Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5. You can mitigate this vulnerability for older versions of Commons Email by stripping line-breaks from data, that will be passed to Email.setBounceAddress(String).
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Apache Commons-Email 输入验证错误漏洞
Vulnerability Description
Apache Commons-Email是美国阿帕奇(Apache)软件基金会的一个提供电子邮件发送功能的应用程序编程接口。 Apache Commons-Email 1.0版本至1.4版本中存在信息泄露漏洞,该漏洞源于程序没有正确的验证输入。远程攻击者可借助特制的数据利用该漏洞获取敏感信息。
CVSS Information
N/A
Vulnerability Type
N/A