VMware

Spring Security

24 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.37%
  • Published 19.05.2022 15:15:08
  • Last modified 21.11.2024 06:47:43

Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions contain an integer overflow vulnerability. When using the BCrypt class with the maximum work factor (31), the encoder does not perform any salt roun...

  • EPSS 90.79%
  • Published 19.05.2022 15:15:08
  • Last modified 21.11.2024 06:47:43

In spring security versions prior to 5.4.11+, 5.5.7+ , 5.6.4+ and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with `.` in the regular ex...

  • EPSS 4.9%
  • Published 29.06.2021 17:15:08
  • Last modified 21.11.2024 05:49:32

Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and We...

  • EPSS 0.98%
  • Published 23.02.2021 19:15:13
  • Last modified 21.11.2024 05:49:31

Spring Security 5.4.x prior to 5.4.4, 5.3.x prior to 5.3.8.RELEASE, 5.2.x prior to 5.2.9.RELEASE, and older unsupported versions can fail to save the SecurityContext if it is changed more than once in a single request.A malicious user cannot cause th...

  • EPSS 0.47%
  • Published 14.05.2020 18:15:12
  • Last modified 21.11.2024 05:34:06

Spring Security versions 5.3.x prior to 5.3.2, 5.2.x prior to 5.2.4, 5.1.x prior to 5.1.10, 5.0.x prior to 5.0.16 and 4.2.x prior to 4.2.16 use a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor. A ...

  • EPSS 0.41%
  • Published 26.06.2019 14:15:09
  • Last modified 12.09.2025 19:44:04

Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user...

  • EPSS 1.96%
  • Published 09.04.2019 16:29:01
  • Last modified 21.11.2024 04:42:33

Spring Security versions 4.2.x prior to 4.2.12, 5.0.x prior to 5.0.12, and 5.1.x prior to 5.1.5 contain an insecure randomness vulnerability when using SecureRandomFactoryBean#setSeed to configure a SecureRandom instance. In order to be impacted, an ...

  • EPSS 1.51%
  • Published 16.03.2018 20:29:00
  • Last modified 21.11.2024 03:59:22

Spring Security (Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 5.0.3) does not consider URL path parameters when processing security constraints. By adding a ...

  • EPSS 0.83%
  • Published 27.11.2017 10:29:00
  • Last modified 20.04.2025 01:37:25

An issue was discovered in Pivotal Spring Security 4.2.0.RELEASE through 4.2.2.RELEASE, and Spring Security 5.0.0.M1. When configured to enable default typing, Jackson contained a deserialization vulnerability that could lead to arbitrary code execut...

  • EPSS 0.29%
  • Published 25.05.2017 17:29:00
  • Last modified 20.04.2025 01:37:25

Both Spring Security 3.2.x, 4.0.x, 4.1.0 and the Spring Framework 3.2.x, 4.0.x, 4.1.x, 4.2.x rely on URL pattern mappings for authorization and for mapping requests to controllers respectively. Differences in the strictness of the pattern matching me...