CVE-2022-22976
- EPSS 0.37%
- Veröffentlicht 19.05.2022 15:15:08
- Zuletzt bearbeitet 21.11.2024 06:47:43
Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions contain an integer overflow vulnerability. When using the BCrypt class with the maximum work factor (31), the encoder does not perform any salt roun...
CVE-2022-22978
- EPSS 90.79%
- Veröffentlicht 19.05.2022 15:15:08
- Zuletzt bearbeitet 21.11.2024 06:47:43
In spring security versions prior to 5.4.11+, 5.5.7+ , 5.6.4+ and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with `.` in the regular ex...
CVE-2021-22119
- EPSS 4.9%
- Veröffentlicht 29.06.2021 17:15:08
- Zuletzt bearbeitet 21.11.2024 05:49:32
Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and We...
- EPSS 0.98%
- Veröffentlicht 23.02.2021 19:15:13
- Zuletzt bearbeitet 21.11.2024 05:49:31
Spring Security 5.4.x prior to 5.4.4, 5.3.x prior to 5.3.8.RELEASE, 5.2.x prior to 5.2.9.RELEASE, and older unsupported versions can fail to save the SecurityContext if it is changed more than once in a single request.A malicious user cannot cause th...
CVE-2020-5408
- EPSS 0.47%
- Veröffentlicht 14.05.2020 18:15:12
- Zuletzt bearbeitet 21.11.2024 05:34:06
Spring Security versions 5.3.x prior to 5.3.2, 5.2.x prior to 5.2.4, 5.1.x prior to 5.1.10, 5.0.x prior to 5.0.16 and 4.2.x prior to 4.2.16 use a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor. A ...
CVE-2019-11272
- EPSS 0.41%
- Veröffentlicht 26.06.2019 14:15:09
- Zuletzt bearbeitet 12.09.2025 19:44:04
Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user...
CVE-2019-3795
- EPSS 1.96%
- Veröffentlicht 09.04.2019 16:29:01
- Zuletzt bearbeitet 21.11.2024 04:42:33
Spring Security versions 4.2.x prior to 4.2.12, 5.0.x prior to 5.0.12, and 5.1.x prior to 5.1.5 contain an insecure randomness vulnerability when using SecureRandomFactoryBean#setSeed to configure a SecureRandom instance. In order to be impacted, an ...
CVE-2018-1199
- EPSS 1.51%
- Veröffentlicht 16.03.2018 20:29:00
- Zuletzt bearbeitet 21.11.2024 03:59:22
Spring Security (Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 5.0.3) does not consider URL path parameters when processing security constraints. By adding a ...
CVE-2017-4995
- EPSS 0.83%
- Veröffentlicht 27.11.2017 10:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
An issue was discovered in Pivotal Spring Security 4.2.0.RELEASE through 4.2.2.RELEASE, and Spring Security 5.0.0.M1. When configured to enable default typing, Jackson contained a deserialization vulnerability that could lead to arbitrary code execut...
CVE-2016-5007
- EPSS 0.29%
- Veröffentlicht 25.05.2017 17:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Both Spring Security 3.2.x, 4.0.x, 4.1.0 and the Spring Framework 3.2.x, 4.0.x, 4.1.x, 4.2.x rely on URL pattern mappings for authorization and for mapping requests to controllers respectively. Differences in the strictness of the pattern matching me...