<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Spring漏洞 &#8211; moneyslow.com</title>
	<atom:link href="https://moneyslow.com/tag/spring%E6%BC%8F%E6%B4%9E/feed" rel="self" type="application/rss+xml" />
	<link>https://moneyslow.com</link>
	<description>making money with technology</description>
	<lastBuildDate>Fri, 01 Apr 2022 06:15:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.5</generator>
	<item>
		<title>Spring Framework远程代码执行漏洞（CVE-2022-22965）排查和临时修复参考方案</title>
		<link>https://moneyslow.com/spring-framework%e8%bf%9c%e7%a8%8b%e4%bb%a3%e7%a0%81%e6%89%a7%e8%a1%8c%e6%bc%8f%e6%b4%9e%ef%bc%88cve-2022-22965%ef%bc%89%e6%8e%92%e6%9f%a5%e5%92%8c%e4%b8%b4%e6%97%b6%e4%bf%ae%e5%a4%8d%e5%8f%82.html</link>
		
		<dc:creator><![CDATA[moneyslow]]></dc:creator>
		<pubDate>Fri, 01 Apr 2022 06:15:27 +0000</pubDate>
				<category><![CDATA[newest]]></category>
		<category><![CDATA[Spring漏洞]]></category>
		<guid isPermaLink="false">https://moneyslow.com/?p=14960</guid>

					<description><![CDATA[业务系统运营者可按照以下三个步骤来判断是否受此漏洞影响。
（一）JDK版本号排查
在运行业务系统的服务器上，Windows操作系统可在运行中执行cmd打开命令行窗口，Linux操作系统可打开控制台窗口。
执行“java-version”命令查看运行的JDK版本。如果版本号小于等于8，则不受漏洞影响。]]></description>
		
		
		
			</item>
	</channel>
</rss>
