RFD Attack via "Content-Disposition" Header Sourced from Request Input by Spring MVC or Spring WebFlux Application
Description
In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Spring Framework is vulnerable to reflected file download (RFD) when user input is used in Content-Disposition filename, enabling arbitrary code execution.
Vulnerability
Description
Spring Framework versions 5.2.x prior to 5.2.3, 5.1.x prior to 5.1.13, and 5.0.x prior to 5.0.16 are vulnerable to a reflected file download (RFD) attack. The vulnerability occurs when an application sets a Content-Disposition header in the response where the filename attribute is derived from user-supplied input [1]. RFD attacks leverage the browser's automatic file download behavior to trick users into executing malicious code or opening dangerous files.
Exploitation and
Attack Surface
An attacker can craft a malicious link that, when clicked by a victim, causes the Spring application to respond with a Content-Disposition header containing a crafted filename attribute. The attacker can control the filename extension, such as .bat or .js, which may be executed automatically or opened by the operating system depending on user settings. No authentication is needed if the vulnerable endpoint is publicly accessible. The attack relies on user interaction (clicking a link) and the browser's behavior of automatically downloading files based on the response headers.
Impact
Successful exploitation could allow an attacker to execute arbitrary code on the victim's machine. The impact depends on the trust the victim places in the domain and the file type used. This could lead to complete compromise of the user's system if the downloaded file is executed without proper warnings [2].
Mitigation
The Spring Framework team has fixed this issue by escaping quotes in the filename attribute of Content-Disposition headers, as shown in commit 41f40c6 [2]. Users are strongly advised to upgrade to Spring Framework 5.2.3, 5.1.13, or 5.0.16 or later. Additionally, developers should sanitize any user input used in response headers to prevent similar attacks [3].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.springframework:spring-webmvcMaven | >= 5.2.0.RELEASE, < 5.2.3.RELEASE | 5.2.3.RELEASE |
org.springframework:spring-webmvcMaven | >= 5.1.0.RELEASE, < 5.1.13.RELEASE | 5.1.13.RELEASE |
org.springframework:spring-webmvcMaven | >= 5.0.0.RELEASE, < 5.0.16.RELEASE | 5.0.16.RELEASE |
org.springframework:spring-webfluxMaven | >= 5.2.0.RELEASE, < 5.2.3.RELEASE | 5.2.3.RELEASE |
org.springframework:spring-webfluxMaven | >= 5.1.0.RELEASE, < 5.1.13.RELEASE | 5.1.13.RELEASE |
org.springframework:spring-webfluxMaven | >= 5.0.0.RELEASE, < 5.0.16.RELEASE | 5.0.16.RELEASE |
Affected products
10- osv-coords9 versionspkg:apk/chainguard/mysql-8.0pkg:apk/chainguard/mysql-8.0-bitnami-compatpkg:apk/chainguard/mysql-8.0-clientpkg:apk/chainguard/mysql-8.0-devpkg:apk/chainguard/mysql-8.0-iamguarded-compatpkg:apk/chainguard/mysql-8.0-oci-entrypointpkg:apk/chainguard/mysql-8.0-oci-entrypoint-compatpkg:maven/org.springframework/spring-webfluxpkg:maven/org.springframework/spring-webmvc
< 8.0.38-r0+ 8 more
- (no CPE)range: < 8.0.38-r0
- (no CPE)range: < 8.0.38-r0
- (no CPE)range: < 8.0.38-r0
- (no CPE)range: < 8.0.38-r0
- (no CPE)range: < 8.0.38-r0
- (no CPE)range: < 8.0.38-r0
- (no CPE)range: < 8.0.38-r0
- (no CPE)range: >= 5.2.0.RELEASE, < 5.2.3.RELEASE
- (no CPE)range: >= 5.2.0.RELEASE, < 5.2.3.RELEASE
- Spring/Spring Frameworkv5Range: 5.0
Patches
141f40c6c229dEscape quotes in filename
2 files changed · +80 −21
spring-web/src/main/java/org/springframework/http/ContentDisposition.java+20 −2 modified@@ -458,7 +458,11 @@ public interface Builder { Builder name(String name); /** - * Set the value of the {@literal filename} parameter. + * Set the value of the {@literal filename} parameter. The given + * filename will be formatted as quoted-string, as defined in RFC 2616, + * section 2.2, and any quote characters within the filename value will + * be escaped with a backslash, e.g. {@code "foo\"bar.txt"} becomes + * {@code "foo\\\"bar.txt"}. */ Builder filename(String filename); @@ -539,10 +543,24 @@ public Builder name(String name) { @Override public Builder filename(String filename) { - this.filename = filename; + Assert.hasText(filename, "No filename"); + this.filename = escapeQuotationMarks(filename); return this; } + private static String escapeQuotationMarks(String filename) { + if (filename.indexOf('"') == -1) { + return filename; + } + boolean escaped = false; + StringBuilder sb = new StringBuilder(); + for (char c : filename.toCharArray()) { + sb.append((c == '"' && !escaped) ? "\\\"" : c); + escaped = (!escaped && c == '\\'); + } + return sb.toString(); + } + @Override public Builder filename(String filename, Charset charset) { this.filename = filename;
spring-web/src/test/java/org/springframework/http/ContentDispositionTests.java+60 −19 modified@@ -19,11 +19,13 @@ import java.nio.charset.StandardCharsets; import java.time.ZonedDateTime; import java.time.format.DateTimeFormatter; +import java.util.function.BiConsumer; import org.junit.jupiter.api.Test; import static org.assertj.core.api.Assertions.assertThat; import static org.assertj.core.api.Assertions.assertThatIllegalArgumentException; +import static org.springframework.http.ContentDisposition.builder; /** * Unit tests for {@link ContentDisposition} @@ -38,7 +40,7 @@ public class ContentDispositionTests { @Test public void parse() { assertThat(parse("form-data; name=\"foo\"; filename=\"foo.txt\"; size=123")) - .isEqualTo(ContentDisposition.builder("form-data") + .isEqualTo(builder("form-data") .name("foo") .filename("foo.txt") .size(123L) @@ -48,23 +50,23 @@ public void parse() { @Test public void parseFilenameUnquoted() { assertThat(parse("form-data; filename=unquoted")) - .isEqualTo(ContentDisposition.builder("form-data") + .isEqualTo(builder("form-data") .filename("unquoted") .build()); } @Test // SPR-16091 public void parseFilenameWithSemicolon() { assertThat(parse("attachment; filename=\"filename with ; semicolon.txt\"")) - .isEqualTo(ContentDisposition.builder("attachment") + .isEqualTo(builder("attachment") .filename("filename with ; semicolon.txt") .build()); } @Test public void parseEncodedFilename() { assertThat(parse("form-data; name=\"name\"; filename*=UTF-8''%E4%B8%AD%E6%96%87.txt")) - .isEqualTo(ContentDisposition.builder("form-data") + .isEqualTo(builder("form-data") .name("name") .filename("中文.txt", StandardCharsets.UTF_8) .build()); @@ -73,15 +75,15 @@ public void parseEncodedFilename() { @Test // gh-24112 public void parseEncodedFilenameWithPaddedCharset() { assertThat(parse("attachment; filename*= UTF-8''some-file.zip")) - .isEqualTo(ContentDisposition.builder("attachment") + .isEqualTo(builder("attachment") .filename("some-file.zip", StandardCharsets.UTF_8) .build()); } @Test public void parseEncodedFilenameWithoutCharset() { assertThat(parse("form-data; name=\"name\"; filename*=test.txt")) - .isEqualTo(ContentDisposition.builder("form-data") + .isEqualTo(builder("form-data") .name("name") .filename("test.txt") .build()); @@ -104,18 +106,30 @@ public void parseEncodedFilenameWithInvalidName() { @Test // gh-23077 public void parseWithEscapedQuote() { - assertThat(parse("form-data; name=\"file\"; filename=\"\\\"The Twilight Zone\\\".txt\"; size=123")) - .isEqualTo(ContentDisposition.builder("form-data") - .name("file") - .filename("\\\"The Twilight Zone\\\".txt") - .size(123L) - .build()); + + BiConsumer<String, String> tester = (description, filename) -> { + assertThat(parse("form-data; name=\"file\"; filename=\"" + filename + "\"; size=123")) + .as(description) + .isEqualTo(builder("form-data").name("file").filename(filename).size(123L).build()); + }; + + tester.accept("Escaped quotes should be ignored", + "\\\"The Twilight Zone\\\".txt"); + + tester.accept("Escaped quotes preceded by escaped backslashes should be ignored", + "\\\\\\\"The Twilight Zone\\\\\\\".txt"); + + tester.accept("Escaped backslashes should not suppress quote", + "The Twilight Zone \\\\"); + + tester.accept("Escaped backslashes should not suppress quote", + "The Twilight Zone \\\\\\\\"); } @Test public void parseWithExtraSemicolons() { assertThat(parse("form-data; name=\"foo\";; ; filename=\"foo.txt\"; size=123")) - .isEqualTo(ContentDisposition.builder("form-data") + .isEqualTo(builder("form-data") .name("foo") .filename("foo.txt") .size(123L) @@ -133,7 +147,7 @@ public void parseDates() { "creation-date=\"" + creationTime.format(formatter) + "\"; " + "modification-date=\"" + modificationTime.format(formatter) + "\"; " + "read-date=\"" + readTime.format(formatter) + "\"")).isEqualTo( - ContentDisposition.builder("attachment") + builder("attachment") .creationDate(creationTime) .modificationDate(modificationTime) .readDate(readTime) @@ -149,7 +163,7 @@ public void parseIgnoresInvalidDates() { "creation-date=\"-1\"; " + "modification-date=\"-1\"; " + "read-date=\"" + readTime.format(formatter) + "\"")).isEqualTo( - ContentDisposition.builder("attachment") + builder("attachment") .readDate(readTime) .build()); } @@ -177,7 +191,7 @@ private static ContentDisposition parse(String input) { @Test public void format() { assertThat( - ContentDisposition.builder("form-data") + builder("form-data") .name("foo") .filename("foo.txt") .size(123L) @@ -188,7 +202,7 @@ public void format() { @Test public void formatWithEncodedFilename() { assertThat( - ContentDisposition.builder("form-data") + builder("form-data") .name("name") .filename("中文.txt", StandardCharsets.UTF_8) .build().toString()) @@ -198,18 +212,45 @@ public void formatWithEncodedFilename() { @Test public void formatWithEncodedFilenameUsingUsAscii() { assertThat( - ContentDisposition.builder("form-data") + builder("form-data") .name("name") .filename("test.txt", StandardCharsets.US_ASCII) .build() .toString()) .isEqualTo("form-data; name=\"name\"; filename=\"test.txt\""); } + @Test // gh-24220 + public void formatWithFilenameWithQuotes() { + + BiConsumer<String, String> tester = (input, output) -> { + assertThat(builder("form-data").filename(input).build().toString()) + .isEqualTo("form-data; filename=\"" + output + "\""); + }; + + String filename = "\"foo.txt"; + tester.accept(filename, "\\" + filename); + + filename = "\\\"foo.txt"; + tester.accept(filename, filename); + + filename = "\\\\\"foo.txt"; + tester.accept(filename, "\\" + filename); + + filename = "\\\\\\\"foo.txt"; + tester.accept(filename, filename); + + filename = "\\\\\\\\\"foo.txt"; + tester.accept(filename, "\\" + filename); + + tester.accept("\"\"foo.txt", "\\\"\\\"foo.txt"); + tester.accept("\"\"\"foo.txt", "\\\"\\\"\\\"foo.txt"); + } + @Test public void formatWithEncodedFilenameUsingInvalidCharset() { assertThatIllegalArgumentException().isThrownBy(() -> - ContentDisposition.builder("form-data") + builder("form-data") .name("name") .filename("test.txt", StandardCharsets.UTF_16) .build()
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
82- github.com/advisories/GHSA-8wx2-9q48-vm9rghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-5398ghsaADVISORY
- github.com/spring-projects/spring-framework/commit/41f40c6c229d3b4f768718f1ec229d8f0ad76d76ghsaWEB
- lists.apache.org/thread.html/r028977b9b9d44a89823639aa3296fb0f0cfdd76b4450df89d3c4fbbf%40%3Cissues.karaf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r028977b9b9d44a89823639aa3296fb0f0cfdd76b4450df89d3c4fbbf@%3Cissues.karaf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r0f2d0ae1bad2edb3d4a863d77f3097b5e88cfbdae7b809f4f42d6aad%40%3Cissues.karaf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r0f2d0ae1bad2edb3d4a863d77f3097b5e88cfbdae7b809f4f42d6aad@%3Cissues.karaf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r0f3530f7cb510036e497532ffc4e0bd0b882940448cf4e233994b08b%40%3Ccommits.karaf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r0f3530f7cb510036e497532ffc4e0bd0b882940448cf4e233994b08b@%3Ccommits.karaf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r1accbd4f31ad2f40e1661d70a4510a584eb3efd1e32e8660ccf46676%40%3Ccommits.karaf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r1accbd4f31ad2f40e1661d70a4510a584eb3efd1e32e8660ccf46676@%3Ccommits.karaf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r1bc5d673c01cfbb8e4a91914e9748ead3e5f56b61bca54d314c0419b%40%3Cissues.karaf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r1bc5d673c01cfbb8e4a91914e9748ead3e5f56b61bca54d314c0419b@%3Cissues.karaf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163%40%3Ccommits.ambari.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163@%3Ccommits.ambari.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r1eccdbd7986618a7319ee7a533bd9d9bf6e8678e59dd4cca9b5b2d7a%40%3Cissues.ambari.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r1eccdbd7986618a7319ee7a533bd9d9bf6e8678e59dd4cca9b5b2d7a@%3Cissues.ambari.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r27552d2fa10d96f2810c50d16ad1fd1899e37796c81a0c5e7585a02d%40%3Cdev.rocketmq.apache.org%3Emitrex_refsource_MISC
- lists.apache.org/thread.html/r27552d2fa10d96f2810c50d16ad1fd1899e37796c81a0c5e7585a02d@%3Cdev.rocketmq.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r2dfd5b331b46d3f90c4dd63a060e9f04300468293874bd7e41af7163%40%3Cissues.karaf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r2dfd5b331b46d3f90c4dd63a060e9f04300468293874bd7e41af7163@%3Cissues.karaf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r3765353ff434fd00d8fa5a44734b3625a06eeb2a3fb468da7dfae134%40%3Ccommits.karaf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r3765353ff434fd00d8fa5a44734b3625a06eeb2a3fb468da7dfae134@%3Ccommits.karaf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r4639e821ef9ca6ca10887988f410a60261400a7766560e7a97a22efc%40%3Ccommits.karaf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r4639e821ef9ca6ca10887988f410a60261400a7766560e7a97a22efc@%3Ccommits.karaf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r4b1886e82cc98ef38f582fef7d4ea722e3fcf46637cd4674926ba682%40%3Cissues.karaf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r4b1886e82cc98ef38f582fef7d4ea722e3fcf46637cd4674926ba682@%3Cissues.karaf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r5c95eff679dfc642e9e4ab5ac6d202248a59cb1e9457cfbe8b729ac5%40%3Cissues.ambari.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r5c95eff679dfc642e9e4ab5ac6d202248a59cb1e9457cfbe8b729ac5@%3Cissues.ambari.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r645408661a8df9158f49e337072df39838fa76da629a7e25a20928a6%40%3Cdev.rocketmq.apache.org%3Emitrex_refsource_MISC
- lists.apache.org/thread.html/r645408661a8df9158f49e337072df39838fa76da629a7e25a20928a6@%3Cdev.rocketmq.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r6dac0e365d1b2df9a7ffca12b4195181ec14ff0abdf59e1fdb088ce5%40%3Ccommits.karaf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r6dac0e365d1b2df9a7ffca12b4195181ec14ff0abdf59e1fdb088ce5@%3Ccommits.karaf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r712a6fce928e24e7b6ec30994a7e115a70f1f6e4cf2c2fbf0347ce46%40%3Ccommits.servicecomb.apache.org%3Emitrex_refsource_MISC
- lists.apache.org/thread.html/r712a6fce928e24e7b6ec30994a7e115a70f1f6e4cf2c2fbf0347ce46@%3Ccommits.servicecomb.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r7361bfe84bde9d233f9800c3a96673e7bd81207549ced0236f07a29d%40%3Cissues.karaf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r7361bfe84bde9d233f9800c3a96673e7bd81207549ced0236f07a29d@%3Cissues.karaf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r74f81f93a9b69140fe41e236afa7cbe8dfa75692e7ab31a468fddaa0%40%3Ccommits.karaf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r74f81f93a9b69140fe41e236afa7cbe8dfa75692e7ab31a468fddaa0@%3Ccommits.karaf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r7d5e518088e2e778928b02bcd3be3b948b59acefe2f0ebb57ec2ebb0%40%3Ccommits.karaf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r7d5e518088e2e778928b02bcd3be3b948b59acefe2f0ebb57ec2ebb0@%3Ccommits.karaf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r8736185eb921022225a83e56d7285a217fd83f5524bd64a6ca3bf5cc%40%3Cissues.karaf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r8736185eb921022225a83e56d7285a217fd83f5524bd64a6ca3bf5cc@%3Cissues.karaf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r881fb5a95ab251106fed38f836257276feb026bfe01290e72ff91c2a%40%3Ccommits.servicecomb.apache.org%3Emitrex_refsource_MISC
- lists.apache.org/thread.html/r881fb5a95ab251106fed38f836257276feb026bfe01290e72ff91c2a@%3Ccommits.servicecomb.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r8b496b1743d128e6861ee0ed3c3c48cc56c505b38f84fa5baf7ae33a%40%3Cdev.ambari.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r8b496b1743d128e6861ee0ed3c3c48cc56c505b38f84fa5baf7ae33a@%3Cdev.ambari.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r8cc37a60a5056351377ee5f1258f2a4fdd39822a257838ba6bcc1e88%40%3Ccommits.karaf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r8cc37a60a5056351377ee5f1258f2a4fdd39822a257838ba6bcc1e88@%3Ccommits.karaf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r9f13cccb214495e14648d2c9b8f2c6072fd5219e74502dd35ede81e1%40%3Cdev.ambari.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r9f13cccb214495e14648d2c9b8f2c6072fd5219e74502dd35ede81e1@%3Cdev.ambari.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r9fb1ee08cf337d16c3364feb0f35a072438c1a956afd7b77859aa090%40%3Cissues.karaf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r9fb1ee08cf337d16c3364feb0f35a072438c1a956afd7b77859aa090@%3Cissues.karaf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/ra996b56e1f5ab2fed235a8b91fa0cc3cf34c2e9fee290b7fa4380a0d%40%3Ccommits.servicecomb.apache.org%3Emitrex_refsource_MISC
- lists.apache.org/thread.html/ra996b56e1f5ab2fed235a8b91fa0cc3cf34c2e9fee290b7fa4380a0d@%3Ccommits.servicecomb.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rab0de39839b4c208dcd73f01e12899dc453361935a816a784548e048%40%3Cissues.karaf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rab0de39839b4c208dcd73f01e12899dc453361935a816a784548e048@%3Cissues.karaf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rb4d1fc078f086ec2e98b2693e8b358e58a6a4ef903ceed93a1ee2b18%40%3Ccommits.karaf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rb4d1fc078f086ec2e98b2693e8b358e58a6a4ef903ceed93a1ee2b18@%3Ccommits.karaf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rc05acaacad089613e9642f939b3a44f7199b5537493945c3e045287f%40%3Cdev.geode.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rc05acaacad089613e9642f939b3a44f7199b5537493945c3e045287f@%3Cdev.geode.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rc9c7f96f08c8554225dba9050ea5e64bebc129d0d836303143fe3160%40%3Cdev.rocketmq.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rc9c7f96f08c8554225dba9050ea5e64bebc129d0d836303143fe3160@%3Cdev.rocketmq.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rdcaadaa9a68b31b7d093d76eacfaacf6c7a819f976b595c75ad2d4dc%40%3Cdev.geode.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rdcaadaa9a68b31b7d093d76eacfaacf6c7a819f976b595c75ad2d4dc@%3Cdev.geode.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rded5291e25a4c4085a6d43cf262e479140198bf4eabb84986e0a1ef3%40%3Cdev.rocketmq.apache.org%3Emitrex_refsource_MISC
- lists.apache.org/thread.html/rded5291e25a4c4085a6d43cf262e479140198bf4eabb84986e0a1ef3@%3Cdev.rocketmq.apache.org%3EghsaWEB
- lists.apache.org/thread.html/reaa8a6674baf2724b1b88a621b0d72d9f7a6f5577c88759842c16eb6%40%3Ccommits.karaf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/reaa8a6674baf2724b1b88a621b0d72d9f7a6f5577c88759842c16eb6@%3Ccommits.karaf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rf8dc72b974ee74f17bce661ea7d124e733a1f4c4f236354ac0cf48e8%40%3Ccommits.camel.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rf8dc72b974ee74f17bce661ea7d124e733a1f4c4f236354ac0cf48e8@%3Ccommits.camel.apache.org%3EghsaWEB
- pivotal.io/security/cve-2020-5398ghsax_refsource_CONFIRMWEB
- security.netapp.com/advisory/ntap-20210917-0006ghsaWEB
- security.netapp.com/advisory/ntap-20210917-0006/mitrex_refsource_CONFIRM
- www.oracle.com//security-alerts/cpujul2021.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpuApr2021.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpuapr2020.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpujan2021.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpujul2020.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpujul2022.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpuoct2020.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpuoct2021.htmlghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.