We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
检测到 canghailan/commons-vfs2-kit 一共引入了40个开源组件,存在12个漏洞
漏洞标题:Legion of the Bouncy Castle Java Cryptography APIs 代码问题漏洞 缺陷组件:org.bouncycastle:[email protected] 漏洞编号:CVE-2018-1000613 漏洞描述:Legion of the Bouncy Castle Java Cryptography APIs是一款轻量级加密API。 Legion of the Bouncy Castle Java Cryptography APIs 1.60之前版本中的XMSS/XMSS^MT私钥反序列化存在安全漏洞。攻击者可借助特制的私钥利用该漏洞执行代码。 影响范围:[1.57, 1.60) 最小修复版本:1.60 缺陷组件引入路径:cc.whohow:[email protected]>com.qcloud:[email protected]>org.bouncycastle:[email protected]
另外还有12个漏洞,详细报告:https://mofeisec.com/jr?p=a83880
The text was updated successfully, but these errors were encountered:
No branches or pull requests
检测到 canghailan/commons-vfs2-kit 一共引入了40个开源组件,存在12个漏洞
另外还有12个漏洞,详细报告:https://mofeisec.com/jr?p=a83880
The text was updated successfully, but these errors were encountered: