Lucene search

K
VmwareSpring Framework

6 matches found

CVE
CVE
added 2022/04/01 11:15 p.m.2212 views

CVE-2022-22965

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is...

9.8CVSS8.7AI score0.9446EPSS
CVE
CVE
added 2022/05/12 8:15 p.m.1069 views

CVE-2022-22971

In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, application with a STOMP over WebSocket endpoint is vulnerable to a denial of service attack by an authenticated user.

6.5CVSS6.2AI score0.00444EPSS
CVE
CVE
added 2022/04/01 11:15 p.m.573 views

CVE-2022-22950

n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition.

6.5CVSS7.5AI score0.04708EPSS
CVE
CVE
added 2022/05/12 8:15 p.m.335 views

CVE-2022-22970

In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.

5.3CVSS5.6AI score0.00216EPSS
CVE
CVE
added 2022/04/14 9:15 p.m.228 views

CVE-2022-22968

In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field,...

5.3CVSS5.4AI score0.22751EPSS
CVE
CVE
added 2022/01/10 2:10 p.m.189 views

CVE-2021-22060

In Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. This is a follow-up to CVE-2021-22096 that protects against additional types of input and in more place...

4.3CVSS4.6AI score0.00221EPSS