Lucene search

K
VmwareSpring Security5.6.0

5 matches found

CVE
CVE
added 2022/10/31 8:15 p.m.390 views

CVE-2022-31690

Spring Security, versions 5.7 prior to 5.7.5, and 5.6 prior to 5.6.9, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can modify a request initiated by the Client (via the browser) to the Authorization Server which...

8.1CVSS7.8AI score0.00213EPSS
CVE
CVE
added 2022/05/19 3:15 p.m.295 views

CVE-2022-22978

In spring security versions prior to 5.4.11+, 5.5.7+ , 5.6.4+ and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with . in the regular expression are possibly vulnerable to an authorizatio...

9.8CVSS9.2AI score0.90791EPSS
Web
CVE
CVE
added 2023/07/19 3:15 p.m.236 views

CVE-2023-34034

Using "**" as a pattern in Spring Security configurationfor WebFlux creates a mismatch in pattern matching between SpringSecurity and Spring WebFlux, and the potential for a security bypass.

9.8CVSS9.2AI score0.44571EPSS
CVE
CVE
added 2022/05/19 3:15 p.m.197 views

CVE-2022-22976

Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions contain an integer overflow vulnerability. When using the BCrypt class with the maximum work factor (31), the encoder does not perform any salt rounds, due to an integer overflow error. The default...

5.3CVSS5.5AI score0.00365EPSS
CVE
CVE
added 2022/10/31 8:15 p.m.179 views

CVE-2022-31692

Spring Security, versions 5.7 prior to 5.7.5 and 5.6 prior to 5.6.9 could be susceptible to authorization rules bypass via forward or include dispatcher types. Specifically, an application is vulnerable when all of the following are true: The application expects that Spring Security applies securit...

9.8CVSS9.2AI score0.07641EPSS