We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
检测到 DrDREAM233/auto-get-fu-card 一共引入了51个开源组件,存在8个漏洞
漏洞标题:Apache Tomcat 信息泄露漏洞 缺陷组件:org.apache.tomcat.embed:[email protected] 漏洞编号:CVE-2021-25122 漏洞描述:Apache Tomcat是美国阿帕奇(Apache)基金会的一款轻量级Web应用服务器。该程序实现了对Servlet和JavaServer Page(JSP)的支持。 Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 存在信息泄露漏洞,该漏洞源于可以在一个请求到另一个请求中复制请求头和数量有限的请求体,这意味着用户a和用户B都可以看到用户a的请求结果。 影响范围:[9.0.0.M1, 9.0.43) 最小修复版本:9.0.43 缺陷组件引入路径:com.dream:[email protected]>org.springframework.boot:[email protected]>org.springframework.boot:[email protected]>org.apache.tomcat.embed:[email protected]
另外还有8个漏洞,详细报告:https://mofeisec.com/jr?p=ae8a8b
The text was updated successfully, but these errors were encountered:
谢谢你啦
Sorry, something went wrong.
No branches or pull requests
检测到 DrDREAM233/auto-get-fu-card 一共引入了51个开源组件,存在8个漏洞
另外还有8个漏洞,详细报告:https://mofeisec.com/jr?p=ae8a8b
The text was updated successfully, but these errors were encountered: