We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
检测到 SelimHorri/ecommerce-microservice-backend-app 一共引入了15个开源组件,存在53个漏洞
漏洞标题:FasterXML jackson-databind 代码问题漏洞 缺陷组件:com.fasterxml.jackson.core:jackson-databind@2.9.6 漏洞编号:CVE-2019-14892 漏洞描述:FasterXML jackson-databind是一个基于JAVA可以将XML和JSON等数据格式与JAVA对象进行转换的库。Jackson可以轻松的将Java对象转换成json对象和xml文档,同样也可以将json、xml转换成Java对象。 FasterXML jackson-databind 2.6.7及之后版本(2.6.7.3版本已修复)、2.8.0及之后版本(2.8.11.5版本已修复)和2.9.0版本及之后版本(2.9.10版本已修复)中存在代码问题漏洞。攻击者可利用该漏洞执行任意代码。 影响范围:[2.9.0, 2.9.10.3) 最小修复版本:2.9.10.3 缺陷组件引入路径:com.selimhorri:proxy-client@0.1.0->io.jsonwebtoken:jjwt@0.9.1->com.fasterxml.jackson.core:jackson-databind@2.9.6
另外还有53个漏洞,详细报告:https://mofeisec.com/jr?p=i4f2ba
The text was updated successfully, but these errors were encountered:
No branches or pull requests
检测到 SelimHorri/ecommerce-microservice-backend-app 一共引入了15个开源组件,存在53个漏洞
另外还有53个漏洞,详细报告:https://mofeisec.com/jr?p=i4f2ba
The text was updated successfully, but these errors were encountered: