Show filters
177 Total Results
Displaying 11-20 of 177
Sort by:
Attacker Value
Unknown

CVE-2020-5411

Disclosure Date: June 11, 2020 (last updated November 28, 2024)
When configured to enable default typing, Jackson contained a deserialization vulnerability that could lead to arbitrary code execution. Jackson fixed this vulnerability by blacklisting known "deserialization gadgets". Spring Batch configures Jackson with global default typing enabled which means that through the previous exploit, arbitrary code could be executed if all of the following is true: * Spring Batch's Jackson support is being leveraged to serialize a job's ExecutionContext. * A malicious user gains write access to the data store used by the JobRepository (where the data to be deserialized is stored). In order to protect against this type of attack, Jackson prevents a set of untrusted gadget classes from being deserialized. Spring Batch should be proactive against blocking unknown "deserialization gadgets" when enabling default typing.
Attacker Value
Unknown

CVE-2020-5409

Disclosure Date: May 13, 2020 (last updated November 27, 2024)
Pivotal Concourse, most versions prior to 6.0.0, allows redirects to untrusted websites in its login flow. A remote unauthenticated attacker could convince a user to click on a link using the OAuth redirect link with an untrusted website and gain access to that user's access token in Concourse. (This issue is similar to, but distinct from, CVE-2018-15798.)
Attacker Value
Unknown

CVE-2020-5407

Disclosure Date: May 13, 2020 (last updated November 08, 2023)
Spring Security versions 5.2.x prior to 5.2.4 and 5.3.x prior to 5.3.2 contain a signature wrapping vulnerability during SAML response validation. When using the spring-security-saml2-service-provider component, a malicious user can carefully modify an otherwise valid SAML response and append an arbitrary assertion that Spring Security will accept as valid.
Attacker Value
Unknown

CVE-2020-5408

Disclosure Date: May 13, 2020 (last updated November 27, 2024)
Spring Security versions 5.3.x prior to 5.3.2, 5.2.x prior to 5.2.4, 5.1.x prior to 5.1.10, 5.0.x prior to 5.0.16 and 4.2.x prior to 4.2.16 use a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor. A malicious user with access to the data that has been encrypted using such an encryptor may be able to derive the unencrypted values using a dictionary attack.
Attacker Value
Unknown

CVE-2019-19029

Disclosure Date: March 20, 2020 (last updated February 21, 2025)
Cloud Native Computing Foundation Harbor prior to 1.8.6 and 1.9.3 allows SQL Injection via user-groups in the VMware Harbor Container Registry for the Pivotal Platform.
Attacker Value
Unknown

CVE-2019-19026

Disclosure Date: March 20, 2020 (last updated February 21, 2025)
Cloud Native Computing Foundation Harbor prior to 1.8.6 and 1.9.3 allows SQL Injection via project quotas in the VMware Harbor Container Registry for the Pivotal Platform.
Attacker Value
Unknown

CVE-2019-19025

Disclosure Date: March 20, 2020 (last updated February 21, 2025)
Cloud Native Computing Foundation Harbor prior to 1.8.6 and 1.9.3 allows CSRF in the VMware Harbor Container Registry for the Pivotal Platform.
Attacker Value
Unknown

CVE-2019-19023

Disclosure Date: March 20, 2020 (last updated November 27, 2024)
Cloud Native Computing Foundation Harbor prior to 1.8.6 and 1.9.3 has a Privilege Escalation Vulnerability in the VMware Harbor Container Registry for the Pivotal Platform.
Attacker Value
Unknown

CVE-2020-5404

Disclosure Date: February 27, 2020 (last updated February 21, 2025)
The HttpClient from Reactor Netty, versions 0.9.x prior to 0.9.5, and versions 0.8.x prior to 0.8.16, may be used incorrectly, leading to a credentials leak during a redirect to a different domain. In order for this to happen, the HttpClient must have been explicitly configured to follow redirects.
Attacker Value
Unknown

CVE-2020-5403

Disclosure Date: February 27, 2020 (last updated February 21, 2025)
Reactor Netty HttpServer, versions 0.9.3 and 0.9.4, is exposed to a URISyntaxException that causes the connection to be closed prematurely instead of producing a 400 response.