Логотип exploitDog
product: "spring_framework"
Консоль
Логотип exploitDog

exploitDog

product: "spring_framework"
Spring Framework

Spring Frameworkуниверсальный фреймворк с открытым исходным кодом для Java-платформы.

Релизный цикл, информация об уязвимостях

Продукт: Spring Framework
Вендор: VMware

График релизов

6.22024202520262027

Недавние уязвимости Spring Framework

Количество 241

ubuntu логотип

CVE-2022-22968

больше 3 лет назад

In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path.

CVSS3: 5.3
EPSS: Средний
redhat логотип

CVE-2022-22968

больше 3 лет назад

In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path.

CVSS3: 5.3
EPSS: Средний
github логотип

GHSA-558x-2xjg-6232

больше 3 лет назад

Allocation of Resources Without Limits or Throttling in Spring Framework

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2022-22965

больше 3 лет назад

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

CVSS3: 9.8
EPSS: Критический
debian логотип

CVE-2022-22965

больше 3 лет назад

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vu ...

CVSS3: 9.8
EPSS: Критический
nvd логотип

CVE-2022-22950

больше 3 лет назад

n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2022-22950

больше 3 лет назад

n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versi ...

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2022-22950

больше 3 лет назад

n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition.

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2022-22965

больше 3 лет назад

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-36p3-wjmg-h94x

больше 3 лет назад

Remote Code Execution in Spring Framework

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
ubuntu логотип
CVE-2022-22968

In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path.

CVSS3: 5.3
23%
Средний
больше 3 лет назад
redhat логотип
CVE-2022-22968

In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path.

CVSS3: 5.3
23%
Средний
больше 3 лет назад
github логотип
GHSA-558x-2xjg-6232

Allocation of Resources Without Limits or Throttling in Spring Framework

CVSS3: 6.5
5%
Низкий
больше 3 лет назад
nvd логотип
CVE-2022-22965

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

CVSS3: 9.8
94%
Критический
больше 3 лет назад
debian логотип
CVE-2022-22965

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vu ...

CVSS3: 9.8
94%
Критический
больше 3 лет назад
nvd логотип
CVE-2022-22950

n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition.

CVSS3: 6.5
5%
Низкий
больше 3 лет назад
debian логотип
CVE-2022-22950

n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versi ...

CVSS3: 6.5
5%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2022-22950

n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition.

CVSS3: 6.5
5%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2022-22965

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

CVSS3: 9.8
94%
Критический
больше 3 лет назад
github логотип
GHSA-36p3-wjmg-h94x

Remote Code Execution in Spring Framework

CVSS3: 9.8
94%
Критический
больше 3 лет назад

Уязвимостей на страницу


Поделиться