We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
检测到 AndriyKalashnykov/spring-microservices-k8s 一共引入了528个开源组件,存在54个漏洞
漏洞标题:Apache Tomcat 信息泄露漏洞 缺陷组件:org.apache.tomcat.embed:[email protected] 漏洞编号:CVE-2021-25122 漏洞描述:Apache Tomcat是美国阿帕奇(Apache)基金会的一款轻量级Web应用服务器。该程序实现了对Servlet和JavaServer Page(JSP)的支持。 Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 存在信息泄露漏洞,该漏洞源于可以在一个请求到另一个请求中复制请求头和数量有限的请求体,这意味着用户a和用户B都可以看到用户a的请求结果。 影响范围:[9.0.0.M1, 9.0.43) 最小修复版本:9.0.43 缺陷组件引入路径:vmware.services:[email protected]>org.springframework.boot:[email protected]>org.springframework.boot:[email protected]>org.apache.tomcat.embed:[email protected]
另外还有54个漏洞,详细报告:https://mofeisec.com/jr?p=i4e660
The text was updated successfully, but these errors were encountered:
@ghost Sorry, could you please translate it to English?
Sorry, something went wrong.
No branches or pull requests
检测到 AndriyKalashnykov/spring-microservices-k8s 一共引入了528个开源组件,存在54个漏洞
另外还有54个漏洞,详细报告:https://mofeisec.com/jr?p=i4e660
The text was updated successfully, but these errors were encountered: