Логотип exploitDog
product: "spring_framework"
Консоль
Логотип exploitDog

exploitDog

product: "spring_framework"

Количество 236

Количество 236

debian логотип

CVE-2018-1257

около 7 лет назад

Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-gfwj-fwqj-fp3v

около 3 лет назад

Improper Privilege Management in Spring Framework

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-9gcm-f4x3-8jpw

больше 6 лет назад

Spring Framework Cross Site Tracing (XST)

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2021-22118

около 4 лет назад

In Spring Framework, versions 5.2.x prior to 5.2.15 and versions 5.3.x prior to 5.3.7, a WebFlux application is vulnerable to a privilege escalation: by (re)creating the temporary storage directory, a locally authenticated malicious user can read or modify files that have been uploaded to the WebFlux application, or overwrite arbitrary files with multipart request data.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2021-22118

около 4 лет назад

In Spring Framework, versions 5.2.x prior to 5.2.15 and versions 5.3.x prior to 5.3.7, a WebFlux application is vulnerable to a privilege escalation: by (re)creating the temporary storage directory, a locally authenticated malicious user can read or modify files that have been uploaded to the WebFlux application, or overwrite arbitrary files with multipart request data.

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2021-22118

около 4 лет назад

In Spring Framework, versions 5.2.x prior to 5.2.15 and versions 5.3.x prior to 5.3.7, a WebFlux application is vulnerable to a privilege escalation: by (re)creating the temporary storage directory, a locally authenticated malicious user can read or modify files that have been uploaded to the WebFlux application, or overwrite arbitrary files with multipart request data.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2021-22118

около 4 лет назад

In Spring Framework, versions 5.2.x prior to 5.2.15 and versions 5.3.x ...

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2018-11039

почти 7 лет назад

Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2018-11039

около 7 лет назад

Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack.

CVSS3: 3.7
EPSS: Низкий
nvd логотип

CVE-2018-11039

почти 7 лет назад

Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2018-11039

почти 7 лет назад

Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-8wx2-9q48-vm9r

больше 5 лет назад

RFD attack via Content-Disposition header sourced from request input by Spring MVC or Spring WebFlux Application

CVSS3: 7.5
EPSS: Критический
ubuntu логотип

CVE-2020-5398

больше 5 лет назад

In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input.

CVSS3: 7.5
EPSS: Критический
redhat логотип

CVE-2020-5398

больше 5 лет назад

In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input.

CVSS3: 8
EPSS: Критический
nvd логотип

CVE-2020-5398

больше 5 лет назад

In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input.

CVSS3: 7.5
EPSS: Критический
debian логотип

CVE-2020-5398

больше 5 лет назад

In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x pri ...

CVSS3: 7.5
EPSS: Критический
github логотип

GHSA-36p3-wjmg-h94x

около 3 лет назад

Remote Code Execution in Spring Framework

CVSS3: 9.8
EPSS: Критический
ubuntu логотип

CVE-2022-22965

около 3 лет назад

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

CVSS3: 9.8
EPSS: Критический
redhat логотип

CVE-2022-22965

около 3 лет назад

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

CVSS3: 8.1
EPSS: Критический
nvd логотип

CVE-2022-22965

около 3 лет назад

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
debian логотип
CVE-2018-1257

Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior ...

CVSS3: 6.5
1%
Низкий
около 7 лет назад
github логотип
GHSA-gfwj-fwqj-fp3v

Improper Privilege Management in Spring Framework

CVSS3: 7.8
0%
Низкий
около 3 лет назад
github логотип
GHSA-9gcm-f4x3-8jpw

Spring Framework Cross Site Tracing (XST)

CVSS3: 5.9
3%
Низкий
больше 6 лет назад
ubuntu логотип
CVE-2021-22118

In Spring Framework, versions 5.2.x prior to 5.2.15 and versions 5.3.x prior to 5.3.7, a WebFlux application is vulnerable to a privilege escalation: by (re)creating the temporary storage directory, a locally authenticated malicious user can read or modify files that have been uploaded to the WebFlux application, or overwrite arbitrary files with multipart request data.

CVSS3: 7.8
0%
Низкий
около 4 лет назад
redhat логотип
CVE-2021-22118

In Spring Framework, versions 5.2.x prior to 5.2.15 and versions 5.3.x prior to 5.3.7, a WebFlux application is vulnerable to a privilege escalation: by (re)creating the temporary storage directory, a locally authenticated malicious user can read or modify files that have been uploaded to the WebFlux application, or overwrite arbitrary files with multipart request data.

CVSS3: 7.1
0%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-22118

In Spring Framework, versions 5.2.x prior to 5.2.15 and versions 5.3.x prior to 5.3.7, a WebFlux application is vulnerable to a privilege escalation: by (re)creating the temporary storage directory, a locally authenticated malicious user can read or modify files that have been uploaded to the WebFlux application, or overwrite arbitrary files with multipart request data.

CVSS3: 7.8
0%
Низкий
около 4 лет назад
debian логотип
CVE-2021-22118

In Spring Framework, versions 5.2.x prior to 5.2.15 and versions 5.3.x ...

CVSS3: 7.8
0%
Низкий
около 4 лет назад
ubuntu логотип
CVE-2018-11039

Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack.

CVSS3: 5.9
3%
Низкий
почти 7 лет назад
redhat логотип
CVE-2018-11039

Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack.

CVSS3: 3.7
3%
Низкий
около 7 лет назад
nvd логотип
CVE-2018-11039

Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack.

CVSS3: 5.9
3%
Низкий
почти 7 лет назад
debian логотип
CVE-2018-11039

Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior ...

CVSS3: 5.9
3%
Низкий
почти 7 лет назад
github логотип
GHSA-8wx2-9q48-vm9r

RFD attack via Content-Disposition header sourced from request input by Spring MVC or Spring WebFlux Application

CVSS3: 7.5
91%
Критический
больше 5 лет назад
ubuntu логотип
CVE-2020-5398

In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input.

CVSS3: 7.5
91%
Критический
больше 5 лет назад
redhat логотип
CVE-2020-5398

In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input.

CVSS3: 8
91%
Критический
больше 5 лет назад
nvd логотип
CVE-2020-5398

In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input.

CVSS3: 7.5
91%
Критический
больше 5 лет назад
debian логотип
CVE-2020-5398

In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x pri ...

CVSS3: 7.5
91%
Критический
больше 5 лет назад
github логотип
GHSA-36p3-wjmg-h94x

Remote Code Execution in Spring Framework

CVSS3: 9.8
94%
Критический
около 3 лет назад
ubuntu логотип
CVE-2022-22965

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

CVSS3: 9.8
94%
Критический
около 3 лет назад
redhat логотип
CVE-2022-22965

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

CVSS3: 8.1
94%
Критический
около 3 лет назад
nvd логотип
CVE-2022-22965

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

CVSS3: 9.8
94%
Критический
около 3 лет назад

Уязвимостей на страницу