CVE-2021-22096

Source
https://cve.org/CVERecord?id=CVE-2021-22096
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-22096.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-22096
Aliases
Downstream
Published
2021-10-28T16:15:07.733Z
Modified
2026-02-16T05:07:15.603125Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.

References

Affected packages

Git
github.com/jquery-validation/jquery-validation

Affected ranges

Type
GIT
Repo
https://github.com/jquery-validation/jquery-validation
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*
1.6.0
1.7.0
1.8.0
1.8.0pre
1.8.1
1.9.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-22096.json"
github.com/spring-projects/spring-framework

Affected ranges

Type
GIT
Repo
https://github.com/spring-projects/spring-framework
Events

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-22096.json"