We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
检测到 fjc0k/YApi-X 一共引入了1262个开源组件,存在63个漏洞
漏洞标题:serialize-javascript 代码问题漏洞 缺陷组件:serialize-javascript@1.9.1 漏洞编号:CVE-2020-7660 漏洞描述:Verizon serialize-javascript是美国威瑞森电信(Verizon)公司的一款支持将JavaScript序列化为 JSON超集的软件包。 serialize-javascript 3.1.0之前版本中存在代码问题漏洞。远程攻击者可借助index.js文件中的‘deleteFunctions’函数利用该漏洞注入任意代码。 国家漏洞库信息:https://www.cnvd.org.cn/flaw/show/CNVD-2020-53801 影响范围:(∞, 3.1.0) 最小修复版本:3.1.0 缺陷组件引入路径:yapi-x@2.7.0->copy-webpack-plugin@4.6.0->serialize-javascript@1.9.1 yapi-x@2.7.0->compression-webpack-plugin@1.1.12->serialize-javascript@1.9.1
另外还有63个漏洞,详细报告:https://mofeisec.com/jr?p=i2cfd0
The text was updated successfully, but these errors were encountered:
No branches or pull requests
检测到 fjc0k/YApi-X 一共引入了1262个开源组件,存在63个漏洞
另外还有63个漏洞,详细报告:https://mofeisec.com/jr?p=i2cfd0
The text was updated successfully, but these errors were encountered: