Логотип exploitDog
product: "spring_framework"
Консоль
Логотип exploitDog

exploitDog

product: "spring_framework"

Количество 241

Количество 241

debian логотип

CVE-2022-22970

около 3 лет назад

In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupp ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-g5mm-vmx4-3rg7

больше 3 лет назад

Improper handling of case sensitivity in Spring Framework

CVSS3: 7.5
EPSS: Средний
ubuntu логотип

CVE-2022-22968

больше 3 лет назад

In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path.

CVSS3: 5.3
EPSS: Средний
redhat логотип

CVE-2022-22968

больше 3 лет назад

In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path.

CVSS3: 5.3
EPSS: Средний
nvd логотип

CVE-2022-22968

больше 3 лет назад

In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path.

CVSS3: 5.3
EPSS: Средний
debian логотип

CVE-2022-22968

больше 3 лет назад

In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older ...

CVSS3: 5.3
EPSS: Средний
github логотип

GHSA-rfmp-97jj-h8m6

около 3 лет назад

Improper Output Neutralization for Logs in Spring Framework

CVSS3: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2021-22096

почти 4 года назад

In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.

CVSS3: 4.3
EPSS: Низкий
redhat логотип

CVE-2021-22096

почти 4 года назад

In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2021-22096

почти 4 года назад

In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.

CVSS3: 4.3
EPSS: Низкий
debian логотип

CVE-2021-22096

почти 4 года назад

In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older ...

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-3rmv-2pg5-xvqj

почти 7 лет назад

Spring Framework has Improperly Implemented Security Check for Standard

CVSS3: 9.8
EPSS: Средний
ubuntu логотип

CVE-2018-1275

больше 7 лет назад

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.

CVSS3: 9.8
EPSS: Средний
redhat логотип

CVE-2018-1275

больше 7 лет назад

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.

CVSS3: 9.8
EPSS: Средний
nvd логотип

CVE-2018-1275

больше 7 лет назад

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.

CVSS3: 9.8
EPSS: Средний
debian логотип

CVE-2018-1275

больше 7 лет назад

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior t ...

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-4487-x383-qpph

почти 7 лет назад

Possible privilege escalation in org.springframework:spring-core

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2018-1272

больше 7 лет назад

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2018-1272

больше 7 лет назад

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2018-1272

больше 7 лет назад

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
debian логотип
CVE-2022-22970

In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupp ...

CVSS3: 5.3
0%
Низкий
около 3 лет назад
github логотип
GHSA-g5mm-vmx4-3rg7

Improper handling of case sensitivity in Spring Framework

CVSS3: 7.5
23%
Средний
больше 3 лет назад
ubuntu логотип
CVE-2022-22968

In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path.

CVSS3: 5.3
23%
Средний
больше 3 лет назад
redhat логотип
CVE-2022-22968

In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path.

CVSS3: 5.3
23%
Средний
больше 3 лет назад
nvd логотип
CVE-2022-22968

In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path.

CVSS3: 5.3
23%
Средний
больше 3 лет назад
debian логотип
CVE-2022-22968

In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older ...

CVSS3: 5.3
23%
Средний
больше 3 лет назад
github логотип
GHSA-rfmp-97jj-h8m6

Improper Output Neutralization for Logs in Spring Framework

CVSS3: 4.3
0%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2021-22096

In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.

CVSS3: 4.3
0%
Низкий
почти 4 года назад
redhat логотип
CVE-2021-22096

In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.

CVSS3: 4.3
0%
Низкий
почти 4 года назад
nvd логотип
CVE-2021-22096

In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.

CVSS3: 4.3
0%
Низкий
почти 4 года назад
debian логотип
CVE-2021-22096

In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older ...

CVSS3: 4.3
0%
Низкий
почти 4 года назад
github логотип
GHSA-3rmv-2pg5-xvqj

Spring Framework has Improperly Implemented Security Check for Standard

CVSS3: 9.8
32%
Средний
почти 7 лет назад
ubuntu логотип
CVE-2018-1275

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.

CVSS3: 9.8
32%
Средний
больше 7 лет назад
redhat логотип
CVE-2018-1275

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.

CVSS3: 9.8
32%
Средний
больше 7 лет назад
nvd логотип
CVE-2018-1275

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.

CVSS3: 9.8
32%
Средний
больше 7 лет назад
debian логотип
CVE-2018-1275

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior t ...

CVSS3: 9.8
32%
Средний
больше 7 лет назад
github логотип
GHSA-4487-x383-qpph

Possible privilege escalation in org.springframework:spring-core

CVSS3: 7.5
2%
Низкий
почти 7 лет назад
ubuntu логотип
CVE-2018-1272

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.

CVSS3: 7.5
2%
Низкий
больше 7 лет назад
redhat логотип
CVE-2018-1272

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.

CVSS3: 5.3
2%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-1272

Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.

CVSS3: 7.5
2%
Низкий
больше 7 лет назад

Уязвимостей на страницу