{"vulnerability": "CVE-2021-22060", "sightings": [{"uuid": "26c6cca0-9fb7-489b-96d4-6ed4605580dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22060", "type": "seen", "source": "https://t.me/arpsyndicate/3151", "content": "#ExploitObserverAlert\n\nCVE-2021-22060\n\nDESCRIPTION: Exploit Observer has 6 entries in 4 file formats related to CVE-2021-22060. In Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. This is a follow-up to CVE-2021-22096 that protects against additional types of input and in more places of the Spring Framework codebase.\n\nFIRST-EPSS: 0.000540000\nNVD-IS: 1.4\nNVD-ES: 2.8", "creation_timestamp": "2024-01-28T01:31:50.000000Z"}]}