We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
检测到 ShuyunFF2E/ccms-sdk 一共引入了529个开源组件,存在45个漏洞
漏洞标题:Growl命令执行漏洞 缺陷组件:growl@1.9.2 漏洞编号:CVE-2017-16042 漏洞描述:Growl是一套支持Node.js的通知系统。 Growl 1.10.2之前版本中存在安全漏洞,该漏洞源于在将输入传递到shell命令之前,程序未能正确的对其进行过滤。攻击者可利用该漏洞执行任意命令。 国家漏洞库信息:https://www.cnvd.org.cn/flaw/show/CNVD-2018-24664 影响范围:(∞, 1.10.0) 最小修复版本:1.10.0 缺陷组件引入路径:ccms-sdk@4.2.0->mocha@2.5.3->growl@1.9.2
另外还有45个漏洞,详细报告:https://mofeisec.com/jr?p=aa4a83
The text was updated successfully, but these errors were encountered:
No branches or pull requests
检测到 ShuyunFF2E/ccms-sdk 一共引入了529个开源组件,存在45个漏洞
另外还有45个漏洞,详细报告:https://mofeisec.com/jr?p=aa4a83
The text was updated successfully, but these errors were encountered: