We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
检测到 wolf-J/wolf-git-workspace 一共引入了10个开源组件,存在1个漏洞
漏洞标题:Apache Standard Taglibs 代码注入漏洞 缺陷组件:taglibs:[email protected] 漏洞编号:CVE-2015-0254 漏洞描述:Apache Standard Taglibs是美国阿帕奇(Apache)软件基金会的一个JSP标准标签库(JSTL)规范的实现。 Apache Standard Taglibs 1.2.3之前版本中存在安全漏洞。远程攻击者可借助JSTL XML标签中特制的XSLT扩展利用该漏洞执行任意代码,或实施外部XML实体(XXE)攻击。 国家漏洞库信息:https://www.cnvd.org.cn/flaw/show/CNVD-2015-01459 影响范围:(∞, 1.2.3) 最小修复版本:1.2.3 缺陷组件引入路径:wolf-j.com.github:[email protected]>taglibs:[email protected]
另外还有几个漏洞,详细报告:https://mofeisec.com/jr?p=i04e81
The text was updated successfully, but these errors were encountered:
No branches or pull requests
检测到 wolf-J/wolf-git-workspace 一共引入了10个开源组件,存在1个漏洞
另外还有几个漏洞,详细报告:https://mofeisec.com/jr?p=i04e81
The text was updated successfully, but these errors were encountered: