2020-12-24 10:09:38 +01:00
|
|
|
|
[
|
|
|
|
|
{
|
|
|
|
|
"id": 319884337,
|
|
|
|
|
"name": "CVE-2020-17531",
|
|
|
|
|
"full_name": "154802388\/CVE-2020-17531",
|
|
|
|
|
"owner": {
|
|
|
|
|
"login": "154802388",
|
|
|
|
|
"id": 44390729,
|
2021-01-21 16:10:20 +01:00
|
|
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44390729?v=4",
|
2020-12-24 10:09:38 +01:00
|
|
|
|
"html_url": "https:\/\/github.com\/154802388"
|
|
|
|
|
},
|
|
|
|
|
"html_url": "https:\/\/github.com\/154802388\/CVE-2020-17531",
|
|
|
|
|
"description": "Apache Struts2框架是一个用于开发Java EE网络应用程序的Web框架。Apache Struts于2020年12月08日披露 S2-061 Struts 远程代码执行漏洞(CVE-2020-17530),在使用某些tag等情况下可能存在OGNL表达式注入漏洞,从而造成远程代码执行,风险极大。提醒我校Apache Struts用户尽快采取安全措施阻止漏洞攻击。",
|
|
|
|
|
"fork": false,
|
|
|
|
|
"created_at": "2020-12-09T08:01:10Z",
|
|
|
|
|
"updated_at": "2020-12-24T03:29:48Z",
|
|
|
|
|
"pushed_at": "2020-12-09T03:10:21Z",
|
|
|
|
|
"stargazers_count": 0,
|
|
|
|
|
"watchers_count": 0,
|
|
|
|
|
"forks_count": 0,
|
|
|
|
|
"forks": 0,
|
|
|
|
|
"watchers": 0,
|
|
|
|
|
"score": 0
|
|
|
|
|
}
|
|
|
|
|
]
|