go:275 +0x2c fp=0xc0000e3ae0 sp=0xc0000e3a98 pc=0x47702c
os.(*Process).wait(0xc00001c2a0)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec_unix.go:43 +0x85 fp=0xc0000e3b38 sp=0xc0000e3ae0 pc=0x4a1965
os.(*Process).Wait(...)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec.go:132
os/exec.(*Cmd).Wait(0xc0000ea840)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec/exec.go:599 +0x4b fp=0xc0000e3bb0 sp=0xc0000e3b38 pc=0x5324ab
os/exec.(*Cmd).Run(0x7?)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec/exec.go:437 +0x39 fp=0xc0000e3bd0 sp=0xc0000e3bb0 pc=0x5316b9
os/exec.(*Cmd).CombinedOutput(0xc0000ea840)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec/exec.go:707 +0xa8 fp=0xc0000e3bf8 sp=0xc0000e3bd0 pc=0x532b08
cmd/nm.testGoExec(0xc0000d0000, 0x1, 0x1)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/nm/nm_test.go:119 +0x64d fp=0xc0000e3f50 sp=0xc0000e3bf8 pc=0x5f318d
cmd/nm.TestExternalLinkerCgoExec(0x0?)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/nm/nm_cgo_test.go:52 +0x25 fp=0xc0000e3f70 sp=0xc0000e3f50 pc=0x5f2005
testing.tRunner(0xc0000d0000, 0x670eb0)
2023-03-17 19:45 illumos-amd64 go@2094fd07 cmd/objdump.TestDisasm (log)
panic: test timed out after 3m0s

runtime.syscall_wait4(0x43f1, 0xc0000b60dc, 0x0, 0xc0000c62d0)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/syscall_solaris.go:296 +0x86 fp=0xc00016ba88 sp=0xc00016ba30 pc=0x4646a6
syscall.Wait4(0x203000?, 0xc0000901b0?, 0x400?, 0x314?)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/syscall/syscall_solaris.go:275 +0x2c fp=0xc00016bad0 sp=0xc00016ba88 pc=0x470c6c
os.(*Process).wait(0xc0000c00c0)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec_unix.go:43 +0x85 fp=0xc00016bb28 sp=0xc00016bad0 pc=0x488885
os.(*Process).Wait(...)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec.go:132
os/exec.(*Cmd).Wait(0xc0000d22c0)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec/exec.go:599 +0x4b fp=0xc00016bba0 sp=0xc00016bb28 pc=0x4d3e0b
os/exec.(*Cmd).Run(0x18?)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec/exec.go:437 +0x39 fp=0xc00016bbc0 sp=0xc00016bba0 pc=0x4d3019
os/exec.(*Cmd).CombinedOutput(0xc0000d22c0)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec/exec.go:707 +0xa8 fp=0xc00016bbe8 sp=0xc00016bbc0 pc=0x4d4468
cmd/objdump.testDisasm(0xc00015c1a0, {0x5916b0, 0xe}, 0x0, 0x0, {0x0?, 0x0, 0x0})
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/objdump/objdump_test.go:159 +0x75f fp=0xc00016bef8 sp=0xc00016bbe8 pc=0x544fff
cmd/objdump.testGoAndCgoDisasm(0xc00003ef60?, 0x97?, 0x9a?)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/objdump/objdump_test.go:242 +0x85 fp=0xc00016bf50 sp=0xc00016bef8 pc=0x546525
cmd/objdump.TestDisasm(0x0?)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/objdump/objdump_test.go:247 +0x1d fp=0xc00016bf70 sp=0xc00016bf50 pc=0x54657d
testing.tRunner(0xc00015c1a0, 0x59f158)
2023-03-17 19:45 illumos-amd64 go@2094fd07 cmd/pack.TestHello (log)
panic: test timed out after 3m0s

runtime.syscall_wait4(0x44a1, 0xc00002057c, 0x0, 0xc000154000)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/syscall_solaris.go:296 +0x86 fp=0xc000088ca0 sp=0xc000088c48 pc=0x464506
syscall.Wait4(0x203000?, 0xc000064ae0?, 0xc000088d70?, 0x40cdc8?)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/syscall/syscall_solaris.go:275 +0x2c fp=0xc000088ce8 sp=0xc000088ca0 pc=0x470ccc
os.(*Process).wait(0xc00001c1b0)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec_unix.go:43 +0x85 fp=0xc000088d40 sp=0xc000088ce8 pc=0x488e85
os.(*Process).Wait(...)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec.go:132
os/exec.(*Cmd).Wait(0xc00014c000)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec/exec.go:599 +0x4b fp=0xc000088db8 sp=0xc000088d40 pc=0x4d21cb
os/exec.(*Cmd).Run(0x3?)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec/exec.go:437 +0x39 fp=0xc000088dd8 sp=0xc000088db8 pc=0x4d13d9
os/exec.(*Cmd).CombinedOutput(0xc00014c000)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/os/exec/exec.go:707 +0xa8 fp=0xc000088e00 sp=0xc000088dd8 pc=0x4d2828
cmd/pack.doRun(0xc000138340, {0xc000024dc0, 0x47}, {0xc000064a80, 0x3, 0x3})
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/pack/pack_test.go:380 +0xde fp=0xc000088e90 sp=0xc000088e00 pc=0x51133e
cmd/pack.TestHello.func1(...)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/pack/pack_test.go:177
cmd/pack.TestHello(0xc000138340)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/pack/pack_test.go:181 +0x1c5 fp=0xc000088f70 sp=0xc000088e90 pc=0x50ef25
testing.tRunner(0xc000138340, 0x552d18)
2023-03-20 14:39 illumos-amd64 vuln@c17b6c9b go@2094fd07 x/vuln/internal/vulncheck/internal/buildinfo.TestExtractPackagesAndSymbols (log)
panic: test timed out after 10m0s

testing.(*T).Run(0xc00008eb60, {0xc000381440?, 0xc000381440?}, 0xc00037d350)
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/testing/testing.go:1494 +0x37a
golang.org/x/vuln/internal/vulncheck/internal/buildinfo.TestExtractPackagesAndSymbols(0x0?)
	/var/tmp/workdir-host-illumos-amd64-jclulow/gopath/src/golang.org/x/vuln/internal/vulncheck/internal/buildinfo/additions_scan_test.go:34 +0x34c
testing.tRunner(0xc00008eb60, 0x865fb8)
2023-03-21 19:27 illumos-amd64 go@b513bd80 (log)
../../go/src/cmd/addr2line/main.go:30:2: package cmd/internal/objfile is not in GOROOT (/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/internal/objfile)
../../go/src/cmd/asm/main.go:20:2: package cmd/internal/bio is not in GOROOT (/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/internal/bio)
../../go/src/cmd/asm/internal/arch/arch.go:9:2: package cmd/internal/obj is not in GOROOT (/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/internal/obj)
../../go/src/cmd/asm/internal/arch/arch.go:10:2: package cmd/internal/obj/arm is not in GOROOT (/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/internal/obj/arm)
../../go/src/cmd/asm/internal/arch/arch.go:11:2: package cmd/internal/obj/arm64 is not in GOROOT (/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/internal/obj/arm64)
../../go/src/cmd/asm/internal/arch/arch.go:12:2: package cmd/internal/obj/loong64 is not in GOROOT (/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/internal/obj/loong64)
../../go/src/cmd/asm/internal/arch/arch.go:13:2: package cmd/internal/obj/mips is not in GOROOT (/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/internal/obj/mips)
../../go/src/cmd/asm/internal/arch/arch.go:14:2: package cmd/internal/obj/ppc64 is not in GOROOT (/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/internal/obj/ppc64)
../../go/src/cmd/asm/internal/arch/arch.go:15:2: package cmd/internal/obj/riscv is not in GOROOT (/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/internal/obj/riscv)
../../go/src/cmd/asm/internal/arch/arch.go:16:2: package cmd/internal/obj/s390x is not in GOROOT (/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/internal/obj/s390x)
...
package cmd/vendor/golang.org/x/tools/go/ast/astutil is not in GOROOT (/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/vendor/golang.org/x/tools/go/ast/astutil)
package cmd/vendor/golang.org/x/tools/go/ast/inspector is not in GOROOT (/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/vendor/golang.org/x/tools/go/ast/inspector)
package cmd/vendor/golang.org/x/tools/go/cfg is not in GOROOT (/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/vendor/golang.org/x/tools/go/cfg)
package cmd/vendor/golang.org/x/tools/go/types/objectpath is not in GOROOT (/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/vendor/golang.org/x/tools/go/types/objectpath)
package cmd/vendor/golang.org/x/tools/go/types/typeutil is not in GOROOT (/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/vendor/golang.org/x/tools/go/types/typeutil)
package cmd/vendor/golang.org/x/tools/internal/analysisinternal is not in GOROOT (/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/vendor/golang.org/x/tools/internal/analysisinternal)
package cmd/vendor/golang.org/x/tools/internal/facts is not in GOROOT (/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/vendor/golang.org/x/tools/internal/facts)
package cmd/vendor/golang.org/x/tools/internal/typeparams is not in GOROOT (/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/vendor/golang.org/x/tools/internal/typeparams)
package cmd/vet is not in GOROOT (/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/cmd/vet)
go tool dist: FAILED: /var/tmp/workdir-host-illumos-amd64-jclulow/go/pkg/tool/illumos_amd64/go_bootstrap install cmd: exit status 1

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-03-09 22:48 illumos-amd64 go@b852f395 cmd/go.TestScript (log)
vcs-test.golang.org rerouted to http://127.0.0.1:34159
https://vcs-test.golang.org rerouted to https://127.0.0.1:38136
go test proxy running at GOPROXY=http://127.0.0.1:48071/mod
--- FAIL: TestScript (0.11s)
    --- FAIL: TestScript/mod_query (19.14s)
        script_test.go:134: 2023-03-10T05:23:59Z
        script_test.go:136: $WORK=/var/tmp/workdir-host-illumos-amd64-jclulow/tmp/cmd-go-test-2475023153/tmpdir1273368439/mod_query4288367817
        script_test.go:154: 
            > env GO111MODULE=on
            # TODO(golang.org/issue/41297): we shouldn't need go.sum. None of the commands
...
    --- FAIL: TestScript/mod_proxy_invalid (0.00s)
        script_test.go:134: 2023-03-10T05:24:18Z
        script_test.go:136: $WORK=/var/tmp/workdir-host-illumos-amd64-jclulow/tmp/cmd-go-test-2475023153/tmpdir1273368439/mod_proxy_invalid1630491891
        script_test.go:154: 
        script_test.go:154: FAIL: mod_proxy_invalid.txt:0: context deadline exceeded
    --- FAIL: TestScript/mod_proxy_https (0.00s)
        script_test.go:134: 2023-03-10T05:24:18Z
        script_test.go:136: $WORK=/var/tmp/workdir-host-illumos-amd64-jclulow/tmp/cmd-go-test-2475023153/tmpdir1273368439/mod_proxy_https1754621986
        script_test.go:154: 
        script_test.go:154: FAIL: mod_proxy_https.txt:0: context deadline exceeded
...
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/testing/testing.go:2241 +0x3b9 fp=0xc00006cfe0 sp=0xc00006cf10 pc=0x5336f9
runtime.goexit()
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00006cfe8 sp=0xc00006cfe0 pc=0x46e001
created by time.goFunc
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/time/sleep.go:176 +0x32

goroutine 5931 [running]:
	goroutine running on other thread; stack unavailable
created by testing.(*T).Run
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/testing/testing.go:1629 +0x3ea
2023-03-13 15:28 illumos-amd64 go@43f911b0 cmd/go.TestScript (log)
vcs-test.golang.org rerouted to http://127.0.0.1:33958
https://vcs-test.golang.org rerouted to https://127.0.0.1:39690
go test proxy running at GOPROXY=http://127.0.0.1:60608/mod
--- FAIL: TestScript (0.11s)
    --- FAIL: TestScript/cgo_asm_error (18.12s)
        script_test.go:134: 2023-03-13T17:25:37Z
        script_test.go:136: $WORK=/var/tmp/workdir-host-illumos-amd64-jclulow/tmp/cmd-go-test-617683485/tmpdir3865544981/cgo_asm_error2962477102
        script_test.go:154: 
            > [!cgo] skip
            [condition not met]
...
    --- FAIL: TestScript/cache_vet (0.00s)
        script_test.go:134: 2023-03-13T17:25:55Z
        script_test.go:136: $WORK=/var/tmp/workdir-host-illumos-amd64-jclulow/tmp/cmd-go-test-617683485/tmpdir3865544981/cache_vet3172183305
        script_test.go:154: 
        script_test.go:154: FAIL: cache_vet.txt:0: context deadline exceeded
    --- FAIL: TestScript/cache_unix (0.00s)
        script_test.go:134: 2023-03-13T17:25:55Z
        script_test.go:136: $WORK=/var/tmp/workdir-host-illumos-amd64-jclulow/tmp/cmd-go-test-617683485/tmpdir3865544981/cache_unix928758211
        script_test.go:154: 
        script_test.go:154: FAIL: cache_unix.txt:0: context deadline exceeded
...

goroutine 2185 [running]:
panic({0xa75d60?, 0xc00024c890?})
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/panic.go:1016 +0x3ac fp=0xc000071f10 sp=0xc000071e60 pc=0x43734c
testing.(*M).startAlarm.func1()
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/testing/testing.go:2244 +0x3b4 fp=0xc000071fe0 sp=0xc000071f10 pc=0x529bb4
runtime.goexit()
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/asm_amd64.s:1619 +0x1 fp=0xc000071fe8 sp=0xc000071fe0 pc=0x46bb21
created by time.goFunc
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/time/sleep.go:176 +0x2d
2023-03-13 20:25 illumos-amd64 go@82c713fe cmd/go.TestScript (log)
vcs-test.golang.org rerouted to http://127.0.0.1:37749
https://vcs-test.golang.org rerouted to https://127.0.0.1:64162
go test proxy running at GOPROXY=http://127.0.0.1:47085/mod
--- FAIL: TestScript (0.11s)
    --- FAIL: TestScript/test_main (8.67s)
        script_test.go:134: 2023-03-13T21:36:57Z
        script_test.go:136: $WORK=/var/tmp/workdir-host-illumos-amd64-jclulow/tmp/cmd-go-test-235619076/tmpdir2924901036/test_main2972718651
        script_test.go:154: 
            # Test TestMain (0.677s)
            # Test TestMain sees testing flags (7.989s)
...
    --- FAIL: TestScript/test_json_timeout (0.00s)
        script_test.go:134: 2023-03-13T21:37:06Z
        script_test.go:136: $WORK=/var/tmp/workdir-host-illumos-amd64-jclulow/tmp/cmd-go-test-235619076/tmpdir2924901036/test_json_timeout3260209530
        script_test.go:154: 
        script_test.go:154: FAIL: test_json_timeout.txt:0: context deadline exceeded
    --- FAIL: TestScript/test_match_benchmark_labels (8.72s)
        script_test.go:134: 2023-03-13T21:36:57Z
        script_test.go:136: $WORK=/var/tmp/workdir-host-illumos-amd64-jclulow/tmp/cmd-go-test-235619076/tmpdir2924901036/test_match_benchmark_labels1536633539
        script_test.go:154: 
            # Benchmark labels, file outside gopath
...

