Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.springframework/spring-messaging@4.3.29.RELEASE
purl pkg:maven/org.springframework/spring-messaging@4.3.29.RELEASE
Next non-vulnerable version 5.2.22.RELEASE
Latest non-vulnerable version 5.3.20
Risk 3.1
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-k17s-ttg2-ubgj
Aliases:
CVE-2022-22971
GHSA-rqph-vqwm-22vc
Allocation of Resources Without Limits or Throttling In spring framework versions prior to 5.3.20+, 5.2.22+ and old unsupported versions, application with a STOMP over WebSocket endpoint is vulnerable to a denial of service attack by an authenticated user.
5.2.22.RELEASE
Affected by 0 other vulnerabilities.
5.3.20
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-y3uz-etva-sufh Improper Input Validation in Spring Framework In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter. CVE-2020-5421
GHSA-rv39-3qh7-9v7w