Updates close vulnerabilities in Spring Framework ... If attackers successfully exploit the gaps, they can view any files on systems via prepared HTTP requests, among other things.
Some results have been hidden because they may be inaccessible to you