goroutine 3402 [running]:
panic({0xa75d60?, 0xc000264690?})
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/panic.go:1016 +0x3ac fp=0xc000070f10 sp=0xc000070e60 pc=0x43734c
testing.(*M).startAlarm.func1()
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/testing/testing.go:2244 +0x3b4 fp=0xc000070fe0 sp=0xc000070f10 pc=0x529c14
runtime.goexit()
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/asm_amd64.s:1619 +0x1 fp=0xc000070fe8 sp=0xc000070fe0 pc=0x46bb21
created by time.goFunc
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/time/sleep.go:176 +0x2d
2023-03-13 21:21 illumos-amd64 go@e8543a6f cmd/go.TestScript (log)
vcs-test.golang.org rerouted to http://127.0.0.1:32926
https://vcs-test.golang.org rerouted to https://127.0.0.1:38106
go test proxy running at GOPROXY=http://127.0.0.1:54414/mod
--- FAIL: TestScript (0.11s)
    --- FAIL: TestScript/test_go111module_cache (14.39s)
        script_test.go:134: 2023-03-13T22:47:25Z
        script_test.go:136: $WORK=/var/tmp/workdir-host-illumos-amd64-jclulow/tmp/cmd-go-test-1814254191/tmpdir1899875745/test_go111module_cache3828729447
        script_test.go:154: 
            > env GO111MODULE=on
            > go mod init foo
...
    --- FAIL: TestScript/testing_issue40908 (0.00s)
        script_test.go:134: 2023-03-13T22:47:39Z
        script_test.go:136: $WORK=/var/tmp/workdir-host-illumos-amd64-jclulow/tmp/cmd-go-test-1814254191/tmpdir1899875745/testing_issue409081911175736
        script_test.go:154: 
        script_test.go:154: FAIL: testing_issue40908.txt:0: context deadline exceeded
    --- FAIL: TestScript/test_fuzz_unsupported (0.00s)
        script_test.go:134: 2023-03-13T22:47:39Z
        script_test.go:136: $WORK=/var/tmp/workdir-host-illumos-amd64-jclulow/tmp/cmd-go-test-1814254191/tmpdir1899875745/test_fuzz_unsupported1955329874
        script_test.go:154: 
        script_test.go:154: FAIL: test_fuzz_unsupported.txt:0: context deadline exceeded
...

goroutine 3405 [running]:
panic({0xa75d60?, 0xc0004ad230?})
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/panic.go:1016 +0x3ac fp=0xc00006df10 sp=0xc00006de60 pc=0x43734c
testing.(*M).startAlarm.func1()
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/testing/testing.go:2244 +0x3b4 fp=0xc00006dfe0 sp=0xc00006df10 pc=0x529c14
runtime.goexit()
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/asm_amd64.s:1619 +0x1 fp=0xc00006dfe8 sp=0xc00006dfe0 pc=0x46bb21
created by time.goFunc
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/time/sleep.go:176 +0x2d
2023-03-13 22:04 illumos-amd64 go@40a6e2da cmd/go.TestScript (log)
vcs-test.golang.org rerouted to http://127.0.0.1:62621
https://vcs-test.golang.org rerouted to https://127.0.0.1:32787
go test proxy running at GOPROXY=http://127.0.0.1:53982/mod
--- FAIL: TestScript (0.11s)
    --- FAIL: TestScript/build_nocache (46.25s)
        script_test.go:134: 2023-03-14T00:00:11Z
        script_test.go:136: $WORK=/var/tmp/workdir-host-illumos-amd64-jclulow/tmp/cmd-go-test-1662773080/tmpdir926904222/build_nocache2568087805
        script_test.go:154: 
            > env GO111MODULE=off
            # As of Go 1.12, the module cache is required.
...
    --- FAIL: TestScript/build_pgo_auto (81.00s)
        script_test.go:134: 2023-03-13T23:59:36Z
        script_test.go:136: $WORK=/var/tmp/workdir-host-illumos-amd64-jclulow/tmp/cmd-go-test-1662773080/tmpdir926904222/build_pgo_auto3081971184
        script_test.go:154: 
            # Test go build -pgo=auto flag.
            # use default.pgo for a single main package (34.182s)
            # check that pgo applied to dependencies (0.000s)
            # use default.pgo for ... with a single main package (0.119s)
            # build succeeds without PGO when default.pgo file is absent (0.123s)
            # other build-related commands (46.564s)
...

goroutine 2234 [running]:
panic({0xa75d60?, 0xc000046560?})
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/panic.go:1016 +0x3ac fp=0xc000070f10 sp=0xc000070e60 pc=0x43734c
testing.(*M).startAlarm.func1()
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/testing/testing.go:2260 +0x3b4 fp=0xc000070fe0 sp=0xc000070f10 pc=0x529c14
runtime.goexit()
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/asm_amd64.s:1619 +0x1 fp=0xc000070fe8 sp=0xc000070fe0 pc=0x46bb21
created by time.goFunc
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/time/sleep.go:176 +0x2d
2023-03-14 04:39 illumos-amd64 go@82bf1290 cmd/go.TestScript (log)
vcs-test.golang.org rerouted to http://127.0.0.1:49972
https://vcs-test.golang.org rerouted to https://127.0.0.1:37768
go test proxy running at GOPROXY=http://127.0.0.1:59128/mod
--- FAIL: TestScript (0.11s)
    --- FAIL: TestScript/test_match_only_benchmarks (3.39s)
        script_test.go:134: 2023-03-14T07:19:30Z
        script_test.go:136: $WORK=/var/tmp/workdir-host-illumos-amd64-jclulow/tmp/cmd-go-test-1029589298/tmpdir1279408713/test_match_only_benchmarks1924163294
        script_test.go:154: 
            # Matches only benchmarks (3.378s)
            > go test -run '^$' -bench . standalone_benchmark_test.go
...
    --- FAIL: TestScript/test_match_no_tests_with_subtests (0.00s)
        script_test.go:134: 2023-03-14T07:19:33Z
        script_test.go:136: $WORK=/var/tmp/workdir-host-illumos-amd64-jclulow/tmp/cmd-go-test-1029589298/tmpdir1279408713/test_match_no_tests_with_subtests2193787470
        script_test.go:154: 
        script_test.go:154: FAIL: test_match_no_tests_with_subtests.txt:0: context deadline exceeded
    --- FAIL: TestScript/test_match_no_tests_build_failure (0.00s)
        script_test.go:134: 2023-03-14T07:19:33Z
        script_test.go:136: $WORK=/var/tmp/workdir-host-illumos-amd64-jclulow/tmp/cmd-go-test-1029589298/tmpdir1279408713/test_match_no_tests_build_failure2377147472
        script_test.go:154: 
        script_test.go:154: FAIL: test_match_no_tests_build_failure.txt:0: context deadline exceeded
...

goroutine 3171 [running]:
panic({0xa75d60?, 0xc0003322c0?})
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/panic.go:1016 +0x3ac fp=0xc000310f10 sp=0xc000310e60 pc=0x43734c
testing.(*M).startAlarm.func1()
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/testing/testing.go:2260 +0x3b4 fp=0xc000310fe0 sp=0xc000310f10 pc=0x529c14
runtime.goexit()
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/asm_amd64.s:1619 +0x1 fp=0xc000310fe8 sp=0xc000310fe0 pc=0x46bb21
created by time.goFunc
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/time/sleep.go:176 +0x2d
2023-03-14 10:02 illumos-amd64 go@b37c0602 cmd/go.TestScript (log)
vcs-test.golang.org rerouted to http://127.0.0.1:49438
https://vcs-test.golang.org rerouted to https://127.0.0.1:45283
go test proxy running at GOPROXY=http://127.0.0.1:37806/mod
--- FAIL: TestScript (0.11s)
    --- FAIL: TestScript/vendor_outside_module (11.96s)
        script_test.go:134: 2023-03-14T12:27:34Z
        script_test.go:136: $WORK=/var/tmp/workdir-host-illumos-amd64-jclulow/tmp/cmd-go-test-1922314541/tmpdir209490616/vendor_outside_module3704630640
        script_test.go:154: 
            # baz.go (importing just fmt) works with -mod=mod,  -mod=vendor. (11.952s)
            > go build -x -mod=mod my-module/vendor/example.com/another-module/foo/bar/baz.go
...
    --- FAIL: TestScript/vendor_list_issue11977 (0.00s)
        script_test.go:134: 2023-03-14T12:27:46Z
        script_test.go:136: $WORK=/var/tmp/workdir-host-illumos-amd64-jclulow/tmp/cmd-go-test-1922314541/tmpdir209490616/vendor_list_issue119771569064255
        script_test.go:154: 
        script_test.go:154: FAIL: vendor_list_issue11977.txt:0: context deadline exceeded
    --- FAIL: TestScript/vendor_issue12156 (0.00s)
        script_test.go:134: 2023-03-14T12:27:46Z
        script_test.go:136: $WORK=/var/tmp/workdir-host-illumos-amd64-jclulow/tmp/cmd-go-test-1922314541/tmpdir209490616/vendor_issue12156109859658
        script_test.go:154: 
        script_test.go:154: FAIL: vendor_issue12156.txt:0: context deadline exceeded
...

goroutine 3040 [running]:
panic({0xa75d60?, 0xc00024ac70?})
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/panic.go:1016 +0x3ac fp=0xc000299f10 sp=0xc000299e60 pc=0x43734c
testing.(*M).startAlarm.func1()
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/testing/testing.go:2260 +0x3b4 fp=0xc000299fe0 sp=0xc000299f10 pc=0x529c14
runtime.goexit()
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/asm_amd64.s:1619 +0x1 fp=0xc000299fe8 sp=0xc000299fe0 pc=0x46bb21
created by time.goFunc
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/time/sleep.go:176 +0x2d

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-03-10 18:54 illumos-amd64 vuln@902f7583 go@53c91f92 x/vuln/internal/client.TestMustUseIndex (log)
2023/03/11 04:17:40 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/03/11 04:17:40 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/03/11 04:17:40 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/03/11 04:17:40 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/03/11 04:17:40 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
--- FAIL: TestMustUseIndex (0.00s)
    client_test.go:204: GetByModule("github.com/tidwall/gjson"): httpSource.GetByModule("github.com/tidwall/gjson"): Get "http://127.0.0.1:42566/github.com/tidwall/gjson.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
2023/03/11 04:17:40 Unsolicited response received on idle HTTP channel starting with "       \"name\": \"github.com/beego/beego\",\n        \"ecosystem\": \"Go\"\n      },\n      \"ranges\": [\n        {\n          \"type\": \"SEMVER\",\n          \"events\": [\n            {\n              \"introduced\": \"0\"\n            },\n            {\n              \"fixed\": \"1.12.9\"\n            }\n          ]\n        }\n      ],\n      \"database_specific\": {\n        \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n      },\n      \"ecosystem_specific\": {\n        \"imports\": [\n          {\n            \"path\": \"github.com/beego/beego\",\n            \"symbols\": [\n              \"App.Run\",\n              \"ControllerRegister.FindPolicy\",\n              \"ControllerRegister.FindRouter\",\n              \"ControllerRegister.ServeHTTP\",\n              \"FilterRouter.ValidRouter\",\n              \"InitBeegoBeforeTest\",\n              \"Run\",\n              \"RunWithMiddleWares\",\n              \"TestBeegoInit\",\n              \"Tree.Match\",\n              \"Tree.match\",\n              \"adminApp.Run\"\n            ]\n          }\n        ]\n      }\n    },\n    {\n      \"package\": {\n        \"name\": \"github.com/beego/beego/v2\",\n        \"ecosystem\": \"Go\"\n      },\n      \"ranges\": [\n        {\n          \"type\": \"SEMVER\",\n          \"events\": [\n            {\n              \"introduced\": \"0\"\n            },\n            {\n              \"fixed\": \"2.0.3\"\n            }\n          ]\n        }\n      ],\n      \"database_specific\": {\n        \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n      },\n      \"ecosystem_specific\": {\n        \"imports\": [\n          {\n            \"path\": \"github.com/beego/beego/v2/server/web\",\n            \"symbols\": [\n              \"AddNamespace\",\n              \"Any\",\n              \"AutoPrefix\",\n              \"AutoRouter\",\n              \"Compare\",\n              \"CompareNot\",\n              \"Controller.Bind\",\n              \"Controller.BindForm\",\n              \"Controller.BindXML\",\n              \"Controller.BindYAML\",\n              \"Controller.GetSecureCookie\",\n              \"Controller.ParseForm\",\n              \"Controller.Render\",\n              \"Controller.RenderBytes\",\n              \"Controller.RenderString\",\n              \"Controller.Resp\",\n              \"Controller.SaveToFile\",\n              \"Controller.ServeFormatted\",\n              \"Controller.ServeXML\",\n              \"Controller.ServeYAML\",\n              \"Controller.SetSecureCookie\",\n              \"Controller.Trace\",\n              \"Controller.URLFor\",\n              \"Controller.XMLResp\",\n              \"Controller.XSRFFormHTML\",\n              \"Controller.XSRFToken\",\n              \"Controller.YamlResp\",\n              \"ControllerRegister.Add\",\n              \"ControllerRegister.AddAuto\",\n              \"ControllerRegister.AddAutoPrefix\",\n              \"ControllerRegister.AddMethod\",\n              \"ControllerRegister.AddRouterMethod\",\n              \"ControllerRegister.Any\",\n              \"ControllerRegister.CtrlAny\",\n              \"ControllerRegister.CtrlDelete\",\n              \"ControllerRegister.CtrlGet\",\n              \"ControllerRegister.CtrlHead\",\n              \"ControllerRegister.CtrlOptions\",\n              \"ControllerRegister.CtrlPatch\""; err=<nil>
2023/03/11 04:17:40 Unsolicited response received on idle HTTP channel starting with "       \"name\": \"github.com/beego/beego\",\n        \"ecosystem\": \"Go\"\n      },\n      \"ranges\": [\n        {\n          \"type\": \"SEMVER\",\n          \"events\": [\n            {\n              \"introduced\": \"0\"\n            },\n            {\n              \"fixed\": \"1.12.9\"\n            }\n          ]\n        }\n      ],\n      \"database_specific\": {\n        \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n      },\n      \"ecosystem_specific\": {\n        \"imports\": [\n          {\n            \"path\": \"github.com/beego/beego\",\n            \"symbols\": [\n              \"App.Run\",\n              \"ControllerRegister.FindPolicy\",\n              \"ControllerRegister.FindRouter\",\n              \"ControllerRegister.ServeHTTP\",\n              \"FilterRouter.ValidRouter\",\n              \"InitBeegoBeforeTest\",\n              \"Run\",\n              \"RunWithMiddleWares\",\n              \"TestBeegoInit\",\n              \"Tree.Match\",\n              \"Tree.match\",\n              \"adminApp.Run\"\n            ]\n          }\n        ]\n      }\n    },\n    {\n      \"package\": {\n        \"name\": \"github.com/beego/beego/v2\",\n        \"ecosystem\": \"Go\"\n      },\n      \"ranges\": [\n        {\n          \"type\": \"SEMVER\",\n          \"events\": [\n            {\n              \"introduced\": \"0\"\n            },\n            {\n              \"fixed\": \"2.0.3\"\n            }\n          ]\n        }\n      ],\n      \"database_specific\": {\n        \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n      },\n      \"ecosystem_specific\": {\n        \"imports\": [\n          {\n            \"path\": \"github.com/beego/beego/v2/server/web\",\n            \"symbols\": [\n              \"AddNamespace\",\n              \"Any\",\n              \"AutoPrefix\",\n              \"AutoRouter\",\n              \"Compare\",\n              \"CompareNot\",\n              \"Controller.Bind\",\n              \"Controller.BindForm\",\n              \"Controller.BindXML\",\n              \"Controller.BindYAML\",\n              \"Controller.GetSecureCookie\",\n              \"Controller.ParseForm\",\n              \"Controller.Render\",\n              \"Controller.RenderBytes\",\n              \"Controller.RenderString\",\n              \"Controller.Resp\",\n              \"Controller.SaveToFile\",\n              \"Controller.ServeFormatted\",\n              \"Controller.ServeXML\",\n              \"Controller.ServeYAML\",\n              \"Controller.SetSecureCookie\",\n              \"Controller.Trace\",\n              \"Controller.URLFor\",\n              \"Controller.XMLResp\",\n              \"Controller.XSRFFormHTML\",\n              \"Controller.XSRFToken\",\n              \"Controller.YamlResp\",\n              \"ControllerRegister.Add\",\n              \"ControllerRegister.AddAuto\",\n              \"ControllerRegister.AddAutoPrefix\",\n              \"ControllerRegister.AddMethod\",\n              \"ControllerRegister.AddRouterMethod\",\n              \"ControllerRegister.Any\",\n              \"ControllerRegister.CtrlAny\",\n              \"ControllerRegister.CtrlDelete\",\n              \"ControllerRegister.CtrlGet\",\n              \"ControllerRegister.CtrlHead\",\n              \"ControllerRegister.CtrlOptions\",\n              \"ControllerRegister.CtrlPatch\""; err=<nil>
2023/03/11 04:17:40 Unsolicited response received on idle HTTP channel starting with "60\"\n  ],\n  \"CVE-2016-15005\": [\n    \"GO-2020-0045\"\n  ],\n  \"CVE-2016-3697\": [\n    \"GO-2021-0070\"\n  ],\n  \"CVE-2016-3958\": [\n    \"GO-2021-0163\"\n  ],\n  \"CVE-2016-3959\": [\n    \"GO-2022-0166\"\n  ],\n  \"CVE-2016-5386\": [\n    \"GO-2022-0761\"\n  ],\n  \"CVE-2016-9121\": [\n    \"GO-2020-0010\"\n  ],\n  \"CVE-2016-9122\": [\n    \"GO-2020-0011\",\n    \"GO-2022-0945\"\n  ],\n  \"CVE-2016-9123\": [\n    \"GO-2020-0009\"\n  ],\n  \"CVE-2017-1000097\": [\n    \"GO-2022-0171\"\n  ],\n  \"CVE-2017-1000098\": [\n    \"GO-2021-0172\"\n  ],\n  \"CVE-2017-11468\": [\n    \"GO-2021-0072\"\n  ],\n  \"CVE-2017-11480\": [\n    \"GO-2022-0643\"\n  ],\n  \"CVE-2017-15041\": [\n    \"GO-2022-0177\"\n  ],\n  \"CVE-2017-15042\": [\n    \"GO-2021-0178\"\n  ],\n  \"CVE-2017-15133\": [\n    \"GO-2020-0006\"\n  ],\n  \"CVE-2017-17831\": [\n    \"GO-2021-0073\"\n  ],\n  \"CVE-2017-18367\": [\n    \"GO-2020-0007\"\n  ],\n  \"CVE-2017-20146\": [\n    \"GO-2020-0020\"\n  ],\n  \"CVE-2017-3204\": [\n    \"GO-2020-0013\"\n  ],\n  \"CVE-2017-8932\": [\n    \"GO-2022-0187\"\n  ],\n  \"CVE-2018-1103\": [\n    \"GO-2020-0026\"\n  ],\n  \"CVE-2018-12018\": [\n    \"GO-2021-0075\"\n  ],\n  \"CVE-2018-14632\": [\n    \"GO-2021-0076\"\n  ],\n  \"CVE-2018-16873\": [\n    \"GO-2022-0189\"\n  ],\n  \"CVE-2018-16874\": [\n"; err=<nil>
2023/03/11 04:17:40 Unsolicited response received on idle HTTP channel starting with "nonicalMIMEHeaderKey\",\"canonicalMIMEHeaderKey\"]}]}}],\"references\":[{\"type\":\"FIX\",\"url\":\"https://go.dev/cl/11772\"},{\"type\":\"FIX\",\"url\":\"https://go.googlesource.com/go/+/117ddcb83d7f42d6aa72241240af99ded81118e9\"},{\"type\":\"REPORT\",\"url\":\"https://go.dev/issue/53035\"},{\"type\":\"WEB\",\"url\":\"https://groups.google.com/g/golang-announce/c/iSIyW4lM4hY/m/ADuQR4DiDwAJ\"}]}\n"; err=<nil>
2023/03/11 04:17:40 Unsolicited response received on idle HTTP channel starting with "{\"url\":\"https://pkg.go.dev/vuln/GO-2021-0159\"},\"ecosystem_specific\":{\"imports\":[{\"path\":\"net/http\",\"symbols\":[\"CanonicalMIMEHeaderKey\",\"body.readLocked\",\"canonicalMIMEHeaderKey\",\"chunkWriter.writeHeader\",\"fixLength\",\"fixTransferEncoding\",\"readTransfer\",\"transferWriter.shouldSendContentLength\",\"validHeaderFieldByte\"]}]}}],\"references\":[{\"type\":\"FIX\",\"url\":\"https://go.dev/cl/13148\"},{\"type\":\"FIX\",\"url\":\"https://go.googlesource.com/go/+/26049f6f9171d1190f3bbe05ec304845cfe6399f\"},{\"type\":\"FIX\",\"url\":\"https://go.dev/cl/11772\"},{\"type\":\"FIX\",\"url\":\"https://go.dev/cl/11810\"},{\"type\":\"FIX\",\"url\":\"https://go.dev/cl/12865\"},{\"type\":\"FIX\",\"url\":\"https://go.googlesource.com/go/+/117ddcb83d7f42d6aa72241240af99ded81118e9\"},{\"type\":\"FIX\",\"url\":\"https://go.googlesource.com/go/+/300d9a21583e7cf0149a778a0611e76ff7c6680f\"},{\"type\":\"FIX\",\"url\":\"https://go.googlesource.com/go/+/c2db5f4ccc61ba7df96a747e268a277b802cbb87\"},{\"type\":\"REPORT\",\"url\":\"https://go.dev/issue/12027\"},{\"type\":\"REPORT\",\"url\":\"https://go.dev/issue/11930\"},{\"type\":\"WEB\",\"url\":\"https://groups.google.com/g/golang-announce/c/iSIyW4lM4hY/m/ADuQR4DiDwAJ\"}]}\n"; err=<nil>
2023-04-03 18:12 illumos-amd64 vuln@bb7d1b25 go@33d8cdee x/vuln/internal/client.TestByModule (log)
2023/04/03 18:15:28 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/03 18:15:28 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
--- FAIL: TestByModule (0.01s)
    --- FAIL: TestByModule/lower-http (0.00s)
        client_test.go:82: httpSource.ByModule("github.com/tidwall/gjson"): Index(): Get "http://127.0.0.1:55205/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "\"ecosystem\":"
2023/04/03 18:15:28 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023-04-03 18:12 illumos-amd64 vuln@bb7d1b25 go@33d8cdee x/vuln/internal/client.TestMustUseIndex (log)
--- FAIL: TestMustUseIndex (0.00s)
    client_test.go:140: Index(): Get "http://127.0.0.1:43878/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "\"ecosystem\":"

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-03-16 17:44 illumos-amd64 go@ab28b834 runtime.TestCgoExternalThreadSignal (log)
--- FAIL: TestCgoExternalThreadSignal (22.53s)
    exec.go:146: test timed out while running command: /var/tmp/workdir-host-illumos-amd64-jclulow/tmp/go-build3969320132/testprogcgo.exe CgoExternalThreadSignal
    crash_cgo_test.go:112: /var/tmp/workdir-host-illumos-amd64-jclulow/tmp/go-build3969320132/testprogcgo.exe CgoExternalThreadSignal: exit status 2
    crash_cgo_test.go:114: expected "OK\n", but got:
        SIGQUIT: quit (ASCII FS)
        PC=0xfffffc7fef1ff33a m=0 sigcode=0

        rax    0x5b
        rbx    0xfffffc7fef2d2a40
        rcx    0x3
...
panic: test timed out after 3m0s
running tests:
	TestFakeTime (40s)

goroutine 92303 [running]:
panic({0x77d2e0?, 0xc00009b730?})
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/panic.go:1016 +0x3ac fp=0xc00005df10 sp=0xc00005de60 pc=0x43990c
testing.(*M).startAlarm.func1()
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/testing/testing.go:2260 +0x3b4 fp=0xc00005dfe0 sp=0xc00005df10 pc=0x4fc474
runtime.goexit()
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/runtime/asm_amd64.s:1619 +0x1 fp=0xc00005dfe8 sp=0xc00005dfe0 pc=0x474be1
created by time.goFunc
	/var/tmp/workdir-host-illumos-amd64-jclulow/go/src/time/sleep.go:176 +0x2d

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-07 21:18 illumos-amd64 vuln@ee3d8738 go@693a34e7 x/vuln/internal/client.TestByModuleLegacy (log)
2023/04/07 23:13:16 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/07 23:13:16 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/07 23:13:16 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/07 23:13:16 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/07 23:13:16 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/07 23:13:16 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/07 23:13:16 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/07 23:13:16 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/07 23:13:16 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/07 23:13:16 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/07 23:13:16 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/07 23:13:16 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/07 23:13:16 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/192\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-35380\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/advisories/GHSA-w942-gw6m-p62c\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0265\",\n        \"published\": \"2022-01-14T17:30:24Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-36066\",\n            \"CVE-2021-42836\",\n            \"GHSA-ppj4-34rq-v8j9\",\n            \"GHSA-wjm3-fq3r-5x46\"\n        ],\n        \"details\": \"GJSON allowed a ReDoS (regular expression denial of service) attack.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\""; err=<nil>
--- FAIL: TestByModuleLegacy (0.01s)
    --- FAIL: TestByModuleLegacy/http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/BeeGo/beego"): Index(): Get "http://127.0.0.1:54688/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
2023-04-07 21:18 illumos-amd64 vuln@ee3d8738 go@693a34e7 x/vuln/internal/client.TestMustUseIndex (log)
--- FAIL: TestMustUseIndex (0.00s)
    legacy_test.go:124: Index(): Get "http://127.0.0.1:59423/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
2023/04/07 23:13:16 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-07 21:18 illumos-amd64 vuln@ee3d8738 go@58eaecbf x/vuln/internal/client.TestByModuleLegacy (log)
2023/04/11 01:25:12 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/11 01:25:12 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/11 01:25:12 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/11 01:25:12 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/11 01:25:12 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/11 01:25:12 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/11 01:25:12 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/11 01:25:12 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/11 01:25:12 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/11 01:25:12 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/11 01:25:12 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/11 01:25:12 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/11 01:25:12 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
--- FAIL: TestByModuleLegacy (0.01s)
    --- FAIL: TestByModuleLegacy/http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/BeeGo/beego"): Index(): Get "http://127.0.0.1:58393/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
2023/04/11 01:25:12 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                \"Controller.Render\",\n                \"Controller.RenderBytes\",\n                \"Controller.RenderString\",\n                \"Controller.Resp\",\n                \"Controller.SaveToFile\",\n                \"Controller.ServeFormatted\",\n                \"Controller.ServeXML\",\n                \"Controller.ServeYAML\",\n                \"Controller.SetSecureCookie\",\n                \"Controller.Trace\",\n                \"Controller.URLFor\",\n                \"Controller.XMLResp\",\n                \"Controller.XSRFFormHTML\",\n                \"Controller.XSRFToken\",\n                \"Controller.YamlResp\",\n                \"ControllerRegister.Add\",\n                \"ControllerRegister.AddAuto\",\n                \"C"; err=<nil>
2023/04/11 01:25:12 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/11 01:25:12 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/11 01:25:12 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023-04-07 21:18 illumos-amd64 vuln@ee3d8738 go@f00c5414 x/vuln/internal/client.TestMustUseIndex (log)
2023/04/10 23:53:52 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/10 23:53:52 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/10 23:53:52 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/10 23:53:52 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/10 23:53:52 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/10 23:53:52 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/10 23:53:52 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/10 23:53:52 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/10 23:53:52 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/10 23:53:52 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/10 23:53:52 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                \"Controller.Render\",\n                \"Controller.RenderBytes\",\n                \"Controller.RenderString\",\n                \"Controller.Resp\",\n                \"Controller.SaveToFile\",\n                \"Controller.ServeFormatted\",\n                \"Controller.ServeXML\",\n                \"Controller.ServeYAML\",\n                \"Controller.SetSecureCookie\",\n                \"Controller.Trace\",\n                \"Controller.URLFor\",\n                \"Controller.XMLResp\",\n                \"Controller.XSRFFormHTML\",\n                \"Controller.XSRFToken\",\n                \"Controller.YamlResp\",\n                \"ControllerRegister.Add\",\n                \"ControllerRegister.AddAuto\",\n                \"C"; err=<nil>
2023/04/10 23:53:52 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                \"Controller.Render\",\n                \"Controller.RenderBytes\",\n                \"Controller.RenderString\",\n                \"Controller.Resp\",\n                \"Controller.SaveToFile\",\n                \"Controller.ServeFormatted\",\n                \"Controller.ServeXML\",\n                \"Controller.ServeYAML\",\n                \"Controller.SetSecureCookie\",\n                \"Controller.Trace\",\n                \"Controller.URLFor\",\n                \"Controller.XMLResp\",\n                \"Controller.XSRFFormHTML\",\n                \"Controller.XSRFToken\",\n                \"Controller.YamlResp\",\n                \"ControllerRegister.Add\",\n                \"ControllerRegister.AddAuto\",\n                \"C"; err=<nil>
2023/04/10 23:53:52 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/10 23:53:52 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
--- FAIL: TestMustUseIndex (0.00s)
    legacy_test.go:124: Index(): Get "http://127.0.0.1:38983/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
2023/04/10 23:53:52 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-07 21:18 illumos-amd64 vuln@ee3d8738 go@c1ac63e9 x/vuln/internal/client.TestByModule (log)
2023/04/11 05:00:26 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/11 05:00:26 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/11 05:00:26 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/11 05:00:26 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/11 05:00:26 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/11 05:00:26 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/11 05:00:26 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
--- FAIL: TestByModule (0.09s)
    --- FAIL: TestByModule/stdlib (0.01s)
        --- FAIL: TestByModule/stdlib/http (0.01s)
            client_test.go:127: Get "http://127.0.0.1:46925/ID/GO-2022-0229.json.gz": net/http: HTTP/1.x transport connection broken: malformed HTTP version "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00HTTP/1.1"
2023/04/11 05:00:26 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/11 05:00:26 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/11 05:00:26 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023-04-07 21:18 illumos-amd64 vuln@ee3d8738 go@c1ac63e9 x/vuln/internal/client.TestByModuleLegacy (log)
--- FAIL: TestByModuleLegacy (0.01s)
    --- FAIL: TestByModuleLegacy/lower-http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/tidwall/gjson"): Index(): Get "http://127.0.0.1:42527/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "\"ecosystem\":"
2023/04/11 05:00:26 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/11 05:00:26 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/11 05:00:26 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/11 05:00:26 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-07 21:18 illumos-amd64 vuln@ee3d8738 go@e21d126e x/vuln/internal/client.TestByModuleLegacy (log)
2023/04/11 07:12:00 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/11 07:12:00 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/11 07:12:00 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/11 07:12:00 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/11 07:12:00 Unsolicited response received on idle HTTP channel starting with "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00"; err=<nil>
2023/04/11 07:12:00 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/11 07:12:00 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/11 07:12:00 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/11 07:12:00 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/11 07:12:00 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/11 07:12:00 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
--- FAIL: TestByModuleLegacy (0.01s)
    --- FAIL: TestByModuleLegacy/lower-http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/tidwall/gjson"): Index(): Get "http://127.0.0.1:57151/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "\"ecosystem\":"
2023/04/11 07:12:01 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/11 07:12:01 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/11 07:12:01 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/11 07:12:01 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-07 21:18 illumos-amd64 vuln@ee3d8738 go@80eeec69 x/vuln/internal/client.TestByModule (log)
2023/04/11 09:50:49 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/11 09:50:49 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/11 09:50:49 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/11 09:50:49 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/11 09:50:49 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/11 09:50:49 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/11 09:50:49 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
--- FAIL: TestByModule (0.09s)
    --- FAIL: TestByModule/stdlib (0.01s)
        --- FAIL: TestByModule/stdlib/http (0.01s)
            client_test.go:127: Get "http://127.0.0.1:40353/ID/GO-2021-0159.json.gz": net/http: HTTP/1.x transport connection broken: malformed HTTP version "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00HTTP/1.1"
2023/04/11 09:50:49 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/11 09:50:49 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/11 09:50:49 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/11 09:50:49 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023-04-07 21:18 illumos-amd64 vuln@ee3d8738 go@80eeec69 x/vuln/internal/client.TestMustUseIndex (log)
--- FAIL: TestMustUseIndex (0.00s)
    legacy_test.go:124: Index(): Get "http://127.0.0.1:36460/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
2023/04/11 09:50:49 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-07 21:18 illumos-amd64 vuln@ee3d8738 go@313d9653 x/vuln/internal/client.TestMustUseIndex (log)
2023/04/11 12:14:24 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/11 12:14:24 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/11 12:14:24 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/11 12:14:24 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/11 12:14:24 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/11 12:14:24 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/11 12:14:24 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/11 12:14:24 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/11 12:14:24 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/11 12:14:24 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/11 12:14:24 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/11 12:14:24 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/11 12:14:24 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
--- FAIL: TestMustUseIndex (0.01s)
    legacy_test.go:124: Index(): Get "http://127.0.0.1:36619/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
2023/04/11 12:14:24 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-11 20:11 illumos-amd64 vuln@aaaefcd2 go@da879c6e x/vuln/internal/client.TestByModule (log)
2023/04/12 00:30:59 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/12 00:30:59 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/12 00:30:59 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/12 00:30:59 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/12 00:30:59 Unsolicited response received on idle HTTP channel starting with "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00"; err=<nil>
2023/04/12 00:30:59 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/12 00:30:59 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/12 00:30:59 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/12 00:30:59 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
--- FAIL: TestByModule (0.08s)
    --- FAIL: TestByModule/toolchain (0.01s)
        --- FAIL: TestByModule/toolchain/http (0.01s)
            client_test.go:197: Get "http://127.0.0.1:49848/ID/GO-2021-0068.json.gz": net/http: HTTP/1.x transport connection broken: malformed HTTP response "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi"
2023/04/12 00:30:59 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/12 00:30:59 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/12 00:30:59 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/12 00:30:59 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/12 00:30:59 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/12 00:30:59 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/12 00:30:59 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                \"Controller.Render\",\n                \"Controller.RenderBytes\",\n                \"Controller.RenderString\",\n                \"Controller.Resp\",\n                \"Controller.SaveToFile\",\n                \"Controller.ServeFormatted\",\n                \"Controller.ServeXML\",\n                \"Controller.ServeYAML\",\n                \"Controller.SetSecureCookie\",\n                \"Controller.Trace\",\n                \"Controller.URLFor\",\n                \"Controller.XMLResp\",\n                \"Controller.XSRFFormHTML\",\n                \"Controller.XSRFToken\",\n                \"Controller.YamlResp\",\n                \"ControllerRegister.Add\",\n                \"ControllerRegister.AddAuto\",\n                \"C"; err=<nil>
2023/04/12 00:30:59 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-11 15:22 illumos-amd64 vuln@ffb0ab1b go@39740296 x/vuln/internal/client.TestByModuleLegacy (log)
2023/04/12 04:02:48 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/12 04:02:48 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/12 04:02:48 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/12 04:02:48 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/12 04:02:48 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/12 04:02:48 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/12 04:02:48 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/12 04:02:48 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/12 04:02:48 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/12 04:02:48 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
--- FAIL: TestByModuleLegacy (0.01s)
    --- FAIL: TestByModuleLegacy/lower-http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/tidwall/gjson"): Index(): Get "http://127.0.0.1:56076/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "\"ecosystem\":"
2023/04/12 04:02:48 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/12 04:02:48 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/12 04:02:48 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/12 04:02:48 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-11 15:22 illumos-amd64 vuln@ffb0ab1b go@05cd6cbb x/vuln/internal/client.TestMustUseIndex (log)
2023/04/12 05:42:36 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/12 05:42:36 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/12 05:42:36 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/12 05:42:36 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/12 05:42:36 Unsolicited response received on idle HTTP channel starting with "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00"; err=<nil>
2023/04/12 05:42:36 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/12 05:42:36 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/12 05:42:36 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/12 05:42:36 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/12 05:42:36 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/12 05:42:36 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/12 05:42:36 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/12 05:42:36 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/12 05:42:36 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                \"Controller.Render\",\n                \"Controller.RenderBytes\",\n                \"Controller.RenderString\",\n                \"Controller.Resp\",\n                \"Controller.SaveToFile\",\n                \"Controller.ServeFormatted\",\n                \"Controller.ServeXML\",\n                \"Controller.ServeYAML\",\n                \"Controller.SetSecureCookie\",\n                \"Controller.Trace\",\n                \"Controller.URLFor\",\n                \"Controller.XMLResp\",\n                \"Controller.XSRFFormHTML\",\n                \"Controller.XSRFToken\",\n                \"Controller.YamlResp\",\n                \"ControllerRegister.Add\",\n                \"ControllerRegister.AddAuto\",\n                \"ControllerRegister.AddAutoPrefix\",\n                \"ControllerRegister.AddMethod\",\n                \"ControllerRegister.AddRouterMethod\",\n                \"ControllerRegister.Any\",\n                \"ControllerRegister.CtrlAny\",\n                \"ControllerRegister.CtrlDelete\",\n                \"ControllerRegister.CtrlGet\",\n                \"ControllerRegister.CtrlHead\",\n                \"ControllerRegister.CtrlOptions\",\n                \"ControllerRegister.CtrlPatch\",\n                \"ControllerRegister.CtrlPost\",\n                \"ControllerRegister.CtrlPut\",\n                \"ControllerRegister.Delete\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.Get\",\n                \"ControllerRegister.Handler\",\n                \"ControllerRegister.Head\",\n                \"ControllerRegister.Include\",\n                \"ControllerRegister.Init\",\n                \"ControllerRegister.InsertFilter\",\n                \"ControllerRegister.Options\",\n                \"ControllerRegister.Patch\",\n                \"ControllerRegister.Post\",\n                \"ControllerRegister.Put\",\n                \"ControllerRegister.ServeHTTP\",\n                \"ControllerRegister.URLFor\",\n       "; err=<nil>
2023/04/12 05:42:36 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/12 05:42:36 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/12 05:42:36 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
--- FAIL: TestMustUseIndex (0.00s)
    legacy_test.go:124: Index(): Get "http://127.0.0.1:58881/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "\"ecosystem\":"
2023/04/12 05:42:36 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-11 15:22 illumos-amd64 vuln@ffb0ab1b go@1f908bd0 x/vuln/internal/client.TestByModuleLegacy (log)
2023/04/12 06:35:03 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/12 06:35:03 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/12 06:35:03 Unsolicited response received on idle HTTP channel starting with "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00"; err=<nil>
2023/04/12 06:35:03 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/12 06:35:03 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/12 06:35:03 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/12 06:35:03 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/12 06:35:03 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/12 06:35:03 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/12 06:35:03 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/12 06:35:03 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
--- FAIL: TestByModuleLegacy (0.01s)
    --- FAIL: TestByModuleLegacy/http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/BeeGo/beego"): Index(): Get "http://127.0.0.1:48761/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
2023/04/12 06:35:03 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/12 06:35:03 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/12 06:35:03 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/12 06:35:03 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-11 20:11 illumos-amd64 vuln@aaaefcd2 go@de475e8a x/vuln/internal/client.TestMustUseIndex (log)
2023/04/12 10:00:08 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/12 10:00:08 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/12 10:00:09 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/12 10:00:09 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/12 10:00:09 Unsolicited response received on idle HTTP channel starting with "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00"; err=<nil>
2023/04/12 10:00:09 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/12 10:00:09 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/12 10:00:09 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/12 10:00:09 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/12 10:00:09 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/12 10:00:09 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/12 10:00:09 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/12 10:00:09 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/12 10:00:09 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/12 10:00:09 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
--- FAIL: TestMustUseIndex (0.00s)
    legacy_test.go:124: Index(): Get "http://127.0.0.1:54146/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "\"ecosystem\":"
2023-04-12 13:34 illumos-amd64 vuln@9e1d9af8 go@de475e8a x/vuln/internal/client.TestByModuleLegacy (log)
2023/04/12 13:36:11 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/12 13:36:11 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/12 13:36:11 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/12 13:36:11 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/12 13:36:11 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/12 13:36:11 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/12 13:36:11 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/12 13:36:11 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/12 13:36:11 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
--- FAIL: TestByModuleLegacy (0.00s)
    --- FAIL: TestByModuleLegacy/http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/BeeGo/beego"): Index(): Get "http://127.0.0.1:58303/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
    --- FAIL: TestByModuleLegacy/lower-http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/tidwall/gjson"): Index(): Get "http://127.0.0.1:58303/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "\"ecosystem\":"
2023/04/12 13:36:11 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/12 13:36:11 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/12 13:36:11 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                \"Controller.Render\",\n                \"Controller.RenderBytes\",\n                \"Controller.RenderString\",\n                \"Controller.Resp\",\n                \"Controller.SaveToFile\",\n                \"Controller.ServeFormatted\",\n                \"Controller.ServeXML\",\n                \"Controller.ServeYAML\",\n                \"Controller.SetSecureCookie\",\n                \"Controller.Trace\",\n                \"Controller.URLFor\",\n                \"Controller.XMLResp\",\n                \"Controller.XSRFFormHTML\",\n                \"Controller.XSRFToken\",\n                \"Controller.YamlResp\",\n                \"ControllerRegister.Add\",\n                \"ControllerRegister.AddAuto\",\n                \"C"; err=<nil>
2023/04/12 13:36:11 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-12 13:35 illumos-amd64 vuln@9f5a5f4d go@de475e8a x/vuln/internal/client.TestMustUseIndex (log)
2023/04/12 13:50:59 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/12 13:50:59 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/12 13:50:59 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/12 13:50:59 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/12 13:50:59 Unsolicited response received on idle HTTP channel starting with "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00"; err=<nil>
2023/04/12 13:50:59 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/12 13:50:59 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/12 13:50:59 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/12 13:50:59 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/12 13:50:59 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/12 13:50:59 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/12 13:50:59 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/12 13:50:59 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/12 13:50:59 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
--- FAIL: TestMustUseIndex (0.00s)
    legacy_test.go:124: Index(): Get "http://127.0.0.1:55047/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "\"ecosystem\":"
2023/04/12 13:50:59 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-12 13:35 illumos-amd64 vuln@76c53851 go@4b154e55 x/vuln/internal/client.TestMustUseIndex (log)
2023/04/12 14:49:36 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/12 14:49:36 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/12 14:49:36 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/12 14:49:36 Unsolicited response received on idle HTTP channel starting with "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00"; err=<nil>
2023/04/12 14:49:36 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/12 14:49:36 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/12 14:49:36 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/12 14:49:36 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/12 14:49:36 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/12 14:49:36 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/12 14:49:36 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/12 14:49:36 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/12 14:49:36 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/12 14:49:36 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
--- FAIL: TestMustUseIndex (0.00s)
    legacy_test.go:124: Index(): Get "http://127.0.0.1:47799/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
2023/04/12 14:49:36 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-12 17:25 illumos-amd64 vuln@fcbc8bf2 go@134af2e3 x/vuln/internal/client.TestByModuleLegacy (log)
2023/04/12 19:22:49 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/12 19:22:49 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/12 19:22:49 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/12 19:22:49 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/12 19:22:49 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/12 19:22:49 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/12 19:22:49 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/12 19:22:49 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/12 19:22:49 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/12 19:22:49 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/12 19:22:49 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/12 19:22:49 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
--- FAIL: TestByModuleLegacy (0.01s)
    --- FAIL: TestByModuleLegacy/http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/BeeGo/beego"): Index(): Get "http://127.0.0.1:36330/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
2023/04/12 19:22:49 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/12 19:22:49 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/12 19:22:49 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/12 19:22:49 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023-04-12 17:25 illumos-amd64 vuln@fcbc8bf2 go@ebc13fb0 x/vuln/internal/client.TestByModuleLegacy (log)
2023/04/12 17:47:56 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/12 17:47:56 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/12 17:47:56 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/12 17:47:56 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/12 17:47:56 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/12 17:47:56 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/12 17:47:56 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/12 17:47:56 Unsolicited response received on idle HTTP channel starting with "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00"; err=<nil>
2023/04/12 17:47:56 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/12 17:47:56 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/12 17:47:56 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/12 17:47:56 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/12 17:47:56 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/12 17:47:56 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
--- FAIL: TestByModuleLegacy (0.01s)
    --- FAIL: TestByModuleLegacy/lower-http (0.01s)
        legacy_test.go:66: httpSource.ByModule("github.com/tidwall/gjson"): Index(): Get "http://127.0.0.1:53051/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "\"ecosystem\":"
2023/04/12 17:47:56 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/12 17:47:56 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/12 17:47:56 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-12 20:19 illumos-amd64 vuln@506ee65b go@1312d9e6 x/vuln/internal/client.TestByModule (log)
2023/04/13 17:04:23 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/13 17:04:23 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/13 17:04:23 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/13 17:04:23 Unsolicited response received on idle HTTP channel starting with "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00"; err=<nil>
2023/04/13 17:04:23 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/13 17:04:23 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
--- FAIL: TestByModule (0.06s)
    --- FAIL: TestByModule/github.com/beego/beego (0.02s)
        --- FAIL: TestByModule/github.com/beego/beego/http (0.00s)
            client_test.go:197: Get "http://127.0.0.1:52516/ID/GO-2022-0572.json.gz": net/http: HTTP/1.x transport connection broken: malformed HTTP response "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01"
2023/04/13 17:04:23 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/192\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-35380\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/advisories/GHSA-w942-gw6m-p62c\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0265\",\n        \"published\": \"2022-01-14T17:30:24Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-36066\",\n            \"CVE-2021-42836\",\n            \"GHSA-ppj4-34rq-v8j9\",\n            \"GHSA-wjm3-fq3r-5x46\"\n        ],\n        \"details\": \"GJSON allowed a ReDoS (regular expression denial of service) attack.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\""; err=<nil>
2023/04/13 17:04:23 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023-04-12 20:19 illumos-amd64 vuln@506ee65b go@1312d9e6 x/vuln/internal/client.TestByModuleLegacy (log)
--- FAIL: TestByModuleLegacy (0.01s)
    --- FAIL: TestByModuleLegacy/http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/BeeGo/beego"): Index(): Get "http://127.0.0.1:62208/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
2023/04/13 17:04:23 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/13 17:04:23 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/13 17:04:23 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023-04-12 20:19 illumos-amd64 vuln@506ee65b go@e8fe3b77 x/vuln/internal/client.TestByModule (log)
2023/04/13 03:52:42 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/13 03:52:42 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/13 03:52:42 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/13 03:52:42 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/13 03:52:42 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/13 03:52:42 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/13 03:52:42 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/13 03:52:42 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
--- FAIL: TestByModule (0.07s)
    --- FAIL: TestByModule/stdlib (0.01s)
        --- FAIL: TestByModule/stdlib/http (0.01s)
            client_test.go:197: Get "http://127.0.0.1:51689/ID/GO-2022-0229.json.gz": net/http: HTTP/1.x transport connection broken: malformed HTTP version "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00HTTP/1.1"
2023/04/13 03:52:42 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023-04-12 20:19 illumos-amd64 vuln@506ee65b go@e8fe3b77 x/vuln/internal/client.TestByModuleLegacy (log)
--- FAIL: TestByModuleLegacy (0.01s)
    --- FAIL: TestByModuleLegacy/lower-http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/tidwall/gjson"): Index(): Get "http://127.0.0.1:62739/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "\"ecosystem\":"
2023/04/13 03:52:42 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/13 03:52:42 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/192\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-35380\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/advisories/GHSA-w942-gw6m-p62c\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0265\",\n        \"published\": \"2022-01-14T17:30:24Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-36066\",\n            \"CVE-2021-42836\",\n            \"GHSA-ppj4-34rq-v8j9\",\n            \"GHSA-wjm3-fq3r-5x46\"\n        ],\n    "; err=<nil>
2023/04/13 03:52:42 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/13 03:52:42 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023-04-13 19:39 illumos-amd64 vuln@03dd099d go@53c01589 x/vuln/internal/client.TestByModule (log)
2023/04/13 19:44:13 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/13 19:44:13 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/13 19:44:13 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/13 19:44:13 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/13 19:44:13 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/13 19:44:13 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/13 19:44:13 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
--- FAIL: TestByModule (0.10s)
    --- FAIL: TestByModule/stdlib (0.01s)
        --- FAIL: TestByModule/stdlib/http (0.01s)
            client_test.go:197: Get "http://127.0.0.1:61269/ID/GO-2021-0240.json.gz": net/http: HTTP/1.x transport connection broken: malformed HTTP version "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00HTTP/1.1"
2023/04/13 19:44:14 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/13 19:44:14 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/13 19:44:14 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/13 19:44:14 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/13 19:44:14 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/13 19:44:14 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023-04-13 19:39 illumos-amd64 vuln@03dd099d go@53c01589 x/vuln/internal/client.TestMustUseIndex (log)
--- FAIL: TestMustUseIndex (0.01s)
    legacy_test.go:124: Index(): Get "http://127.0.0.1:57082/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-12 20:19 illumos-amd64 vuln@506ee65b go@b5a7f2ee x/vuln/internal/client.TestByModuleLegacy (log)
2023/04/13 22:06:28 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/13 22:06:28 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/13 22:06:28 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/13 22:06:29 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/13 22:06:29 Unsolicited response received on idle HTTP channel starting with "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00"; err=<nil>
2023/04/13 22:06:29 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/13 22:06:29 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/13 22:06:29 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/13 22:06:29 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/13 22:06:29 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/13 22:06:29 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/13 22:06:29 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/13 22:06:29 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/13 22:06:29 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
--- FAIL: TestByModuleLegacy (0.01s)
    --- FAIL: TestByModuleLegacy/http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/BeeGo/beego"): Index(): Get "http://127.0.0.1:55366/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
2023/04/13 22:06:29 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/13 22:06:29 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/13 22:06:29 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/13 22:06:29 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-12 20:19 illumos-amd64 vuln@506ee65b go@45c0a7f2 x/vuln/internal/client.TestMustUseIndex (log)
2023/04/14 02:06:04 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/14 02:06:04 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/14 02:06:04 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/14 02:06:04 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/14 02:06:04 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/14 02:06:04 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/14 02:06:04 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/14 02:06:04 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/14 02:06:04 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/14 02:06:04 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/14 02:06:04 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/14 02:06:04 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                \"Controller.Render\",\n                \"Controller.RenderBytes\",\n                \"Controller.RenderString\",\n                \"Controller.Resp\",\n                \"Controller.SaveToFile\",\n                \"Controller.ServeFormatted\",\n                \"Controller.ServeXML\",\n                \"Controller.ServeYAML\",\n                \"Controller.SetSecureCookie\",\n                \"Controller.Trace\",\n                \"Controller.URLFor\",\n                \"Controller.XMLResp\",\n                \"Controller.XSRFFormHTML\",\n                \"Controller.XSRFToken\",\n                \"Controller.YamlResp\",\n                \"ControllerRegister.Add\",\n                \"ControllerRegister.AddAuto\",\n                \"ControllerRegister.AddAutoPrefix\",\n                \"ControllerRegister.AddMethod\",\n                \"ControllerRegister.AddRouterMethod\",\n                \"ControllerRegister.Any\",\n                \"ControllerRegister.CtrlAny\",\n                \"ControllerRegister.CtrlDelete\",\n                \"ControllerRegister.CtrlGet\",\n                \"ControllerRegister.CtrlHead\",\n                \"ControllerRegister.CtrlOptions\",\n                \"ControllerRegister.CtrlPatch\",\n                \"ControllerRegister.CtrlPost\",\n                \"ControllerRegister.CtrlPut\",\n                \"ControllerRegister.Delete\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.Get\",\n                \"ControllerRegister.Handler\",\n                \"ControllerRegister.Head\",\n                \"ControllerRegister.Include\",\n                \"ControllerRegister.Init\",\n                \"ControllerRegister.InsertFilter\",\n                \"ControllerRegister.Options\",\n                \"ControllerRegister.Patch\",\n                \"ControllerRegister.Post\",\n                \"ControllerRegister.Put\",\n                \"ControllerRegister.ServeHTTP\",\n                \"ControllerRegister.URLFor\",\n       "; err=<nil>
2023/04/14 02:06:04 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/192\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-35380\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/advisories/GHSA-w942-gw6m-p62c\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0265\",\n        \"published\": \"2022-01-14T17:30:24Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-36066\",\n            \"CVE-2021-42836\",\n            \"GHSA-ppj4-34rq-v8j9\",\n            \"GHSA-wjm3-fq3r-5x46\"\n        ],\n    "; err=<nil>
2023/04/14 02:06:04 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
--- FAIL: TestMustUseIndex (0.00s)
    legacy_test.go:124: Index(): Get "http://127.0.0.1:38876/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
2023/04/14 02:06:04 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-17 18:43 illumos-amd64 go@0e9b2bc3 runtime/cgo [build] (log)
gcc_stack_unix.c: In function 'x_cgo_getstackbound':
gcc_stack_unix.c:22:2: error: implicit declaration of function 'pthread_getattr_np'; did you mean 'pthread_getname_np'? [-Werror=implicit-function-declaration]
   22 |  pthread_getattr_np(pthread_self(), &attr);  // GNU extension
      |  ^~~~~~~~~~~~~~~~~~
      |  pthread_getname_np
cc1: all warnings being treated as errors
go tool dist: FAILED: /var/tmp/workdir-host-illumos-amd64-jclulow/go/pkg/tool/illumos_amd64/go_bootstrap install std: exit status 1
2023-04-17 18:44 illumos-amd64 go@2068d565 runtime/cgo [build] (log)
gcc_stack_unix.c: In function 'x_cgo_getstackbound':
gcc_stack_unix.c:22:2: error: implicit declaration of function 'pthread_getattr_np'; did you mean 'pthread_getname_np'? [-Werror=implicit-function-declaration]
   22 |  pthread_getattr_np(pthread_self(), &attr);  // GNU extension
      |  ^~~~~~~~~~~~~~~~~~
      |  pthread_getname_np
cc1: all warnings being treated as errors
go tool dist: FAILED: /var/tmp/workdir-host-illumos-amd64-jclulow/go/pkg/tool/illumos_amd64/go_bootstrap install std: exit status 1
2023-04-17 18:46 illumos-amd64 go@97e5ca6d runtime/cgo [build] (log)
gcc_stack_unix.c: In function 'x_cgo_getstackbound':
gcc_stack_unix.c:22:2: error: implicit declaration of function 'pthread_getattr_np'; did you mean 'pthread_getname_np'? [-Werror=implicit-function-declaration]
   22 |  pthread_getattr_np(pthread_self(), &attr);  // GNU extension
      |  ^~~~~~~~~~~~~~~~~~
      |  pthread_getname_np
cc1: all warnings being treated as errors
go tool dist: FAILED: /var/tmp/workdir-host-illumos-amd64-jclulow/go/pkg/tool/illumos_amd64/go_bootstrap install std: exit status 1

