aboutsummaryrefslogtreecommitdiff
path: root/weed/shell/command_ec_decode.go
diff options
context:
space:
mode:
authorChris Lu <chris.lu@gmail.com>2021-09-30 21:23:05 -0700
committerChris Lu <chris.lu@gmail.com>2021-09-30 21:23:05 -0700
commit41efc6e629e9ef9733f56f0ade848dc6d7c11c3a (patch)
tree8345edba34439fb7679c751d308f7b2956316f10 /weed/shell/command_ec_decode.go
parent7b776be285de6c3980af9c1368a0534e5e62d7df (diff)
downloadseaweedfs-41efc6e629e9ef9733f56f0ade848dc6d7c11c3a.tar.xz
seaweedfs-41efc6e629e9ef9733f56f0ade848dc6d7c11c3a.zip
Update go.mod
CVE-2020-28483 high severity Vulnerable versions: < 1.7.0 Patched version: 1.7.0 This affects all versions of package github.com/gin-gonic/gin under 1.7.0. When gin is exposed directly to the internet, a client's IP can be spoofed by setting the X-Forwarded-For header.
Diffstat (limited to 'weed/shell/command_ec_decode.go')
0 files changed, 0 insertions, 0 deletions