Логотип exploitDog
bind:CVE-2022-22965
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-22965

Количество 6

Количество 6

ubuntu логотип

CVE-2022-22965

около 3 лет назад

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

CVSS3: 9.8
EPSS: Критический
redhat логотип

CVE-2022-22965

около 3 лет назад

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

CVSS3: 8.1
EPSS: Критический
nvd логотип

CVE-2022-22965

около 3 лет назад

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

CVSS3: 9.8
EPSS: Критический
debian логотип

CVE-2022-22965

около 3 лет назад

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vu ...

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-36p3-wjmg-h94x

около 3 лет назад

Remote Code Execution in Spring Framework

CVSS3: 9.8
EPSS: Критический
fstec логотип

BDU:2022-01631

около 3 лет назад

Уязвимость модуля Spring Core программной платформы Spring Framework, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-22965

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

CVSS3: 9.8
94%
Критический
около 3 лет назад
redhat логотип
CVE-2022-22965

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

CVSS3: 8.1
94%
Критический
около 3 лет назад
nvd логотип
CVE-2022-22965

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

CVSS3: 9.8
94%
Критический
около 3 лет назад
debian логотип
CVE-2022-22965

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vu ...

CVSS3: 9.8
94%
Критический
около 3 лет назад
github логотип
GHSA-36p3-wjmg-h94x

Remote Code Execution in Spring Framework

CVSS3: 9.8
94%
Критический
около 3 лет назад
fstec логотип
BDU:2022-01631

Уязвимость модуля Spring Core программной платформы Spring Framework, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
94%
Критический
около 3 лет назад

Уязвимостей на страницу