Spring Security Oauth
Review your setup
Spring Security Oauth has some exploitation signals but is generally manageable with regular updates.
What to do
- Keep this software updated
- Review your configuration for unnecessary exposure
- Check for known-vulnerable components or plugins
What Attackers Target
Vulnerabilities with high exploit probability
50.0%
Confirmed actively exploited (CISA)
0.0%
Public exploit code available
0.0%
Based on 4 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2018-1260 | 9.8 | 50.3% | — |
| CVE-2019-3778 | 6.5 | 19.0% | — |
| CVE-2019-11269 | 5.4 | 6.6% | — |
| CVE-2018-15758 | 9.6 | 0.4% | — |
30
/ 100
moderate-risk
Active Threat
30/50 · High
Exploit Availability
0/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.