Количество 6
Количество 6
CVE-2024-22243
Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks.
CVE-2024-22243
Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks.
CVE-2024-22243
Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks.
CVE-2024-22243
Applications that use UriComponentsBuilderto parse an externally provi ...
GHSA-ccgv-vj62-xf9h
Spring Web vulnerable to Open Redirect or Server Side Request Forgery
BDU:2024-01709
Уязвимость программной платформы Spring Framework, существующая из-за недостаточной валидации вводимых пользователем данных, позволяющая нарушителю осуществить SSRF-атаку
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-22243 Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks. | CVSS3: 8.1 | 56% Средний | почти 2 года назад | |
CVE-2024-22243 Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks. | CVSS3: 3.4 | 56% Средний | почти 2 года назад | |
CVE-2024-22243 Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks. | CVSS3: 8.1 | 56% Средний | почти 2 года назад | |
CVE-2024-22243 Applications that use UriComponentsBuilderto parse an externally provi ... | CVSS3: 8.1 | 56% Средний | почти 2 года назад | |
GHSA-ccgv-vj62-xf9h Spring Web vulnerable to Open Redirect or Server Side Request Forgery | CVSS3: 8.1 | 56% Средний | почти 2 года назад | |
BDU:2024-01709 Уязвимость программной платформы Spring Framework, существующая из-за недостаточной валидации вводимых пользователем данных, позволяющая нарушителю осуществить SSRF-атаку | CVSS3: 8.1 | 56% Средний | почти 2 года назад |
Уязвимостей на страницу