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-18 00:32 illumos-amd64 vuln@6ffb3222 go@ce10e9d8 x/vuln/internal/client.TestByModule (log)
2023/04/18 00:35:16 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/18 00:35:16 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/18 00:35:16 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/18 00:35:16 Unsolicited response received on idle HTTP channel starting with "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00"; err=<nil>
2023/04/18 00:35:16 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/18 00:35:16 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/18 00:35:16 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/18 00:35:16 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/18 00:35:16 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
--- FAIL: TestByModule (0.11s)
    --- FAIL: TestByModule/toolchain (0.01s)
        --- FAIL: TestByModule/toolchain/http (0.00s)
            client_test.go:197: Get "http://127.0.0.1:61834/ID/GO-2021-0068.json.gz": net/http: HTTP/1.x transport connection broken: malformed HTTP response "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb"
2023-04-18 00:32 illumos-amd64 vuln@6ffb3222 go@ce10e9d8 x/vuln/internal/client.TestByModuleLegacy (log)
--- FAIL: TestByModuleLegacy (0.01s)
    --- FAIL: TestByModuleLegacy/http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/BeeGo/beego"): Index(): Get "http://127.0.0.1:38352/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
    --- FAIL: TestByModuleLegacy/lower-http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/tidwall/gjson"): Index(): Get "http://127.0.0.1:38352/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "\"ecosystem\":"
2023/04/18 00:35:16 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/18 00:35:16 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/18 00:35:16 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/18 00:35:16 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-18 18:03 illumos-amd64 vuln@1a5d3d87 go@59c2d787 x/vuln/internal/client.TestByModuleLegacy (log)
2023/04/18 19:41:16 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/18 19:41:16 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/18 19:41:16 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/18 19:41:16 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/18 19:41:16 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/18 19:41:16 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/18 19:41:16 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/18 19:41:16 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/18 19:41:16 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/18 19:41:16 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/18 19:41:16 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/18 19:41:16 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/18 19:41:16 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
--- FAIL: TestByModuleLegacy (0.01s)
    --- FAIL: TestByModuleLegacy/http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/BeeGo/beego"): Index(): Get "http://127.0.0.1:65196/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
2023/04/18 19:41:16 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/18 19:41:16 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/18 19:41:16 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/18 19:41:16 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-18 20:23 illumos-amd64 vuln@ab3454f7 go@48a1dcb9 x/vuln/internal/client.TestByModuleLegacy (log)
2023/04/18 21:03:19 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/18 21:03:19 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/18 21:03:19 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/18 21:03:19 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/18 21:03:19 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/18 21:03:19 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/18 21:03:19 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/18 21:03:19 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/18 21:03:19 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
--- FAIL: TestByModuleLegacy (0.00s)
    --- FAIL: TestByModuleLegacy/http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/BeeGo/beego"): Index(): Get "http://127.0.0.1:40635/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
    --- FAIL: TestByModuleLegacy/lower-http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/tidwall/gjson"): Index(): Get "http://127.0.0.1:40635/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "\"ecosystem\":"
2023-04-18 20:23 illumos-amd64 vuln@ab3454f7 go@48a1dcb9 x/vuln/internal/client.TestMustUseIndex (log)
--- FAIL: TestMustUseIndex (0.00s)
    legacy_test.go:124: Index(): Get "http://127.0.0.1:64878/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
2023-04-18 22:00 illumos-amd64 vuln@22f32fdd go@6b165577 x/vuln/internal/client.TestByModuleLegacy (log)
2023/04/18 22:01:53 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/18 22:01:53 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/18 22:01:53 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/18 22:01:53 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/18 22:01:53 Unsolicited response received on idle HTTP channel starting with "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00"; err=<nil>
2023/04/18 22:01:53 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/18 22:01:53 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/18 22:01:53 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/18 22:01:53 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/18 22:01:53 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/18 22:01:53 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/18 22:01:53 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
--- FAIL: TestByModuleLegacy (0.01s)
    --- FAIL: TestByModuleLegacy/http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/BeeGo/beego"): Index(): Get "http://127.0.0.1:41075/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
2023-04-18 22:00 illumos-amd64 vuln@22f32fdd go@6b165577 x/vuln/internal/client.TestMustUseIndex (log)
--- FAIL: TestMustUseIndex (0.00s)
    legacy_test.go:124: Index(): Get "http://127.0.0.1:39864/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
2023/04/18 22:01:53 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-18 01:01 illumos-amd64 vuln@28ba02ac go@2c64b50d x/vuln/internal/client.TestByModule (log)
2023/04/19 05:58:33 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/19 05:58:33 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/19 05:58:33 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/19 05:58:33 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/19 05:58:33 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/19 05:58:33 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/19 05:58:33 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
--- FAIL: TestByModule (0.09s)
    --- FAIL: TestByModule/stdlib (0.01s)
        --- FAIL: TestByModule/stdlib/http (0.01s)
            client_test.go:197: Get "http://127.0.0.1:35651/ID/GO-2021-0159.json.gz": net/http: HTTP/1.x transport connection broken: malformed HTTP version "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00HTTP/1.1"
2023/04/19 05:58:33 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/19 05:58:33 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023-04-18 01:01 illumos-amd64 vuln@28ba02ac go@2c64b50d x/vuln/internal/client.TestByModuleLegacy (log)
--- FAIL: TestByModuleLegacy (0.01s)
    --- FAIL: TestByModuleLegacy/http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/BeeGo/beego"): Index(): Get "http://127.0.0.1:62879/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
2023/04/19 05:58:33 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/19 05:58:33 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/19 05:58:33 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/19 05:58:33 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-18 01:01 illumos-amd64 vuln@28ba02ac go@e875cbd9 x/vuln/internal/client.TestByModule (log)
2023/04/19 07:18:03 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/19 07:18:03 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/19 07:18:03 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/19 07:18:03 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/19 07:18:03 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/19 07:18:03 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/19 07:18:03 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/19 07:18:03 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
--- FAIL: TestByModule (0.09s)
    --- FAIL: TestByModule/stdlib (0.01s)
        --- FAIL: TestByModule/stdlib/http (0.01s)
            client_test.go:197: Get "http://127.0.0.1:65237/ID/GO-2021-0159.json.gz": net/http: HTTP/1.x transport connection broken: malformed HTTP version "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00HTTP/1.1"
2023-04-18 01:01 illumos-amd64 vuln@28ba02ac go@e875cbd9 x/vuln/internal/client.TestByModuleLegacy (log)
--- FAIL: TestByModuleLegacy (0.01s)
    --- FAIL: TestByModuleLegacy/http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/BeeGo/beego"): Index(): Get "http://127.0.0.1:36065/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
    --- FAIL: TestByModuleLegacy/lower-http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/tidwall/gjson"): Index(): Get "http://127.0.0.1:36065/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "\"ecosystem\":"
2023-04-18 01:01 illumos-amd64 vuln@28ba02ac go@e875cbd9 x/vuln/internal/client.TestMustUseIndex (log)
--- FAIL: TestMustUseIndex (0.00s)
    legacy_test.go:124: Index(): Get "http://127.0.0.1:43661/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-19 19:00 illumos-amd64 vuln@1c7313ee go@9cad0cc6 x/vuln/internal/client.TestByModule (log)
2023/04/19 19:02:02 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/19 19:02:02 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/19 19:02:02 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/19 19:02:02 Unsolicited response received on idle HTTP channel starting with "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00"; err=<nil>
2023/04/19 19:02:02 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/19 19:02:02 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/19 19:02:02 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/19 19:02:02 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/19 19:02:02 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
--- FAIL: TestByModule (0.09s)
    --- FAIL: TestByModule/toolchain (0.01s)
        --- FAIL: TestByModule/toolchain/http (0.00s)
            client_test.go:197: Get "http://127.0.0.1:33178/ID/GO-2021-0068.json.gz": net/http: HTTP/1.x transport connection broken: malformed HTTP response "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi"
2023/04/19 19:02:02 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023-04-19 19:00 illumos-amd64 vuln@1c7313ee go@9cad0cc6 x/vuln/internal/client.TestByModuleLegacy (log)
--- FAIL: TestByModuleLegacy (0.01s)
    --- FAIL: TestByModuleLegacy/http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/BeeGo/beego"): Index(): Get "http://127.0.0.1:41238/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
2023/04/19 19:02:02 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/19 19:02:02 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/19 19:02:02 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023-04-19 20:09 illumos-amd64 vuln@d44ddb54 go@54d42999 x/vuln/internal/client.TestByModule (log)
2023/04/19 20:15:48 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/19 20:15:48 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/19 20:15:48 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/19 20:15:48 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/19 20:15:48 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/19 20:15:48 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
--- FAIL: TestByModule (0.08s)
    --- FAIL: TestByModule/stdlib (0.01s)
        --- FAIL: TestByModule/stdlib/http (0.00s)
            client_test.go:197: Get "http://127.0.0.1:33972/ID/GO-2021-0264.json.gz": net/http: HTTP/1.x transport connection broken: malformed HTTP version "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00HTTP/1.1"
2023/04/19 20:15:48 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/19 20:15:48 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/19 20:15:48 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/19 20:15:48 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023-04-19 20:09 illumos-amd64 vuln@d44ddb54 go@54d42999 x/vuln/internal/client.TestMustUseIndex (log)
--- FAIL: TestMustUseIndex (0.00s)
    legacy_test.go:124: Index(): Get "http://127.0.0.1:63323/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-19 19:00 illumos-amd64 vuln@1c7313ee go@54d42999 x/vuln/internal/client.TestByModule (log)
2023/04/19 20:27:16 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/19 20:27:16 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/19 20:27:16 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/19 20:27:16 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/19 20:27:16 Unsolicited response received on idle HTTP channel starting with "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00"; err=<nil>
2023/04/19 20:27:16 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/19 20:27:16 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/19 20:27:16 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/19 20:27:16 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
--- FAIL: TestByModule (0.06s)
    --- FAIL: TestByModule/github.com/beego/beego (0.02s)
        --- FAIL: TestByModule/github.com/beego/beego/http (0.00s)
            client_test.go:197: Get "http://127.0.0.1:36697/ID/GO-2022-0569.json.gz": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "\xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r."
2023/04/19 20:27:16 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/19 20:27:16 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023-04-19 19:00 illumos-amd64 vuln@1c7313ee go@54d42999 x/vuln/internal/client.TestByModuleLegacy (log)
--- FAIL: TestByModuleLegacy (0.01s)
    --- FAIL: TestByModuleLegacy/http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/BeeGo/beego"): Index(): Get "http://127.0.0.1:45199/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
2023/04/19 20:27:16 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023-04-19 19:00 illumos-amd64 vuln@1c7313ee go@54d42999 x/vuln/internal/client.TestMustUseIndex (log)
--- FAIL: TestMustUseIndex (0.00s)
    legacy_test.go:124: Index(): Get "http://127.0.0.1:45013/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "\"ecosystem\":"
2023/04/19 20:27:16 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>

