We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
A few hours ago, a 0-day exploit in the popular Java logging library log4j2 was discovered that results in Remote Code Execution (RCE) by logging a certain string. Version 2.14.1, the version used by the most up to date version of clj-http, is a vulnerable version. Updating the version of log4j2 would close this vulnerability.
The text was updated successfully, but these errors were encountered:
Isn't it only in dev? (At least if I understand project.clj correctly.)
Sorry, something went wrong.
You are correct! My mistake. Thanks for looking into it.
No branches or pull requests
A few hours ago, a 0-day exploit in the popular Java logging library log4j2 was discovered that results in Remote Code Execution (RCE) by logging a certain string. Version 2.14.1, the version used by the most up to date version of clj-http, is a vulnerable version. Updating the version of log4j2 would close this vulnerability.
The text was updated successfully, but these errors were encountered: