We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
检测到 Mahongsheng/e-commerce 一共引入了174个开源组件,存在26个漏洞
漏洞标题:netty 安全漏洞 缺陷组件:io.netty:netty-codec@4.1.50.Final 漏洞编号:CVE-2021-37137 漏洞描述:Netty是Netty社区的一款非阻塞I/O客户端-服务器框架,它主要用于开发Java网络应用程序,如协议服务器和客户端等。 netty存在安全漏洞,该漏洞源于Snappy frame decoder函数不限制块长度,这可能会导致过度内存使用。 影响范围:(∞, 4.1.68.Final) 最小修复版本:4.1.68.Final 缺陷组件引入路径:com.ecommerce:e-commerce-redis@1.0-SNAPSHOT->org.springframework.boot:spring-boot-starter-data-redis@2.3.1.RELEASE->io.lettuce:lettuce-core@5.3.1.RELEASE->io.netty:netty-handler@4.1.50.Final->io.netty:netty-codec@4.1.50.Final
另外还有26个漏洞,详细报告:https://mofeisec.com/jr?p=i4a6c9
The text was updated successfully, but these errors were encountered:
No branches or pull requests
检测到 Mahongsheng/e-commerce 一共引入了174个开源组件,存在26个漏洞
另外还有26个漏洞,详细报告:https://mofeisec.com/jr?p=i4a6c9
The text was updated successfully, but these errors were encountered: