CVE-2022-22971
- EPSS 0.34%
- Veröffentlicht 12.05.2022 20:15:15
- Zuletzt bearbeitet 21.11.2024 06:47:43
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, application with a STOMP over WebSocket endpoint is vulnerable to a denial of service attack by an authenticated user.
CVE-2022-22970
- EPSS 0.16%
- Veröffentlicht 12.05.2022 20:15:15
- Zuletzt bearbeitet 21.11.2024 06:47:42
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model o...
CVE-2022-22968
- EPSS 20.51%
- Veröffentlicht 14.04.2022 21:15:08
- Zuletzt bearbeitet 21.11.2024 06:47:42
In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and...
CVE-2022-22965
- EPSS 94.43%
- Veröffentlicht 01.04.2022 23:15:13
- Zuletzt bearbeitet 30.10.2025 19:56:43
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Sp...
CVE-2022-22950
- EPSS 4.12%
- Veröffentlicht 01.04.2022 23:15:13
- Zuletzt bearbeitet 21.11.2024 06:47:40
n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition.
CVE-2021-22060
- EPSS 0.16%
- Veröffentlicht 10.01.2022 14:10:16
- Zuletzt bearbeitet 21.11.2024 05:49:31
In Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. This is a follow-up to CVE-2021-22096 that protects ag...
CVE-2021-22096
- EPSS 0.22%
- Veröffentlicht 28.10.2021 16:15:07
- Zuletzt bearbeitet 21.11.2024 05:49:31
In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.
CVE-2021-22118
- EPSS 0.25%
- Veröffentlicht 27.05.2021 15:15:07
- Zuletzt bearbeitet 21.11.2024 05:49:32
In Spring Framework, versions 5.2.x prior to 5.2.15 and versions 5.3.x prior to 5.3.7, a WebFlux application is vulnerable to a privilege escalation: by (re)creating the temporary storage directory, a locally authenticated malicious user can read or ...
CVE-2020-5421
- EPSS 63.83%
- Veröffentlicht 19.09.2020 04:15:11
- Zuletzt bearbeitet 21.11.2024 05:34:08
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jses...
CVE-2020-5397
- EPSS 0.86%
- Veröffentlicht 17.01.2020 19:15:14
- Zuletzt bearbeitet 21.11.2024 05:34:03
Spring Framework, versions 5.2.x prior to 5.2.3 are vulnerable to CSRF attacks through CORS preflight requests that target Spring MVC (spring-webmvc module) or Spring WebFlux (spring-webflux module) endpoints. Only non-authenticated endpoints are vul...