Search for packages
| purl | pkg:maven/org.springframework.security/spring-security-core@3.0.0 |
| Tags | Ghost |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-ev1k-za9z-87hq
Aliases: CVE-2011-2732 GHSA-5xm9-rf63-wj7h |
Improper Control of Generation of Code ('Code Injection') CRLF injection vulnerability in the logout functionality in VMware SpringSource Spring Security before 2.0.7 and 3.0.x before 3.0.6 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the spring-security-redirect parameter. |
Affected by 0 other vulnerabilities. Affected by 8 other vulnerabilities. |
|
VCID-n8yr-3aex-kyah
Aliases: CVE-2010-3700 GHSA-3295-h9qx-r82x |
Authentication Bypass Using an Alternate Path or Channel in SpringSource Spring Security and Acegi Security VMware SpringSource Spring Security 2.x before 2.0.6 and 3.x before 3.0.4, and Acegi Security 1.0.0 through 1.0.7, as used in IBM WebSphere Application Server (WAS) 6.1 and 7.0, allows remote attackers to bypass security constraints via a path parameter. |
Affected by 0 other vulnerabilities. Affected by 11 other vulnerabilities. |
|
VCID-nddv-1dfd-jfdd
Aliases: CVE-2011-2731 GHSA-4644-hg35-55m9 |
Concurrent Execution using Shared Resource with Improper Synchronization in Spring Security Race condition in the RunAsManager mechanism in VMware SpringSource Spring Security before 2.0.7 and 3.0.x before 3.0.6 stores the Authentication object in the shared security context, which allows attackers to gain privileges via a crafted thread. |
Affected by 0 other vulnerabilities. Affected by 8 other vulnerabilities. |
|
VCID-sy5j-6rkg-n3b7
Aliases: CVE-2011-2894 GHSA-f866-m9mv-2xr3 |
Deserialization of Untrusted Data Spring Framework 3.0.0 through 3.0.5, Spring Security 3.0.0 through 3.0.5 and 2.0.0 through 2.0.6, and possibly other versions deserialize objects from untrusted sources, which allows remote attackers to bypass intended security restrictions and execute untrusted code by (1) serializing a java.lang.Proxy instance and using InvocationHandler, or (2) accessing internal AOP interfaces, as demonstrated using deserialization of a DefaultListableBeanFactory instance to execute arbitrary commands via the java.lang.Runtime class. |
Affected by 0 other vulnerabilities. Affected by 8 other vulnerabilities. |
|
VCID-w4q4-38gp-m3d8
Aliases: CVE-2012-5055 GHSA-3533-rvpc-6x56 |
Exposure of Sensitive Information to an Unauthorized Actor This package does not check the password if the user is not found, which makes the response delay shorter and might allow remote attackers to enumerate valid usernames via a series of login requests. |
Affected by 0 other vulnerabilities. Affected by 7 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 7 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||