watchflakes

@gopherbot
Copy link
Author

Found new dashboard test flakes for:

#!watchflakes
default <- builder == "illumos-amd64"
2023-04-19 20:09 illumos-amd64 vuln@d44ddb54 go@5c865c78 x/vuln/internal/client.TestMustUseIndex (log)
2023/04/19 22:31:11 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/19 22:31:11 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/19 22:31:11 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/19 22:31:11 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/19 22:31:11 Unsolicited response received on idle HTTP channel starting with "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00"; err=<nil>
2023/04/19 22:31:11 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/19 22:31:11 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/19 22:31:11 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/19 22:31:11 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/19 22:31:11 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/19 22:31:11 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/19 22:31:11 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/19 22:31:11 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/19 22:31:11 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
--- FAIL: TestMustUseIndex (0.00s)
    legacy_test.go:124: Index(): Get "http://127.0.0.1:48842/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "\"ecosystem\":"
2023/04/19 22:31:11 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023-04-19 23:12 illumos-amd64 vuln@ceb2c821 go@547e8e22 x/vuln/internal/client.TestByModuleLegacy (log)
2023/04/20 11:54:38 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/20 11:54:38 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/20 11:54:38 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/20 11:54:38 Unsolicited response received on idle HTTP channel starting with "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00"; err=<nil>
2023/04/20 11:54:38 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/20 11:54:38 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/20 11:54:38 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/20 11:54:38 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/20 11:54:38 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/20 11:54:38 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/20 11:54:38 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/20 11:54:38 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/20 11:54:38 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
--- FAIL: TestByModuleLegacy (0.01s)
    --- FAIL: TestByModuleLegacy/http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/BeeGo/beego"): Index(): Get "http://127.0.0.1:46336/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
2023/04/20 11:54:38 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023-04-19 23:12 illumos-amd64 vuln@ceb2c821 go@547e8e22 x/vuln/internal/client.TestMustUseIndex (log)
--- FAIL: TestMustUseIndex (0.00s)
    legacy_test.go:124: Index(): Get "http://127.0.0.1:44640/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "\"ecosystem\":"
2023/04/20 11:54:38 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023-04-20 16:36 illumos-amd64 vuln@ff7c873c go@0d699b6c x/vuln/internal/client.TestMustUseIndex (log)
2023/04/20 19:01:59 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/20 19:01:59 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/20 19:01:59 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/20 19:01:59 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/20 19:01:59 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/20 19:01:59 Unsolicited response received on idle HTTP channel starting with "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00"; err=<nil>
2023/04/20 19:01:59 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/20 19:01:59 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/20 19:01:59 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023/04/20 19:01:59 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/20 19:01:59 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
2023/04/20 19:01:59 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/20 19:01:59 Unsolicited response received on idle HTTP channel starting with " \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.6\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0054\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"Result.ForEach\",\n                                \"unwrap\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://github.com/tidwall/gjson/issues/196\"\n            },\n            {\n                \"type\": \"WEB\",\n                \"url\": \"https://nvd.nist.gov/vuln/detail/CVE-2020-36067\"\n            }\n        ]\n    },\n    {\n        \"id\": \"GO-2021-0059\",\n        \"published\": \"2021-04-14T20:04:52Z\",\n        \"modified\": \"2022-08-19T22:21:47Z\",\n        \"aliases\": [\n            \"CVE-2020-35380\",\n            \"GHSA-w942-gw6m-p62c\"\n        ],\n        \"details\": \"Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.\",\n        \"affected\": [\n            {\n                \"package\": {\n                    \"name\": \"github.com/tidwall/gjson\",\n                    \"ecosystem\": \"Go\"\n                },\n                \"ranges\": [\n                    {\n                        \"type\": \"SEMVER\",\n                        \"events\": [\n                            {\n                                \"introduced\": \"0\"\n                            },\n                            {\n                                \"fixed\": \"1.6.4\"\n                            }\n                        ]\n                    }\n                ],\n                \"database_specific\": {\n                    \"url\": \"https://pkg.go.dev/vuln/GO-2021-0059\"\n                },\n                \"ecosystem_specific\": {\n                    \"imports\": [\n                        {\n                            \"path\": \"github.com/tidwall/gjson\",\n                            \"symbols\": [\n                                \"sqaush\"\n                            ]\n                        }\n                    ]\n                }\n            }\n        ],\n        \"references\": [\n            {\n                \"type\": \"FIX\",\n                \"url\": \"https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc\"\n            },\n            {"; err=<nil>
2023/04/20 19:01:59 Unsolicited response received on idle HTTP channel starting with "  {\n        \"package\": {\n          \"name\": \"github.com/beego/beego\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"1.12.9\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego\",\n              \"symbols\": [\n                \"App.Run\",\n                \"ControllerRegister.FindPolicy\",\n                \"ControllerRegister.FindRouter\",\n                \"ControllerRegister.ServeHTTP\",\n                \"FilterRouter.ValidRouter\",\n                \"InitBeegoBeforeTest\",\n                \"Run\",\n                \"RunWithMiddleWares\",\n                \"TestBeegoInit\",\n                \"Tree.Match\",\n                \"Tree.match\",\n                \"adminApp.Run\"\n              ]\n            }\n          ]\n        }\n      },\n      {\n        \"package\": {\n          \"name\": \"github.com/beego/beego/v2\",\n          \"ecosystem\": \"Go\"\n        },\n        \"ranges\": [\n          {\n            \"type\": \"SEMVER\",\n            \"events\": [\n              {\n                \"introduced\": \"0\"\n              },\n              {\n                \"fixed\": \"2.0.3\"\n              }\n            ]\n          }\n        ],\n        \"database_specific\": {\n          \"url\": \"https://pkg.go.dev/vuln/GO-2022-0463\"\n        },\n        \"ecosystem_specific\": {\n          \"imports\": [\n            {\n              \"path\": \"github.com/beego/beego/v2/server/web\",\n              \"symbols\": [\n                \"AddNamespace\",\n                \"Any\",\n                \"AutoPrefix\",\n                \"AutoRouter\",\n                \"Compare\",\n                \"CompareNot\",\n                \"Controller.Bind\",\n                \"Controller.BindForm\",\n                \"Controller.BindXML\",\n                \"Controller.BindYAML\",\n                \"Controller.GetSecureCookie\",\n                \"Controller.ParseForm\",\n                "; err=<nil>
--- FAIL: TestMustUseIndex (0.00s)
    legacy_test.go:124: Index(): Get "http://127.0.0.1:36270/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "\"ecosystem\":"
2023/04/20 19:01:59 Unsolicited response received on idle HTTP channel starting with "\xd5\xeb\xee\xfb\xf7\x19\x8e\xa6\xd1\xdf\xc9nL\x89\xa6^X\xbd\x12\xd6\xd2d%&2\x19Ft/\x1f?\x88j{J\x86\xe4L\xe5ky\xb2ǧ\xa7\xa7\x9f\xff\xc3\xd4o]J\xff\xb7K\xc5\x1a3̰RUUeeӴ\x9b\xachx\xb6\xaer\xb9V9f\x1bQ\x95j=\xbbt\x88@:T\xe6\xbe\xf9\xfb\xe9>\x9f)\x88_\x96\xa8\x12A4\xc2\xe3ñ<b\x8c_u|G?N\xbdM\x1e\x9e\x92\xeb\xf5\xcf\x00\x00\x00\xff\xffUwZ\xbcz\x04\x00\x00"; err=<nil>
2023-04-20 16:41 illumos-amd64 vuln@4183d94f go@bdccb85f x/vuln/internal/client.TestByModuleLegacy (log)
2023/04/20 18:56:32 Unsolicited response received on idle HTTP channel starting with "\xa7\xc2廞\xeb!\xf3\xf15}\xcb\xc9ɟ\tbo\xe7\xf7\xa4\xf1\xae\xe8\xbdª\x12RB\x1ep\f2\xc1\x01 \xc7\f\x9f(\xbc\xce\xccv\x0e\x1a1\x13ˑV|&`M\xdf\x0e\x83<\x16W\x9aFd\tq\x12a\x05iT\xe3\x04\v\xeb\xd7\x03W\xa5`\xbb\xa3\x15\x17\x15t\x1dB\xb0\xfd\xb2\x98\x8f\xaf9\xdfR\xa8\b\xb5T<nXu\x03\x11(\xa82\xa9\x04\x7f_\x80L/\x8e\x92\xec\x13\xa8\x1a\xb8\xe2<\xaa\xc11\x8d\xa0\x0e#\x8e\xeb\xeb'\xac\x91\xf5Ϛ\xe8\x89\xdfD\xcfN\x9b\xe8E\r. \xd0\x02\x9a<d\x84JP\xb6i\xc1\xb2\xc6?\xd3F\x1d\rnP\xd2\xe0\x06-\r\xae\xa8y\a\x98\x94Ʉ%\xba⢉\x1c}\xc7oe\xf6\x98(\xcaYE\xd1\x19\x16\x12\xc6\\\xc4U\x9c\x15\xae\x8d\xb8\xac|dV\xfd\xea\x1c\b\x15\x10\xd4(#\x95\xd3\xe8\xc0\xae\xde\x15\xc8&A\x93\xab\x17x\aK^ϛ\xf4@3\x16`en\xed\xba\xec\x7f\x8bLJ\x16<k\xe0_\xa6\xf7\r\xf4\xafQ\x1d\xa7\xf9?\x87\r0\x10X\xc1\xe4\xa6:A\xdd`\x85k\xb0=ɖ\";\x1e,\xf4y~?\xe6\x15\xe7\x99*6\x06\xdf-\xab:\x19ɒo\xa1\xe5\xee\x18\x11\xd2*0'\xceO\x85\xf9\xd9\xd4<e\n*\xe4m۳\x96˪\xe1x\xf9c\x17]\xf5(\xb2\x05\x86\xc2[\x8b\xfc\x0e3\x12\xb5\xedZ\xab\xbe\\2aA\xa4\t\xb4\t%\b\x95ݷ\xbf\x9eq\x1db\xda\x12¦\"΅\xf5\xaa-D\xd5\xea-$Z\xfd\xfa\xa5\xd0 \xce3\xf3&\xbb\x95̟\xac\f\x0f\x83\xf4h1\xbf\x8fA\xbe}\v U?\xfd\r\x81V`\xddj\ar\xbc\x17-\x89\xa9\xf9Ez1\xbb\x8fI\x9a\xdb?y\xb8\x8c#,CSw\xee\xad\x10\xbcL\x1e\xb8\xa2i\x81\x15h\x91f\x895V\\Tf\xe8\xb4E(\xb1g,Xv@eY\x96\xa5Ԛ\x1ab\xaaҗ\xca|\xb9ȤC\xdaܩ8\xfa\xa1yj\x95\xf9\xadY1RI\xea\xf0c\xb5\xd8\xc0\xae\xbe\n\xcf\xed\xb6x\xeep\x8bezZ\xc0\xd2͂G5sRdu\t\x96\xb2\xb9Er\xccbK|\xcf7\xa3\xa37-\\$\xb5\x05\x8f\xc9l\xa3,\x89m\"(S\xe6\xa9Y\xc1\xba2o~\xbbX6\xb9\xaa\x91\xa5\x8f\xdc\xc2\xf0\xe6\xa7p\xc5\aM\x86\xdfsLFI\x92g\x86m\xfd\x14'YH\xf2g\xe1!\xee\xd6\xd8\x0e{\x19\xe7j\x17\xf8\x9a3R\x02y\x16\x14(\u05f6@U%\x8a\xb4\xb0X\x96\x15\x05(|S0\xfby[\xd0\"\xb2\x05;\x06\xd6\"Y\\-\xa0\xcb\xe3\xc2^x\xad\x1fEm\xdc4)\xd7\xebM&.\x02܀w\xc7MJVp\xf5@\xcd˵0\xc2~-\x1d\xcd\xc8糖\x15vJfv\x94\x92o\x0e\x98\x8c\x05\x8f\xe7\xf0C\x1f\x9a\xaa\xf4\xc9sص\x98\xf7\x9b\xadֈ\x14g\xe0\x11\x1c\xb4(\xb5b\xf9\xb1\xfdy~?ʼnI\x80)N\xaa\xe3\xc3\xc3\xe5\x19G\xdbj\xfbv\x18\xda݆\x19O\x18\x81\xb7\x06\xe1\x1d\xe0H\x85\x81\xe9>\x1a\xa4\xf7T\xa6'g\x83h&\xf8\xbamә\xe01\xa8\x10\xb4\x9c\x82\x124\x90\rs\xfe\x9fȶ\xe5K,\xb7\v\x85\x956\xeb\xd2\xde-/S\xf7ЭT\xe8\r\xac\xb1\x8e\xb2V&\xed__\x1c$`\r\x02XP\xeeAǓ/\xc8AZDh\x88B\xa5\x129\xec\xf5Z\xfa\xc5DGQ\xef\xf4tp\x99v\xa4\xbf\xbf>\xe0qLU\x8f\f\xc8z\x00\xa7\xe7\x1e\xf1\xf0\x05\x10\xff\xb2\x7fy\xe2a\xb8\xf0\xfc59\x87\xb3\xd5\xe5\xc0\xf7\xcf\x06\xfdKd\x94&X\xe1\x15\x96Pjq\xcb_K\xb6\x1bw\xc3]\x02\xbb\xdeNG\xacW\xfaW\xe0~\xffO\x00\x00\x00\xff\xffz\xf967:\x14\x00\x00"; err=<nil>
