diff options
| author | Chris Lu <chris.lu@gmail.com> | 2021-09-30 21:23:05 -0700 |
|---|---|---|
| committer | Chris Lu <chris.lu@gmail.com> | 2021-09-30 21:23:05 -0700 |
| commit | 41efc6e629e9ef9733f56f0ade848dc6d7c11c3a (patch) | |
| tree | 8345edba34439fb7679c751d308f7b2956316f10 /weed/shell/command_ec_decode.go | |
| parent | 7b776be285de6c3980af9c1368a0534e5e62d7df (diff) | |
| download | seaweedfs-41efc6e629e9ef9733f56f0ade848dc6d7c11c3a.tar.xz seaweedfs-41efc6e629e9ef9733f56f0ade848dc6d7c11c3a.zip | |
Update go.mod
CVE-2020-28483
high severity
Vulnerable versions: < 1.7.0
Patched version: 1.7.0
This affects all versions of package github.com/gin-gonic/gin under 1.7.0. When gin is exposed directly to the internet, a client's IP can be spoofed by setting the X-Forwarded-For header.
Diffstat (limited to 'weed/shell/command_ec_decode.go')
0 files changed, 0 insertions, 0 deletions
