Логотип exploitDog
product: "spring_framework"
Консоль
Логотип exploitDog

exploitDog

product: "spring_framework"

Количество 241

Количество 241

nvd логотип

CVE-2016-5007

около 8 лет назад

Both Spring Security 3.2.x, 4.0.x, 4.1.0 and the Spring Framework 3.2.x, 4.0.x, 4.1.x, 4.2.x rely on URL pattern mappings for authorization and for mapping requests to controllers respectively. Differences in the strictness of the pattern matching mechanisms, for example with regards to space trimming in path segments, can lead Spring Security to not recognize certain paths as not protected that are in fact mapped to Spring MVC controllers that should be protected. The problem is compounded by the fact that the Spring Framework provides richer features with regards to pattern matching as well as by the fact that pattern matching in each Spring Security and the Spring Framework can easily be customized creating additional differences.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2016-5007

около 8 лет назад

Both Spring Security 3.2.x, 4.0.x, 4.1.0 and the Spring Framework 3.2. ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2011-2894

почти 14 лет назад

Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.0.0 through 2.0.6, and possibly other versions deserialize objects from untrusted sources, which allows remote attackers to bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via the java.lang.Runtime class.

CVSS2: 6.8
EPSS: Средний
redhat логотип

CVE-2011-2894

почти 14 лет назад

Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.0.0 through 2.0.6, and possibly other versions deserialize objects from untrusted sources, which allows remote attackers to bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via the java.lang.Runtime class.

CVSS2: 7.5
EPSS: Средний
nvd логотип

CVE-2011-2894

почти 14 лет назад

Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.0.0 through 2.0.6, and possibly other versions deserialize objects from untrusted sources, which allows remote attackers to bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via the java.lang.Runtime class.

CVSS2: 6.8
EPSS: Средний
debian логотип

CVE-2011-2894

почти 14 лет назад

Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3. ...

CVSS2: 6.8
EPSS: Средний
redhat логотип

CVE-2010-1622

около 15 лет назад

SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file.

CVSS2: 7.5
EPSS: Низкий
nvd логотип

CVE-2010-1622

около 15 лет назад

SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file.

CVSS2: 6
EPSS: Низкий
debian логотип

CVE-2010-1622

около 15 лет назад

SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2 ...

CVSS2: 6
EPSS: Низкий
github логотип

GHSA-wjjr-h4wh-w6vv

больше 3 лет назад

Spring Framework Inefficient Regular Expression Complexity

EPSS: Низкий
github логотип

GHSA-9cmq-m9j5-mvww

12 месяцев назад

Spring Framework vulnerable to Denial of Service

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-6gf2-pvqw-37ph

больше 3 лет назад

Log entry injection in Spring Framework

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-54f6-9mx9-86f7

почти 2 года назад

SaToken privilege escalation vulnerability

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2024-38808

12 месяцев назад

In Spring Framework versions 5.3.0 - 5.3.38 and older unsupported versions, it is possible for a user to provide a specially crafted Spring Expression Language (SpEL) expression that may cause a denial of service (DoS) condition. Specifically, an application is vulnerable when the following is true: * The application evaluates user-supplied SpEL expressions.

CVSS3: 4.3
EPSS: Низкий
redhat логотип

CVE-2024-38808

12 месяцев назад

In Spring Framework versions 5.3.0 - 5.3.38 and older unsupported versions, it is possible for a user to provide a specially crafted Spring Expression Language (SpEL) expression that may cause a denial of service (DoS) condition. Specifically, an application is vulnerable when the following is true: * The application evaluates user-supplied SpEL expressions.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2024-38808

12 месяцев назад

In Spring Framework versions 5.3.0 - 5.3.38 and older unsupported versions, it is possible for a user to provide a specially crafted Spring Expression Language (SpEL) expression that may cause a denial of service (DoS) condition. Specifically, an application is vulnerable when the following is true: * The application evaluates user-supplied SpEL expressions.

CVSS3: 4.3
EPSS: Низкий
debian логотип

CVE-2024-38808

12 месяцев назад

In Spring Framework versions 5.3.0 - 5.3.38 and older unsupported vers ...

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2023-44794

почти 2 года назад

An issue in Dromara SaToken version 1.36.0 and before allows a remote attacker to escalate privileges via a crafted payload to the URL.

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2021-22060

больше 3 лет назад

In Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. This is a follow-up to CVE-2021-22096 that protects against additional types of input and in more places of the Spring Framework codebase.

CVSS3: 4.3
EPSS: Низкий
redhat логотип

CVE-2021-22060

больше 3 лет назад

In Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. This is a follow-up to CVE-2021-22096 that protects against additional types of input and in more places of the Spring Framework codebase.

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2016-5007

Both Spring Security 3.2.x, 4.0.x, 4.1.0 and the Spring Framework 3.2.x, 4.0.x, 4.1.x, 4.2.x rely on URL pattern mappings for authorization and for mapping requests to controllers respectively. Differences in the strictness of the pattern matching mechanisms, for example with regards to space trimming in path segments, can lead Spring Security to not recognize certain paths as not protected that are in fact mapped to Spring MVC controllers that should be protected. The problem is compounded by the fact that the Spring Framework provides richer features with regards to pattern matching as well as by the fact that pattern matching in each Spring Security and the Spring Framework can easily be customized creating additional differences.

CVSS3: 7.5
0%
Низкий
около 8 лет назад
debian логотип
CVE-2016-5007

Both Spring Security 3.2.x, 4.0.x, 4.1.0 and the Spring Framework 3.2. ...

CVSS3: 7.5
0%
Низкий
около 8 лет назад
ubuntu логотип
CVE-2011-2894

Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.0.0 through 2.0.6, and possibly other versions deserialize objects from untrusted sources, which allows remote attackers to bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via the java.lang.Runtime class.

CVSS2: 6.8
15%
Средний
почти 14 лет назад
redhat логотип
CVE-2011-2894

Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.0.0 through 2.0.6, and possibly other versions deserialize objects from untrusted sources, which allows remote attackers to bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via the java.lang.Runtime class.

CVSS2: 7.5
15%
Средний
почти 14 лет назад
nvd логотип
CVE-2011-2894

Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.0.0 through 2.0.6, and possibly other versions deserialize objects from untrusted sources, which allows remote attackers to bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via the java.lang.Runtime class.

CVSS2: 6.8
15%
Средний
почти 14 лет назад
debian логотип
CVE-2011-2894

Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3. ...

CVSS2: 6.8
15%
Средний
почти 14 лет назад
redhat логотип
CVE-2010-1622

SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file.

CVSS2: 7.5
2%
Низкий
около 15 лет назад
nvd логотип
CVE-2010-1622

SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file.

CVSS2: 6
2%
Низкий
около 15 лет назад
debian логотип
CVE-2010-1622

SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2 ...

CVSS2: 6
2%
Низкий
около 15 лет назад
github логотип
GHSA-wjjr-h4wh-w6vv

Spring Framework Inefficient Regular Expression Complexity

1%
Низкий
больше 3 лет назад
github логотип
GHSA-9cmq-m9j5-mvww

Spring Framework vulnerable to Denial of Service

CVSS3: 4.3
0%
Низкий
12 месяцев назад
github логотип
GHSA-6gf2-pvqw-37ph

Log entry injection in Spring Framework

CVSS3: 4.3
0%
Низкий
больше 3 лет назад
github логотип
GHSA-54f6-9mx9-86f7

SaToken privilege escalation vulnerability

CVSS3: 9.8
2%
Низкий
почти 2 года назад
ubuntu логотип
CVE-2024-38808

In Spring Framework versions 5.3.0 - 5.3.38 and older unsupported versions, it is possible for a user to provide a specially crafted Spring Expression Language (SpEL) expression that may cause a denial of service (DoS) condition. Specifically, an application is vulnerable when the following is true: * The application evaluates user-supplied SpEL expressions.

CVSS3: 4.3
0%
Низкий
12 месяцев назад
redhat логотип
CVE-2024-38808

In Spring Framework versions 5.3.0 - 5.3.38 and older unsupported versions, it is possible for a user to provide a specially crafted Spring Expression Language (SpEL) expression that may cause a denial of service (DoS) condition. Specifically, an application is vulnerable when the following is true: * The application evaluates user-supplied SpEL expressions.

CVSS3: 5.9
0%
Низкий
12 месяцев назад
nvd логотип
CVE-2024-38808

In Spring Framework versions 5.3.0 - 5.3.38 and older unsupported versions, it is possible for a user to provide a specially crafted Spring Expression Language (SpEL) expression that may cause a denial of service (DoS) condition. Specifically, an application is vulnerable when the following is true: * The application evaluates user-supplied SpEL expressions.

CVSS3: 4.3
0%
Низкий
12 месяцев назад
debian логотип
CVE-2024-38808

In Spring Framework versions 5.3.0 - 5.3.38 and older unsupported vers ...

CVSS3: 4.3
0%
Низкий
12 месяцев назад
nvd логотип
CVE-2023-44794

An issue in Dromara SaToken version 1.36.0 and before allows a remote attacker to escalate privileges via a crafted payload to the URL.

CVSS3: 9.8
2%
Низкий
почти 2 года назад
ubuntu логотип
CVE-2021-22060

In Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. This is a follow-up to CVE-2021-22096 that protects against additional types of input and in more places of the Spring Framework codebase.

CVSS3: 4.3
0%
Низкий
больше 3 лет назад
redhat логотип
CVE-2021-22060

In Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. This is a follow-up to CVE-2021-22096 that protects against additional types of input and in more places of the Spring Framework codebase.

CVSS3: 4.3
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу