CVE-2020-5398

Published on: 01/16/2020 12:00:00 AM UTC

Last Modified on: 07/25/2022 07:09:12 PM UTC

CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H

Certain versions of Data Availability Services from Netapp contain the following vulnerability:

In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input.

  • CVE-2020-5398 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.
  • Affected Vendor/Software: URL Logo Spring - Spring Framework version v5.0.16.RELEASE
  • Affected Vendor/Software: URL Logo Spring - Spring Framework version v5.1.13.RELEASE
  • Affected Vendor/Software: URL Logo Spring - Spring Framework version v5.2.3.RELEASE

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK HIGH NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.6 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK HIGH NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [karaf-commits] 20200518 [GitHub] [karaf] jbonofre removed a comment on pull request #1118: KARAF-6721 - Update Spring versions due to CVE-2020-5398
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [karaf-commits] 20200514 [GitHub] [karaf] skitt commented on a change in pull request #1118: KARAF-6721 - Update Spring versions due to CVE-2020-5398
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [karaf-commits] 20200517 [GitHub] [karaf] jbonofre commented on a change in pull request #1118: KARAF-6721 - Update Spring versions due to CVE-2020-5398
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [geode-dev] 20200410 Re: Proposal to bring GEODE-7970 to support/1.12
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [karaf-commits] 20200518 [karaf] branch master updated: KARAF-6721 - Update Spring versions due to CVE-2020-5398
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [ambari-issues] 20201013 [jira] [Created] (AMBARI-25571) Vulnerable Spring components in Ambari - CVE-2020-5398, CVE-2020-5421
Oracle Critical Patch Update Advisory - July 2020 www.oracle.com
text/html
URL Logo MISC www.oracle.com/security-alerts/cpujul2020.html
Pony Mail! lists.apache.org
text/html
URL Logo MISC lists.apache.org/thread.html/[email protected]%3Ccommits.servicecomb.apache.org%3E
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [karaf-issues] 20200517 [jira] [Updated] (KARAF-6721) Upgrade to Spring 5.1.14.RELEASE and 5.2.5.RELEASE due to CVE-2020-5398
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [karaf-commits] 20200517 [GitHub] [karaf] jbonofre commented on pull request #1118: KARAF-6721 - Update Spring versions due to CVE-2020-5398
CVE-2020-5398: RFD Attack via “Content-Disposition” Header Sourced from Request Input by Spring MVC or Spring WebFlux Application | Security | Pivotal Vendor Advisory
pivotal.io
text/html
URL Logo CONFIRM pivotal.io/security/cve-2020-5398
Pony Mail! lists.apache.org
text/html
URL Logo MISC lists.apache.org/thread.html/[email protected]%3Cdev.rocketmq.apache.org%3E
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [karaf-commits] 20200514 [GitHub] [karaf] coheigea commented on a change in pull request #1118: KARAF-6721 - Update Spring versions due to CVE-2020-5398
Oracle Critical Patch Update Advisory - October 2020 www.oracle.com
text/html
URL Logo MISC www.oracle.com/security-alerts/cpuoct2020.html
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [ambari-dev] 20201019 [GitHub] [ambari] dlysnichenko merged pull request #3246: AMBARI-25571. Vulnerable Spring components in Ambari - CVE-2020-5398, CVE-2020-5421
Pony Mail! lists.apache.org
text/html
URL Logo MISC lists.apache.org/thread.html/[email protected]%3Ccommits.servicecomb.apache.org%3E
Oracle Critical Patch Update Advisory - July 2021 www.oracle.com
text/html
URL Logo MISC www.oracle.com//security-alerts/cpujul2021.html
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [ambari-issues] 20201021 [jira] [Resolved] (AMBARI-25571) Vulnerable Spring components in Ambari - CVE-2020-5398, CVE-2020-5421
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [rocketmq-dev] 20210317 [GitHub] [rocketmq-externals] vongosling commented on issue #690: Spring Framework CVE-2020-5398
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [karaf-issues] 20200517 [jira] [Commented] (KARAF-6721) Update Spring versions due to CVE-2020-5398
Oracle Critical Patch Update Advisory - October 2021 www.oracle.com
text/html
URL Logo MISC www.oracle.com/security-alerts/cpuoct2021.html
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [karaf-issues] 20200518 [jira] [Commented] (KARAF-6721) Upgrade to Spring 5.1.14.RELEASE and 5.2.5.RELEASE due to CVE-2020-5398
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [karaf-issues] 20200517 [jira] [Assigned] (KARAF-6721) Update Spring versions due to CVE-2020-5398
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [camel-commits] 20200220 [camel] branch camel-2.25.x updated: Updating Spring due to CVE-2020-5398
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [karaf-commits] 20200518 [karaf] branch karaf-4.2.x updated: KARAF-6721 - Update Spring versions due to CVE-2020-5398
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [karaf-commits] 20200518 [GitHub] [karaf] jbonofre merged pull request #1118: KARAF-6721 - Update Spring versions due to CVE-2020-5398
Pony Mail! lists.apache.org
text/html
URL Logo MISC lists.apache.org/thread.html/[email protected]%3Cdev.rocketmq.apache.org%3E
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [ambari-dev] 20201019 [GitHub] [ambari] dlysnichenko opened a new pull request #3246: AMBARI-25571. Vulnerable Spring components in Ambari - CVE-2020-5398, CVE-2020-5421
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [karaf-issues] 20200517 [jira] [Updated] (KARAF-6721) Update Spring versions due to CVE-2020-5398
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [karaf-issues] 20200514 [jira] [Commented] (KARAF-6721) Update Spring versions due to CVE-2020-5398
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [karaf-issues] 20200514 [jira] [Updated] (KARAF-6721) Update Spring versions due to CVE-2020-5398
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [karaf-issues] 20200518 [jira] [Resolved] (KARAF-6721) Upgrade to Spring 5.1.14.RELEASE and 5.2.5.RELEASE due to CVE-2020-5398
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [karaf-commits] 20200518 [GitHub] [karaf] jbonofre commented on pull request #1118: KARAF-6721 - Update Spring versions due to CVE-2020-5398
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [geode-dev] 20200410 Proposal to bring GEODE-7970 to support/1.12
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [ambari-commits] 20201019 [ambari] branch branch-2.7 updated: AMBARI-25571. Vulnerable Spring components in Ambari - CVE-2020-5398, CVE-2020-5421 (dlysnichenko) (#3246)
Pony Mail! lists.apache.org
text/html
URL Logo MISC lists.apache.org/thread.html/[email protected]%3Ccommits.servicecomb.apache.org%3E
Oracle Critical Patch Update Advisory - April 2020 www.oracle.com
text/html
URL Logo N/A N/A
Pony Mail! lists.apache.org
text/html
URL Logo MISC lists.apache.org/thread.html/[email protected]%3Cdev.rocketmq.apache.org%3E
Oracle Critical Patch Update Advisory - July 2022 www.oracle.com
text/html
URL Logo MISC www.oracle.com/security-alerts/cpujul2022.html
Oracle Critical Patch Update Advisory - April 2021 www.oracle.com
text/html
URL Logo MISC www.oracle.com/security-alerts/cpuApr2021.html
Oracle Critical Patch Update Advisory - January 2021 www.oracle.com
text/html
URL Logo MISC www.oracle.com/security-alerts/cpujan2021.html
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [karaf-commits] 20200514 [GitHub] [karaf] coheigea opened a new pull request #1118: KARAF-6721 - Update Spring versions due to CVE-2020-5398
CVE-2020-5398 Spring Framework Vulnerability in NetApp Products | NetApp Product Security security.netapp.com
text/html
URL Logo CONFIRM security.netapp.com/advisory/ntap-20210917-0006/
Pony Mail! lists.apache.org
text/html
URL Logo MLIST [karaf-issues] 20200514 [jira] [Created] (KARAF-6721) Update Spring versions due to CVE-2020-5398

Related QID Numbers

  • 730118 Dell Unisphere for PowerMax Security Update for Multiple Third-Party Component Vulnerabilities
  • 730119 Dell Solutions Enabler Security Update for Multiple Third-Party Component Vulnerabilities
  • 980299 Java (maven) Security Update for org.springframework:spring-webflux (GHSA-8wx2-9q48-vm9r)

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationNetappData Availability Services-AllAllAll
ApplicationNetappSnapcenter-AllAllAll
ApplicationOracleApplication Testing Suite13.3.0.1AllAllAll
ApplicationOracleCommunications Billing And Revenue Management Elastic Charging Engine11.3AllAllAll
ApplicationOracleCommunications Billing And Revenue Management Elastic Charging Engine12.0AllAllAll
ApplicationOracleCommunications Cloud Native Core Policy1.5.0AllAllAll
ApplicationOracleCommunications Diameter Signaling RouterAllAllAllAll
ApplicationOracleCommunications Element Manager8.1.1AllAllAll
ApplicationOracleCommunications Element Manager8.2.0AllAllAll
ApplicationOracleCommunications Element Manager8.2.1AllAllAll
ApplicationOracleCommunications Policy Management12.5.0AllAllAll
ApplicationOracleCommunications Session Report Manager8.1.1AllAllAll
ApplicationOracleCommunications Session Report Manager8.2.0AllAllAll
ApplicationOracleCommunications Session Report Manager8.2.1AllAllAll
ApplicationOracleCommunications Session Route Manager8.1.1AllAllAll
ApplicationOracleCommunications Session Route Manager8.2.0AllAllAll
ApplicationOracleCommunications Session Route Manager8.2.1AllAllAll
ApplicationOracleEnterprise Manager Base Platform13.2.1.0AllAllAll
ApplicationOracleFinancial Services Regulatory Reporting With Agilereporter8.0.9.2.0AllAllAll
ApplicationOracleFlexcube Private Banking12.0.0AllAllAll
ApplicationOracleFlexcube Private Banking12.1.0AllAllAll
ApplicationOracleHealthcare Master Person Index4.0.2AllAllAll
ApplicationOracleInsurance Calculation EngineAllAllAllAll
ApplicationOracleInsurance Policy Administration J2ee10.2.0AllAllAll
ApplicationOracleInsurance Policy Administration J2ee10.2.4AllAllAll
ApplicationOracleInsurance Policy Administration J2ee11.0.2AllAllAll
ApplicationOracleInsurance Policy Administration J2ee11.1.0AllAllAll
ApplicationOracleInsurance Policy Administration J2ee11.2.0AllAllAll
ApplicationOracleInsurance Policy Administration J2ee11.2.2.0AllAllAll
ApplicationOracleInsurance Rules Palette10.2.0AllAllAll
ApplicationOracleInsurance Rules Palette10.2.4AllAllAll
ApplicationOracleInsurance Rules Palette11.0.2AllAllAll
ApplicationOracleInsurance Rules Palette11.1.0AllAllAll
ApplicationOracleInsurance Rules Palette11.2.0AllAllAll
ApplicationOracleMysqlAllAllAllAll
ApplicationOracleMysqlAllAllAllAll
ApplicationOracleRapid Planning12.1AllAllAll
ApplicationOracleRapid Planning12.2AllAllAll
ApplicationOracleRetail Assortment Planning15.0AllAllAll
ApplicationOracleRetail Assortment Planning16.0AllAllAll
ApplicationOracleRetail Back Office14.1AllAllAll
ApplicationOracleRetail Bulk Data Integration16.0.3.0AllAllAll
ApplicationOracleRetail Central Office14.1AllAllAll
ApplicationOracleRetail Financial Integration15.0AllAllAll
ApplicationOracleRetail Financial Integration16.0AllAllAll
ApplicationOracleRetail Integration Bus15.0.3AllAllAll
ApplicationOracleRetail Integration Bus16.0.3AllAllAll
ApplicationOracleRetail Order Broker15.0AllAllAll
ApplicationOracleRetail Order Broker16.0AllAllAll
ApplicationOracleRetail Point-of-service14.1AllAllAll
ApplicationOracleRetail Predictive Application Server14.0.3AllAllAll
ApplicationOracleRetail Predictive Application Server14.1.3.0AllAllAll
ApplicationOracleRetail Predictive Application Server15.0.3AllAllAll
ApplicationOracleRetail Predictive Application Server16.0.3.0AllAllAll
ApplicationOracleRetail Returns Management14.1AllAllAll
ApplicationOracleRetail Service Backbone15.0AllAllAll
ApplicationOracleRetail Service Backbone16.0AllAllAll
ApplicationOracleSiebel Engineering - Installer DeploymentAllAllAllAll
ApplicationOracleWeblogic Server12.2.1.3.0AllAllAll
ApplicationOracleWeblogic Server12.2.1.4.0AllAllAll
ApplicationPivotal SoftwareSpring FrameworkAllAllAllAll
ApplicationPivotal SoftwareSpring Framework5.1.0-AllAll
ApplicationPivotal SoftwareSpring Framework5.1.0rc1AllAll
ApplicationPivotal SoftwareSpring Framework5.1.0rc2AllAll
ApplicationPivotal SoftwareSpring Framework5.1.0rc3AllAll
ApplicationPivotal SoftwareSpring FrameworkAllAllAllAll
ApplicationPivotal SoftwareSpring Framework5.1.0-AllAll
ApplicationPivotal SoftwareSpring Framework5.1.0rc1AllAll
ApplicationPivotal SoftwareSpring Framework5.1.0rc2AllAll
ApplicationPivotal SoftwareSpring Framework5.1.0rc3AllAll
ApplicationVmwareSpring FrameworkAllAllAllAll
ApplicationVmwareSpring Framework5.1.0-AllAll
ApplicationVmwareSpring Framework5.1.0rc1AllAll
ApplicationVmwareSpring Framework5.1.0rc2AllAll
ApplicationVmwareSpring Framework5.1.0rc3AllAll
  • cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*:
  • cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:11.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:12.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.5.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:financial_services_regulatory_reporting_with_agilereporter:8.0.9.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:healthcare_master_person_index:4.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:insurance_calculation_engine:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:insurance_policy_administration_j2ee:10.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:insurance_policy_administration_j2ee:10.2.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.2.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:insurance_rules_palette:10.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:insurance_rules_palette:10.2.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:insurance_rules_palette:11.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:insurance_rules_palette:11.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:insurance_rules_palette:11.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:rapid_planning:12.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:rapid_planning:12.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_assortment_planning:15.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_assortment_planning:16.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_back_office:14.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_bulk_data_integration:16.0.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_central_office:14.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_financial_integration:15.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_financial_integration:16.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_integration_bus:15.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_integration_bus:16.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_order_broker:16.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_point-of-service:14.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_predictive_application_server:14.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_predictive_application_server:14.1.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_returns_management:14.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_service_backbone:15.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:retail_service_backbone:16.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:siebel_engineering_-_installer_\&_deployment:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:pivotal_software:spring_framework:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:pivotal_software:spring_framework:5.1.0:-:*:*:*:*:*:*:
  • cpe:2.3:a:pivotal_software:spring_framework:5.1.0:rc1:*:*:*:*:*:*:
  • cpe:2.3:a:pivotal_software:spring_framework:5.1.0:rc2:*:*:*:*:*:*:
  • cpe:2.3:a:pivotal_software:spring_framework:5.1.0:rc3:*:*:*:*:*:*:
  • cpe:2.3:a:pivotal_software:spring_framework:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:pivotal_software:spring_framework:5.1.0:-:*:*:*:*:*:*:
  • cpe:2.3:a:pivotal_software:spring_framework:5.1.0:rc1:*:*:*:*:*:*:
  • cpe:2.3:a:pivotal_software:spring_framework:5.1.0:rc2:*:*:*:*:*:*:
  • cpe:2.3:a:pivotal_software:spring_framework:5.1.0:rc3:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:spring_framework:5.1.0:-:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:spring_framework:5.1.0:rc1:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:spring_framework:5.1.0:rc2:*:*:*:*:*:*:
  • cpe:2.3:a:vmware:spring_framework:5.1.0:rc3:*:*:*:*:*:*:

Social Mentions

Source Title Posted (UTC)
© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report