2023/04/20 18:56:32 Unsolicited response received on idle HTTP channel starting with "r\a\xd9hJ\"\t<\xeb\xed|\xc7\x11)G\xdeS\"\xaf\x94jW\x102\x0e+\x10\x12\xd9(\xd3j\x91\xd2g\"\xb73\x12\x04\x11<c\x0e\x02\xd9H\xf5\xd0\x03\xd4H\xd5\xe6\x00\xceL\x05_\xc5)\x88\t=\x9a\xf5\xf6\xf9\xf6\xf9i\xffI\xbc\xb4[~y\xb4\xec\x0f\x14\x92\xbdn\r\x9c\x81\xe7\\\xfe\x8d\x00\xd65\xfc\xbf\x0e\x9fnĿ\"\x96\xee\xce\xfb߄\xd3s\xfa\xce\xf0\xd7D\xd3\xddy\xaePn\xe6\xeeOX\x1b\xb1\r\x82G\x1c\x83H\xb0\x0f\xc8V\xcd\xef\x04~\xce\xd5t6\x9aP\x15\xd4I*\xd9\\W\xaa\xbcQ\x04\xe5*%Q\xb0\x828\x89\xb0\x04\x1d\xde8\xc1\xbc\xf2\xeb\x91\xc9Zԝɚq\x03]\x11\x1a4ɔ\xf1\xb8I\xff\xb1|zl\xd29g\x92\xadӰ)y\x99=4\xe1o\x13\x93^o\xc1\x7f\x7fY.\xa6\u05cc\xbd\x130\x84\xa9\x90,nQ\xfc\x06\"\x90`2!9;,A\xe8\xcfpM\xf6\x15d\x03\\1\x165\xe0\x94DЄ\x11\xc3\xcd\xf1\xf7\xb4\x95\r\xce\xdb\xe8\xd0k\xa3\xe7\xa36\xfa\xa5\x01\x97\xe0\xa7\x1c\xda<\xa4\x84\x92\x13\xba\xe9\xc0\xa2\xc1\xbf\x91V\x1d\x15nQR\xe1\x16-\x156Լ\x03l\xe4\xd2=MR\xc3E\xf7b\xf2o\xbc\xaf3\x95X\v\x10I\x9d>%\x920j\xa8?\xc7\\@3=\xe7y5\xa9\"&\x8c\xa5\xe7\xa6.\v\b\b\a\xbfAi`\xd4˜]\x1d$\x886A[\x00\x9a\x06-\xf1\x0eV\xac\x99_%W\x85\xf4*\rCsy]\xa6\x95\xd5\xea`\x14\xb4Ț[\xb3\xc0\xf3\x16\xdeؙ\x9a6\xb7f\xbe\x93\x16\xb0\x01\n\x1cK\xb8\xbf1;\xc8\x1b,q\x03v\xa7\xeb\x8ag\xb5\xae\x82\xbe-\x1e\xa6̰\xf8e\xf6\xd0t\xa0*\x12\xca\vw+SQ%Y\xb1w06\xfdo8\x8e\x1a\xd3\x14\x1f\xbfI\x10t\nT\xa5=),jr{\x97\x19\xc8-\xeb\x9e>+\xe2';юO\xfa\xb5\xe4\xd1IaKe\xac\xc9\xcdJX\x136\xf6pMڶ%k\x1d\x9a\xfb\xb0.6\xf7d]\x9av\bOY\xf4wO@\x9d\xde\xf8\nRQ\xd8w\xc8\xef0\r\xa2\xaeY\xbb\xddxO\xfd(\r\xa0KHd\x97D\x00\x97\xd9\x11\xad\xbd\xc7\xc9\u061c\x88KwL:\xe3Q=5\xb6\x88\xcb\xfd\\\xa6j-/\xcb$\xacd\\=\xbd\xaa\xb9TI\x9c\"Kn\xb23\x8f\xfa\x93\xd5ż\xa1\xbf\x0f\xea\xf7q\xb1۽\x0fzZ\xfd\x1b\xfcTB\xe5̔\x93㩫\"Q\xe5x\xa9\x8f}\xceS\xa2\xebʉ\xf3\xf14\xc2b\xab\n\xa1s\xcb9\xab\x93G&\x89\xaex%Zj\xe3+mɸ\xd1#\xd5W\xd7\x1a{Ɯf_\x99\xccyY\x82\x86D\x11U\x11=!\xd5\xcae^枽\x93q\xf4#e\xda*\xf5;\xa5eK&:\x96\xc7rS\x05\xd5\x1ag\xf0\xc2\xee\n/cm\xc0\"\x12\x06ό0`\xa1r\x8d\x96ya\b\x8e)b\xe2,[L\x9a\x1a\xb0M\xb3\x86V\x15wV`C\xcdr[\xd7`m\xd3V$\x0fl39F\xb8\x82[\rm1\xb2i\xe0\x9c\x13*\xd5\xc5\xca\xc0\xa6͋\xdb\xe5\xaa-|\xddL\x9dI\x9e\x12i(\x95\xdd\xfdJ\xab\xdbo\x88\x86\x03\x1e\x18\x0e&IRdm\xd5\v3\x9cd\xbe/.DyNV\xdaՔ\xac\xe3B\xfd\x12_3}\xb3\xa9\x80\"C\xeb\xacH\x83:6\xb5\xa9\xa4g\x1d\x96A\xab\xf3c\xdc\f\x9a\x85\u0380i\x9d\xb5\xa8T8\xb1D\xa6\x86e\xaaV\x98\xa9q\x19\xb2\x92U\xef\xa0%m\xb3\xabiS\xc3\x1eӖ24\xf0\xb3\xf9\xb1\xe8\xe2*\xeb\xae\xc3M&.\xf3\xae\x05\uf393Ԭ`\U00091a3b]iD\xf5\xe6p4\xa388\xe4VTwQfGm\xbf,\x00\aS\xce\xe2\x05\xfcH\xf3'\x10}\xfc\xcfg-\xfb\x99\x1b篾\x94\x14'\xc4\n\xc8\xd5\xea~I)>\xbb\xdf\x16\x0f3\x9c\xa8\xf4\x98\xe1\xc4l\xe7\xc7\xf5g\x1c\xbd\x9b\xaf/y\xb3\xfa`\xa0\xda\xf74\x80}\x8b\xf0\x0ep$\xb7\xbe\xba\xbd\xb7H\x1f\x88П\xa7\x16ќ\xb3\xb0k\xd29g1\xc8-\xa4b\x06\x92\x13_\xb4\xf4\xf9g\"\xba\x86\xaf\xb0x_J,S5N?\xbf\x14\xf5\xc6\xc9o\xfb\x06\xbd\x81\x10\xa7Q\xf6\x14\xa0\x9f\x9f\xdel\xc4!\x04\x0eԯ?!M\xef_\x90\x8dR\x1e\xa11\xdaJ\x99\x88\xb1\xebv<\xf9$i\x14\xb9\xa3˳/\xfaQ鯏\xf7Y\x1c\x13鞏\xfcp4\n.\xbc3\xff\x8b\xef\x0fς\x8b/\xdeл\b\x86\xc3a\x10^\xfakX\x0f֡\x17\x04\xd5U\x9eo\xaf\x1a\xab\xe8I\x9d\x1dI\xfe\xacc\x87:D\x88\x14\x84;\xba\x1c\x9d\xff\x973\x1c\x1d2Bʿ\x01\x96x\x8d\x05\xd4\x1e\xd4\xea\xf3$\xef\x1bgÜ\x00v\xee.\x8d\xa8[\xfb\x1f\xca\xe7\xe7\x7f\x02\x00\x00\xff\xff\x8e\xebLUs\x19\x00\x00"; err=<nil>
2023/04/20 18:56:32 Unsolicited response received on idle HTTP channel starting with "<Z\xff#^\xa9[~y\xb4\xacO\xe4\x93\xf7\xb45\xb0\a\x8e=\x18\xfcD\x04u\x15\xff\x89_\x9bsz\a\xe7W\x85б\xfb\xb6\x1eFE.~M\x10{\a\xa7'\x94wy\xef\r\xb6FH=\xef\t\x87 b\xec\x02\xb2T\xf3\x1b\x81\xb7\xa5\x9a\xceB\xd3H\xc5r\x9aH\xb6\xe4\xe0\x93\xf7\xbcQ\xc4\xe2&!\xd4\xdb@\x18S,!\x8dj\x18c^\xf9\xf7Ĥ\x16l{\xbae\xdc@7$\xf2\xead\xc6xX\xa7\xffZ??\xd5\xe9\x923ɶ\x89_\x97\xbc,\x1e\xeb\xf0\x8f\xa9Io\x03p\xf7/\xeb\xd5얱=\x01C\x98\b\xc9\xc2\x06\xc5\uf002\x04\x93\t\xc9\xd9\xc7\x1aD\xba\xb9i\xb2/ k\xe0\x861Z\x833B\xa1\x0e)\xc3\xf5\xf1\xf3\xa8\x91\r.\x9b\xe8\xd0i\xa2\x97\x17M\xf4\xba\x06\xd7\xe0&\x1c\x9a<\xa4\x84\x92\x93hׂE\x8d\x7f%\x8d:*ܠ\xa4\xc2\rZ*l\xa8\xf9\x00\xd8ȥy\x14'\x86\x8b\xe6b\xfa7~יJ\xac\x15\x88X\xa7ϱ\xda\xe4\r\xf5\x97\x98\v\xa8\xa7\xe72\xaf(UĄ\xf1饩\xcb\n\xb2\xbdߤ\x91g\x94ɜ\xdd|H\x10M\x82\xa6\x00\xd4\rZ\xe3\x03lX=\xbfJ\xae\xea\xe7M\xe2\xfb\xe6\xe7\xd3ꬬ\xc6R\x1dK\xea\xb2\xfa\xd2,\xf0\xb2\x81\xd7VfJ\xebK3_I+\xd8A\x04\x1cK\x98ߙ\x1d\xe4\x1d\x96\xb8\x06\xdb\xd3uóZWA_W\x8f3fX\xfc\xb2x\xac;P\x15\t兇\x8d\xa9\xa8\x92l\xd8\x1e\x8cE\xff\a\x0eim\x9abϛz^\xab@Uڳ¢&7wY\x80\fX\xfb\xf4Y\x11?\xdb)j\xd9\xc9o%\xa7g\x85\r\x95Q\x93\x9b\x95P\x13\xd6ְ&mZ\x92Z\x87\xfa:\xd4\xc5\xe6\x9aԥI\x8b\xf0\x9cE?{\xf0i\xf5\xc6\x17\x90\x8a\xc2{\x8b\xfc\x01G\x1em\x9b\xb5ݍ\xf3ȥ\x89\amB\"\xdb$\x02\xb8\xccNf\xcd=\xce\xc6\xe6L\\\xdac\xd2\x1a\x8f\xeaa\xb1A\\\xae\xe72U\xb5\xbc,\x93\xb0\x92qzzUs\xa9\x928E\x96\xdceg\x1e\xf5\x93\xd5ż\x91\xee\x0f\xea\xff\xe9c\xf7\xef.\xa4Ӧ\xff\xc1M$T\xceL99\x9d\xba*\x12U\x8e\xd7\xe9\xb1\xcf~\x8eӺr\xe6X<\xa3X\x04\xaa\x10\xda\xf7\x9c3\x9d<1IҊW\xa2uj|\xa5-\x197z$\xae\vBh\xec;\xe6Q\xb6\xcbd\xce\xcb\x12\xd4'\x8a\xa8\x8a\xe8\b\xa9\xbe\\\xe6e\xee\xd9\a\x19\xd2\x1f\tK\xadR\xff\x93\xa8l\xc98\x8d\xe5\xa9\xdcTA\xb5\xc6\x19\xbc\xb0\xbb\xc2\xcbX\x1b\xb0\x88\x84\xc13#\fX\xa8\xac\xd12/\f\xc1)EL\x9ce\x8bI\x13\x036iVӪ\xe2\xce\n\xac\xa9Y.k\rj\x8b\xb6\"yd\xbb\xe9)\xc2\x15\xdchh\x83\x91u\x03\x97\x9cDR]\xae\flڼ\xba_o\x9a\xc2\xd7\xceԙ\xe49\x96\x86Rٕ\xaf\xb4\xba\xf9bh8\xe0\x91ao\x1a\xc7E\xd6V\xbd\xb0\xc0q\xe6\xfb\xe2B\x94\xe7d\xa5]MI\x1d\x17\xea\x97\xf8\x96\xa57\x9b\n(2TgE\x1a\xe8\xd8Ԧ\x92\x9e:,\x83\xa6\xf3S\xdc\f\x9a\x85\u0380\x89\xce\x1aT*\x9cX\"S\xc32U+\xccԸ\fYɪwВ6\xd9U\xb7\xa9f\x8fiK\x19\x1ax\xabo\x16m\\eݭ\xbf\xcb\xc4e\xde5\xe0\xc3i\x12\xcd\n&\x9f\x88\xbaەFTo\x0e'3\x8a\x83CnEu\x15evh\xebe\x05؛q\x16\xae\xe0G\x92\xbf|\xa4\xc7\xff|ֲ\x9f\xb9p\xfe\xdf\a\x92\xe2\x84X\x01\xb9Z\xda\x03J\xb1\xd3~]=.p\xac2b\x81c\xb3\x9d\x9fпc\xba7\x1f]\xf2f\xf5\x8d@\xb5\xe7\x91\a\xef\r\xc2\a\xc0T\x06\xae\xba\xb07H\x1f\x89Hw\xa4\x06ђ3\xbfm\xd2%g!\xc8\x00\x12\xb1\x00ɉ+\x1a\xfa\xfc;\x16m\xc37X\xec\xd7\x12\xcbD\x8dK_\\\x8a\x12c\xe7\x17|\x83ށ\x8f\x13\x9a\xdd\xfe\xd3W\xa7W\vq\xf0\x81C\xe4\xea/G\xb3\xf9\v\xb2P\xc2)\x9a\xa0@\xcaXLz\xbd\x96W\x9e8\xa1\xb47\xea;\xa3\xf4\x1d\xe9'\xc6\xf7\\\x16\x86D\x8a\x1e\xe0\x11\x86ѵw\xd1\x1f]\x8f=\xe7b\xec\xfa\xa3\xab+\xdc\x1f\r\xe1b\xdc\x1f\xf5\xc7\x1e8[\x7ft\x85\x94\xfe\x1e\x96x\x8b\x05hoT\xfa\x87\xe3\xfd\xce\xde1ۃC\xef\x90Ш\xa7=\xf6\x1f\x8f\xff\r\x00\x00\xff\xff\xe6\xf3\xee>\x1c\x18\x00\x00"; err=<nil>
2023/04/20 18:56:32 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
2023/04/20 18:56:32 Unsolicited response received on idle HTTP channel starting with "&\xd4Ǽ=\x87y\xa5R\x1e\xcen'\x1fR\xc0\xa0\xa8%\xe3i\xc1f\xa1h\f=\f\x84~r\x94ǻh[\x92!^Χ\x171\xa2\xfc\x82\x1d\x89\xe6EDY\xa2\x11>(\xcd[\x91\t\x92\xd6\xef}\xa0!ާ\x15\x87L84]:\xa8\x17\x11\xf6c\x04\xdf\u07fc\xfdxs\x17\xc1\xbb\xb8\x9b\xa9\xc4&8\xab&\x99ns)\x0eًh\xf9k\xfa*\xf3\xf2\"/翝\xc1ʼ\xdc\xe4?`7\xf9J\x1c\x9e\x0eO'Z>\xfb\x91$\xb7,\xa3b\x1eF\xeb\x8e]㍈F\xa0\x93=\xef\xa8\xf8ƣȄ\xdf\x0f[\xabӿ\x809\x9f\x94i,\x8c\x9a\x83x:<\x1d\"\xbb\xa3\x14\xab<\x9f\xed\xf6͟\"\x13\x93Ӣ\x11}\b\xa3o\x8a\xa2\xb3\xb9\xa2]!u\xb1\xaa\xaf6\x9bY\xf1\x7f\xe3;k;M\xdeNNR.\xedPt\xb6\xf8\xb9\xd8V\xf5\xc5\xe5fuUo\xd7k\xbcZ\xd5\xf5\x15U[\xaa\xe9\xe2\xf2\xaa\"T\xebK\xc2+,\x97\xedi\x83?n~\xfd\xb1\x81\xb3\xd3\xe8\x8fMf\xfa\xa2\xb3\x1aM\xb7@c\xecd$\x15\xb2X\xb6o\xab\xb2\xafW\xe8\xe4)\xe1\xdd͇\xf7w\x0f\xff6${?QQ_./\xd7\"\xba$\x1d)>\xba}ܕk\xab\xd9\xc0/\xce\xd8\x102\xb8\xe7@\xbf۸\x82F\xc1;\x8b=ܣ\t^\xf6\xbc\xb8\xb6\xd6\xd0>\x83\xfbdC\xe7p\xec\xe1\xda*\x827&\x90\xd6\xdcE\xf7\xe1\x81pH\xad\x14\x06ܢ\xa7\xb3\xb4\xcfE\x8e_\xba\xfc(t7iS\x9c\xfd\x82\x1c\x0e\x7f\a\x00\x00\xff\xff\x86\xec*jq\x06\x00\x00"; err=<nil>
2023/04/20 18:56:32 Unsolicited response received on idle HTTP channel starting with "\xf6\xb3&\x0e\x15:4\xe2\xa9\xc8o\xdf\xff\x021Ln\x80\x06f!|\x93$\x9d]J\xdc&bHhJ\xb3\xea\xa0\xf2\x7f\xc3;k\xbb\x01\xbd\x9d\x9c\xc0\xa5\xb0\x9b\xa4\xb3\xc9\x0f\t+HV\xabBմ\xa4\x92Қ\xa8\xb4m\x91\xe4(R\x92UY.\x14\x16i]\xab\xffQ\xe0\xa1\x1fZ\x96\xec9\xf0\x8a\x92g\xc0YU\xe4/\x9e\x96\xd2RJ\xd1V\xa9,U\xc6d\xc1y\xc9XFYF\xb8\xaak\x89\xb2\xa2\x94VX\xbf\xb8@J\x88\xac9\xa3y\x95b)\x14\xa1Y\xcd˲⤠\x14\xcbB\xa9R\x14EEԋ\v\b&\xdb\\eB\x88\x82\xb6\xbc\x94\xaa.x\x99\x95Ȋ\x8a\xb3\xb2l+\xc2D\xdbV\xe5\xe3\x02\x97\xabO\x1f/\xd7\xdf\x13U{?aB\x19a\xcfO\xa2u\xfaĻ\xeb\xd5\xeb\x7fg8;\x8d\xfe4\xceq\x90\xa4\xb3\x037݂\x1bc'#0\x11\x89\xbez\xbf\xbbΆ\x8b\xac\xff5\xd9$\xafΦ\x9f/\xb33}v\xf7\xea\x03\xcc\x1f\x86p(\xf5i-\x9c\xf6\xd4\a\x94\xd1\x19\x9a\x01\xf9a\xf1]\xfe\xf5g\xa7}t\x8e\xce\xee\x0e)\x92\a\xder\x8fO\xd6\xcb\xd3\xd6\xc6\xdbny\x1ah;\r&y\xf2\xd3\xd9\xef\xff\x0e\x00\x00\xff\xffUӺ\xaf\xa4\x06\x00\x00"; err=<nil>
2023/04/20 18:56:32 Unsolicited response received on idle HTTP channel starting with "\x1a\x85\xba\x8dQk3jA\xa9H\xf7\xed\xbb\x8f\xa7\x9f\xb7\x7f|{\xfa\xf0\xba\xe0~\xfb\xfbn\xff\xfc\x7fMJ\xe7FJ\xcbe^\xe6\x10R\x12\x96jyO\xf9\xbe#\xbe#\xb6{z\x8aߏ\x97\v\x1b\xac\xf9F³\xc6XVK7ow\xd8a\xdfI\xc7\xe6b\xe1s|\xd1۾G=\x92b\xbb\x9aN4\xe3\x96\xc2\x00\x03,\xfd\x17=\xab\xd5\xe8\xf1\x88\x8e\x1e\x06\xfd\xe8s8\xb5\xc9\xdd\xebyT:}\xf8\xff\xd3\xf4o\x00\x00\x00\xff\xff;\xc7\xd2\xd5/\x04\x00\x00"; err=<nil>
2023/04/20 18:56:32 Unsolicited response received on idle HTTP channel starting with "Q\x96\xabrW\xe7Ūi\xe4\xa6\xdc\x15b\x97ӺY\xcb\xdd\x1d\vڊLd\xf5{\x81\xfb\xfd\xa7\xc3\xfd\xf1\xbf<)\xefGNW\x9bm\x96\xbf'\xfd\xbe\xff\xf1{\x86\xb3\xe3\xe0\xaf\xce\xde<\xa5\xad\xd5dژ\x8c\xb1\xa3\x11\x9c\x8aT>\xef\xe4\xe6\xe3\xc1\xf3/O8\xa7$\x1cKu\r\xfcz[\x0e\x0f\x0f\xf1\x87\xf1\xf5\x15>9\xfb\x17\x8b\xb0\xfcX\xfb\xbe'3\xb2\x86\x83\xe4G^\xa8\x92\x02\xd5\xe4\xf9\xa6\xc0[O\xc3c\x9b\\Or\x1e\xb5Ioފi\xfa;\x00\x00\xff\xff4)\x19\x82[\x04\x00\x00"; err=<nil>
2023/04/20 18:56:32 Unsolicited response received on idle HTTP channel starting with "\xb6\x88\xdb\xe6\x15o\xb7\x9cc\xddrj\x9aM\xd5W5Vu{|ŷ\xfd\x96\x9a\xba\xe1\xf7\x06O\xbb_?>\xed\xff\x8bI\x87\x90\xa8\xa8ʺn\xee\x0f\xfd\xbe{\xfd\xf2\x84wi\n7\xb2g\xa6B\xb9\x11\xadZ\xa1\xb5.YA\x85(~\x99^\xbf\xdb\xef\xcd\xcf\x7fO\x1f`NIx\x92\xfa\x96\xf3mQ\xde\x1bO\xec\t\xe5R\x97\x18\xb1\xc7@\x0f\xc3y4\x9e\xbe\xa9\xfc\x86{J\xa3-\x1e\x1e\x82\xeb\xf5\x9f\x00\x00\x00\xff\xffa\x99\xe7-8\x04\x00\x00"; err=<nil>
2023/04/20 18:56:32 Unsolicited response received on idle HTTP channel starting with "L\xb0\x82RaƬ3\xd9wY\xbea\x94S%h#۲|\x94\x82m\xb6%[\x97\x0f\\n\xb7E\xbb-e\xd32\xf6\xc8n\r\x9ew?\xbf\x7f\xde\xff\x17\x93r.P\xb6fU\xf5x[\xf4\xeb\xee\xe9\xdb\nk\xc2\xe4\xaed\x17\xa6\xac3\x03\xd7݊km\x82\x16\x94\x89\xec\xa7\xe9\xe9\xed~?\xfe\xf8\xd7\xf4\x0ecJ\u0092T\xd7Y\\\x97\xe9Mo\x95\x83'k\xbeh\x88\xab\xbe\xa7q\n\x0ev\xafK\x81\xe4\x9e7\xdc\xd1\xddD\xefI\xa6\x97.\xbd\xf2\x1fà\xb3\xbb'd\x9e\xff\x0e\x00\x00\xff\xffPx(mr\x04\x00\x00"; err=<nil>
2023/04/20 18:56:32 Unsolicited response received on idle HTTP channel starting with "b\xd5\x0f\xc6.\xac\x03\xfa\x16\n8\v\xd9T:5|k\xf1\x1b\xd9\xfa\x7f\xfc&Q\x12%\xf3\x9bJ\xb8X\t\x91\xe5\xab<ܔ\x19\x17\xbc$Q\xe7\x9b\xffj\xef\xfb\xafbv\xfc\x18\x80\xa5\x9a,iy\xa9\xfd\xe7_~\x87\x00F\xdbA\x01S\xba\\\x11Ǎ\x89*\xdaŲ\x8b\x05\xcf\xf3\xcdI\xfd\xf7\xf1\x8d1MGΌVR$M\x1f7&\xfe!.y*\x89\xaf\xe4\ns\xc4\xec\xaa\\\x97Ɋc%ʜ\xa8\x12\x95H\x89ge\xb6^\xfd\v\x823A\xeb\xf59\xfe\xfe\xfa\xee\xf6~\xfbO%ʹ\x91\xe24ߤ\x17E\x1f\xaf\x7f|[a\xcd8\xb8\xc5\xc9\xc9C|\x9al\x88Z\x9bQK\x8ae|\xe3\x9eW\xfd\xcd\x1fr\xb5N`\x9a\xaa\xb4T\xa9\xe5:\x96 \xddY\xf3Dҳ\x8f{\xd9\xd2`\x8d\xa9gd\x85\x1eKttq\x9b\x97\x12\x86\xafM\xb4\bߍ\x9d\x8e/>\xed\xc7\xe3_\x01\x00\x00\xff\xffI:!\xca\n\x06\x00\x00"; err=<nil>
--- FAIL: TestByModuleLegacy (0.00s)
    --- FAIL: TestByModuleLegacy/http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/BeeGo/beego"): Index(): Get "http://127.0.0.1:44417/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"
    --- FAIL: TestByModuleLegacy/lower-http (0.00s)
        legacy_test.go:66: httpSource.ByModule("github.com/tidwall/gjson"): Index(): Get "http://127.0.0.1:44417/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "\"ecosystem\":"
2023-04-20 16:41 illumos-amd64 vuln@4183d94f go@bdccb85f x/vuln/internal/client.TestMustUseIndex (log)
--- FAIL: TestMustUseIndex (0.00s)
    legacy_test.go:124: Index(): Get "http://127.0.0.1:62743/index.json": net/http: HTTP/1.x transport connection broken: malformed HTTP status code "{"

watchflakes

@bcmills
Copy link
Contributor

bcmills commented Aug 18, 2023

Closing as obsolete.

@bcmills bcmills closed this as not planned Won't fix, can't repro, duplicate, stale Aug 18, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Builders x/build issues (builders, bots, dashboards) NeedsInvestigation Someone must examine and confirm this is a valid issue and not a duplicate of an existing one. OS-illumos
Projects
Status: Done
Development

No branches or pull requests

2 participants