Pivotal Software Spring Data Commons
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Pivotal Software Spring Data Commons.
By the Year
In 2025 there have been 0 vulnerabilities in Pivotal Software Spring Data Commons. Spring Data Commons did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2025 | 0 | 0.00 |
2024 | 0 | 0.00 |
2023 | 0 | 0.00 |
2022 | 0 | 0.00 |
2021 | 0 | 0.00 |
2020 | 0 | 0.00 |
2019 | 0 | 0.00 |
2018 | 3 | 8.27 |
It may take a day or so for new Spring Data Commons vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Pivotal Software Spring Data Commons Security Vulnerabilities
Spring Data Commons
CVE-2018-1259
7.5 - High
- May 11, 2018
Spring Data Commons, versions 1.13 prior to 1.13.12 and 2.0 prior to 2.0.7, used in combination with XMLBeam 1.4.14 or earlier versions, contains a property binder vulnerability caused by improper restriction of XML external entity references as underlying library XMLBeam does not restrict external reference expansion. An unauthenticated remote malicious user can supply specially crafted request parameters against Spring Data's projection-based request payload binding to access arbitrary files on the system.
XXE
Spring Data Commons
CVE-2018-1274
7.5 - High
- April 18, 2018
Spring Data Commons, versions 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property path parser vulnerability caused by unlimited resource allocation. An unauthenticated remote malicious user (or attacker) can issue requests against Spring Data REST endpoints or endpoints using property path parsing which can cause a denial of service (CPU and memory consumption).
Allocation of Resources Without Limits or Throttling
Spring Data Commons
CVE-2018-1273
9.8 - Critical
- April 11, 2018
Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack.
Code Injection
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Oracle Financial Services Crime Compliance Management Studio or by Pivotal Software? Click the Watch button to subscribe.
