
Jun Gao
Articles
-
Dec 29, 2024 |
mdpi.com | Jun Gao
2. Materials and Methods 2.1. Pork SamplesPork samples from MMS, SW, SHW, and PD were obtained from designated local pig breeding farms in Shanghai, and DLY meat samples were obtained from Wufeng Shangshai Food Co.(Shanghai, China). The main ingredients of feed formulations for the pigs include crude protein 18.0%, leucine 0.63%, energy/MJ·kg 13.9%, methionine 0.29%, calcium 0.65%, threonine 0.56%, total phosphorus 0.49%, glutamic acid 2.91%, lysine 0.85%, and crude fiber 4%.
-
Nov 29, 2024 |
mdpi.com | Zhi Xu |Zenghua Fan |Jun Gao |Kun Zhang
All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess.
-
Aug 21, 2024 |
seclists.org | Jun Gao
oss-secmailing list archivesFrom: Jun Gao <gaojun2048 () apache org>Date: Wed, 21 Aug 2024 02:42:21 +0000Severity: importantAffected versions:- Apache SeaTunnel Web 1.0.0Description:Mysql security vulnerability in Apache SeaTunnel.
-
Aug 20, 2024 |
nature.com | Jun Gao
AbstractBiological ion channels usually conduct the high-flux transport of 107 ~ 108 ions·s−1; however, the underlying mechanism is still lacking. Here, by applying the KcsA potassium channel as a typical example, and performing multitimescale molecular dynamics simulations, we demonstrate that there is coherence of the K+ ions confined in biological channels, which determines transport.
-
Jul 30, 2024 |
seclists.org | Jun Gao
oss-secmailing list archivesFrom: Jun Gao <gaojun2048 () apache org>Date: Tue, 30 Jul 2024 07:48:43 +0000Severity: moderateAffected versions:- Apache SeaTunnel Web 1.0.0Description:Web Authentication vulnerability in Apache SeaTunnel. Since the jwt key is hardcoded in the application, an attacker can forgeany token to log in any user. Attacker can get secret key in /seatunnel-server/seatunnel-app/src/main/resources/application.yml and then create a token.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →