We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
检测到 electricbubble/gidevice 一共引入了9个开源组件,存在2个漏洞
漏洞标题:go-yaml < 2.2.8拒绝服务漏洞 缺陷组件:gopkg.in/[email protected] 漏洞编号:CVE-2019-11254 漏洞描述:gopkg.in/yaml.v2是go语言中用于处理yaml格式的包。 在2.2.8之前的版本中,处理恶意的yaml数据时,会导致CPU资源耗尽。 漏洞由Kubernetes开发者在fuzz测试中发现并提交修复补丁。 国家漏洞库信息:https://www.cnvd.org.cn/flaw/show/CNVD-2020-35519 影响范围:(∞, 2.2.8) 最小修复版本:2.2.8 缺陷组件引入路径:github.com/electricbubble/gidevice@->gopkg.in/[email protected]
另外还有2个漏洞,详细报告:https://mofeisec.com/jr?p=a68dca
The text was updated successfully, but these errors were encountered:
这个库是由 plist 导入, 该漏洞问题,理论上不影响这个项目的运作,因为 gidevice 本质上是一个客户端库
Sorry, something went wrong.
No branches or pull requests
检测到 electricbubble/gidevice 一共引入了9个开源组件,存在2个漏洞
另外还有2个漏洞,详细报告:https://mofeisec.com/jr?p=a68dca
The text was updated successfully, but these errors were encountered: