Vulnerability Directory
If you’re currently using these frameworks in your application’s tech stack, your application could be vulnerable.
Secure drop-in replacements for open source software from HeroDevs helps you stay secure, compliant, and compatible while you migrate.
Switch to Never-Ending Support (NES) from HeroDevs to immediately mitigate these vulnerabilities.
Severity
ID
Technology
Libraries Affected
Category
Version(s) Affected
Published Date
Critical
Spring
Spring Security
Incorrectly Configured Access Control
>=4.0.2 <6.5.9, >=7.0.0 <7.0.4
Mar 20, 2026
High
Spring
Spring Boot
Authorization Bypass
>=3.4.0 <=3.4.14, >=3.5.0 <=3.5.11, >=4.0.0 <=4.0.3
Mar 20, 2026
Low
Spring
Spring Framework
Content Spoofing
>=4.3.0 <=4.3.30, >=5.3.0 <=5.3.46, >=6.1.0 <=6.1.25, >=6.2.0 <=6.2.16, >=7.0.0 <=7.0.5
Mar 20, 2026
Medium
Spring
Spring Framework
Path Traversal
>=4.2.0 <=6.2.16, >=7.0.0 <=7.0.5
Mar 20, 2026
Medium
Next.js
Next.js
Denial of Service
>=9.5.0 <15.5.13, >=16.0.0-beta.0 <16.1.7
Mar 20, 2026
Critical
Apache Tapestry
Apache Tapestry
Remote Code Execution
>=4.0.0, <=4.1.6
Mar 18, 2026
High
Angular
@angular/core
Cross-Site Scripting
>= 22.0.0-next.0, < 22.0.0-next.3, >= 21.0.0-next.0, < 21.2.4, >= 20.0.0-next.0.0.0, < 20.3.18, >= 19.0.0.next.0, < 19.2.20, >= 17.0.0.next.0, <= 18.2.14
Mar 13, 2026
Low
Apache Tomcat
Apache Tomcat
Improper Input Validation (4.16)
>=8.5.0 <=8.5.100, >=9.0.0.M1 <9.0.113, >=10.1.0-M1 <10.1.50, >=11.0.0-M1 <11.0.15
Mar 6, 2026
Medium
Apache Tomcat
Apache Tomcat
Improper Input Validation (4.16)
>=8.5.0 <=8.5.100, >=9.0.0.M1 <9.0.113, >=10.1.0-M1 <10.1.50, >=11.0.0-M1 <=11.0.15
Mar 6, 2026
Low
Jetty
Jetty
Improper Input Validation (4.16)
>=9.4.0 <=9.4.58, >=10.0.0 <=10.0.26, >=11.0.0 <=11.0.26, >=12.0.0 <=12.0.30, >=12.1.0 <=12.1.4
Mar 6, 2026
No results found
Please enter a valid Vulnerability ID number or Technology name.
