Show filters
54 Total Results
Displaying 11-20 of 54
Sort by:
Attacker Value
Unknown

CVE-2024-22233

Disclosure Date: January 22, 2024 (last updated February 14, 2025)
In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC * Spring Security 6.1.6+ or 6.2.1+ is on the classpath Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions.
Attacker Value
Unknown

CVE-2023-34053

Disclosure Date: November 28, 2023 (last updated February 14, 2025)
In Spring Framework versions 6.0.0 - 6.0.13, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC or Spring WebFlux * io.micrometer:micrometer-core is on the classpath * an ObservationRegistry is configured in the application to record observations Typically, Spring Boot applications need the org.springframework.boot:spring-boot-actuator dependency to meet all conditions.
Attacker Value
Unknown

CVE-2023-20863

Disclosure Date: April 13, 2023 (last updated October 08, 2023)
In spring framework versions prior to 5.2.24 release+ ,5.3.27+ and 6.0.8+ , it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.
Attacker Value
Unknown

CVE-2023-20860

Disclosure Date: March 27, 2023 (last updated October 08, 2023)
Spring Framework running version 6.0.0 - 6.0.6 or 5.3.0 - 5.3.25 using "**" as a pattern in Spring Security configuration with the mvcRequestMatcher creates a mismatch in pattern matching between Spring Security and Spring MVC, and the potential for a security bypass.
Attacker Value
Unknown

CVE-2023-20861

Disclosure Date: March 23, 2023 (last updated October 08, 2023)
In Spring Framework versions 6.0.0 - 6.0.6, 5.3.0 - 5.3.25, 5.2.0.RELEASE - 5.2.22.RELEASE, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.
Attacker Value
Unknown

CVE-2022-22971

Disclosure Date: May 12, 2022 (last updated October 07, 2023)
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, application with a STOMP over WebSocket endpoint is vulnerable to a denial of service attack by an authenticated user.
Attacker Value
Unknown

CVE-2022-22970

Disclosure Date: May 12, 2022 (last updated October 07, 2023)
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.
Attacker Value
Unknown

CVE-2022-22968

Disclosure Date: April 14, 2022 (last updated October 07, 2023)
In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path.
Attacker Value
Unknown

CVE-2022-22950

Disclosure Date: April 01, 2022 (last updated October 07, 2023)
n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition.
Attacker Value
Unknown

CVE-2021-22060

Disclosure Date: January 10, 2022 (last updated October 07, 2023)
In Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. This is a follow-up to CVE-2021-22096 that protects against additional types of input and in more places of the Spring Framework codebase.