Логотип exploitDog
product: "spring_framework"
Консоль
Логотип exploitDog

exploitDog

product: "spring_framework"
Spring Framework

Spring Frameworkуниверсальный фреймворк с открытым исходным кодом для Java-платформы.

Релизный цикл, информация об уязвимостях

Продукт: Spring Framework
Вендор: VMware

График релизов

6.22024202520262027

Недавние уязвимости Spring Framework

Количество 241

redhat логотип

CVE-2023-20863

больше 2 лет назад

In spring framework versions prior to 5.2.24 release+ ,5.3.27+ and 6.0.8+ , it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-7phw-cxx7-q9vq

больше 2 лет назад

Spring Framework is vulnerable to security bypass via mvcRequestMatcher pattern mismatch

CVSS3: 9.1
EPSS: Средний
nvd логотип

CVE-2023-20860

больше 2 лет назад

Spring Framework running version 6.0.0 - 6.0.6 or 5.3.0 - 5.3.25 using "**" as a pattern in Spring Security configuration with the mvcRequestMatcher creates a mismatch in pattern matching between Spring Security and Spring MVC, and the potential for a security bypass.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2023-20860

больше 2 лет назад

Spring Framework running version 6.0.0 - 6.0.6 or 5.3.0 - 5.3.25 using ...

CVSS3: 7.5
EPSS: Средний
ubuntu логотип

CVE-2023-20860

больше 2 лет назад

Spring Framework running version 6.0.0 - 6.0.6 or 5.3.0 - 5.3.25 using "**" as a pattern in Spring Security configuration with the mvcRequestMatcher creates a mismatch in pattern matching between Spring Security and Spring MVC, and the potential for a security bypass.

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-564r-hj7v-mcr5

больше 2 лет назад

Spring Framework vulnerable to denial of service via specially crafted SpEL expression

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2023-20861

больше 2 лет назад

In Spring Framework versions 6.0.0 - 6.0.6, 5.3.0 - 5.3.25, 5.2.0.RELEASE - 5.2.22.RELEASE, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2023-20861

больше 2 лет назад

In Spring Framework versions 6.0.0 - 6.0.6, 5.3.0 - 5.3.25, 5.2.0.RELE ...

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2023-20861

больше 2 лет назад

In Spring Framework versions 6.0.0 - 6.0.6, 5.3.0 - 5.3.25, 5.2.0.RELEASE - 5.2.22.RELEASE, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2023-20860

больше 2 лет назад

Spring Framework running version 6.0.0 - 6.0.6 or 5.3.0 - 5.3.25 using "**" as a pattern in Spring Security configuration with the mvcRequestMatcher creates a mismatch in pattern matching between Spring Security and Spring MVC, and the potential for a security bypass.

CVSS3: 7.5
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
redhat логотип
CVE-2023-20863

In spring framework versions prior to 5.2.24 release+ ,5.3.27+ and 6.0.8+ , it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.

CVSS3: 6.5
1%
Низкий
больше 2 лет назад
github логотип
GHSA-7phw-cxx7-q9vq

Spring Framework is vulnerable to security bypass via mvcRequestMatcher pattern mismatch

CVSS3: 9.1
56%
Средний
больше 2 лет назад
nvd логотип
CVE-2023-20860

Spring Framework running version 6.0.0 - 6.0.6 or 5.3.0 - 5.3.25 using "**" as a pattern in Spring Security configuration with the mvcRequestMatcher creates a mismatch in pattern matching between Spring Security and Spring MVC, and the potential for a security bypass.

CVSS3: 7.5
56%
Средний
больше 2 лет назад
debian логотип
CVE-2023-20860

Spring Framework running version 6.0.0 - 6.0.6 or 5.3.0 - 5.3.25 using ...

CVSS3: 7.5
56%
Средний
больше 2 лет назад
ubuntu логотип
CVE-2023-20860

Spring Framework running version 6.0.0 - 6.0.6 or 5.3.0 - 5.3.25 using "**" as a pattern in Spring Security configuration with the mvcRequestMatcher creates a mismatch in pattern matching between Spring Security and Spring MVC, and the potential for a security bypass.

CVSS3: 7.5
56%
Средний
больше 2 лет назад
github логотип
GHSA-564r-hj7v-mcr5

Spring Framework vulnerable to denial of service via specially crafted SpEL expression

CVSS3: 6.5
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-20861

In Spring Framework versions 6.0.0 - 6.0.6, 5.3.0 - 5.3.25, 5.2.0.RELEASE - 5.2.22.RELEASE, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.

CVSS3: 6.5
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-20861

In Spring Framework versions 6.0.0 - 6.0.6, 5.3.0 - 5.3.25, 5.2.0.RELE ...

CVSS3: 6.5
0%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2023-20861

In Spring Framework versions 6.0.0 - 6.0.6, 5.3.0 - 5.3.25, 5.2.0.RELEASE - 5.2.22.RELEASE, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.

CVSS3: 6.5
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-20860

Spring Framework running version 6.0.0 - 6.0.6 or 5.3.0 - 5.3.25 using "**" as a pattern in Spring Security configuration with the mvcRequestMatcher creates a mismatch in pattern matching between Spring Security and Spring MVC, and the potential for a security bypass.

CVSS3: 7.5
56%
Средний
больше 2 лет назад

Уязвимостей на страницу


Поделиться