org.springframework:spring-core@2.5.1 vulnerabilities
-
latest version
6.1.14
-
latest non vulnerable version
-
first published
19 years ago
-
latest version published
a month ago
-
licenses detected
- [0,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.springframework:spring-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.springframework:spring-core is a core package within the spring-framework that contains multiple classes and utilities. Affected versions of this package are vulnerable to Improper Handling of Case Sensitivity due to Note: The fix for CVE-2022-22968 made disallowedFields patterns in DataBinder case insensitive. How to fix Improper Handling of Case Sensitivity? Upgrade |
[,6.1.14)
|
org.springframework:spring-core is a core package within the spring-framework that contains multiple classes and utilities. Affected versions of this package are vulnerable to Improper Input Validation when a user provides malicious input, causing insertion of additional log entries. How to fix Improper Input Validation? Upgrade |
[,5.2.19.RELEASE)
[5.3.0,5.3.14)
|
org.springframework:spring-core is a core package within the spring-framework that contains multiple classes and utilities. Affected versions of this package are vulnerable to Improper Output Neutralization for Logs when a user provides malicious input, causing insertion of additional log entries. How to fix Improper Output Neutralization for Logs? Upgrade |
[5.3.0,5.3.12)
[,5.2.18)
|
org.springframework:spring-core is a core package within the spring-framework that contains multiple classes and utilities. Affected versions of this package are vulnerable to Expression Language Injection. When a container supports Expression Language (EL), evaluates EL expressions in tags twice, which allows remote attackers to obtain sensitive information via a (1) name attribute in a (a) spring:hasBindErrors tag; (2) path attribute in a (b) spring:bind or (c) spring:nestedpath tag; (3) arguments, (4) code, (5) text, (6) var, (7) scope, or (8) message attribute in a (d) spring:message or (e) spring:theme tag; or (9) var, (10) scope, or (11) value attribute in a (f) spring:transform tag, aka "Expression Language Injection." How to fix Expression Language Injection? Upgrade |
[2.0.0,2.5.6.SEC03)
[3.0.0,3.0.6)
|
org.springframework:spring-core is a core package within the spring-framework that contains multiple classes and utilities. Affected versions of this package are vulnerable to Arbitrary Code Execution,
via an HTTP request containing How to fix Arbitrary Code Execution? Upgrade |
[2.5.0,2.5.6.SEC01)
[3.0.0,3.0.2.RELEASE)
|
org.springframework:spring-core is a core package within the spring-framework that contains multiple classes and utilities. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks via the How to fix Regular Expression Denial of Service (ReDoS)? Upgrade |
[,2.5.6.SEC01)
|