org.springframework.security:spring-security-core@5.0.12.RELEASE vulnerabilities
-
latest version
6.3.3
-
latest non vulnerable version
-
first published
17 years ago
-
latest version published
2 months ago
-
licenses detected
- [2.0.0,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.springframework.security:spring-security-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform. Affected versions of this package are vulnerable to Improper Access Control when the application uses Note Users are not affected if:
How to fix Improper Access Control? Upgrade |
[,5.7.12)
[5.8.0,5.8.11)
[6.0.0,6.0.10)
[6.1.0,6.1.8)
[6.2.0,6.2.3)
|
org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform. Affected versions of this package are vulnerable to Integer Overflow or Wraparound when using the BCrypt class with the maximum work factor (31). In such a case, the encoder does not perform any salt rounds due to the overflow. Note: The default settings are not affected by this CVE. How to fix Integer Overflow or Wraparound? Upgrade |
[3.1.0.RELEASE,5.4.11)
|
org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform. Affected versions of this package are vulnerable to Privilege Escalation. It fails to save the How to fix Privilege Escalation? Upgrade |
[5.4.0,5.4.4)
[5.3.0.RELEASE,5.3.8.RELEASE)
[,5.2.9.RELEASE)
|
org.springframework.security:spring-security-core is a package that provides security services for the Spring IO Platform. Affected versions of this package are vulnerable to Cryptographic Weakness. Spring Security was found to be a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor. A malicious user with access to the data that has been encrypted using such an encryptor may be able to derive the unencrypted values using a dictionary attack. How to fix Cryptographic Weakness? Upgrade |
[5.3.0.RELEASE,5.3.2.RELEASE)
[5.2.0.RELEASE,5.2.4.RELEASE)
[5.1.0.RELEASE,5.1.10.RELEASE)
[5.0.0.RELEASE,5.0.16.RELEASE)
[4.2.0.RELEASE,4.2.16.RELEASE)
|