We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent 1ee1edf commit 7bab06cCopy full SHA for 7bab06c
jetty/CVE-2021-34429/README.md
@@ -14,7 +14,7 @@ There are 3 types of payload that exfiltrate the content of `WEB-INF/web.xml`:
14
15
The vulnerability affects the Jetty 9.4.37-9.4.42, 10.0.1-10.0.5, 11.0.1-11.0.5.
16
17
-References:
+References:
18
19
- https://github.com/eclipse/jetty.project/security/advisories/GHSA-vjv5-gp2w-65vm
20
- https://xz.aliyun.com/t/10039
@@ -27,7 +27,7 @@ Execute the following command to start a Jetty 9.4.40 server.
27
docker-compose up -d
28
```
29
30
-After the server starts, visit ``http://your-ip:8080`` to see an example page.
+After the server starts, visit ``http://your-ip:8080`` to see an example page.
31
32
## Exploit
33
0 commit comments