Vulnerability Directory
If you’re currently using these frameworks in your application’s tech stack, your application could be vulnerable.
Secure drop-in replacements for open source software from HeroDevs helps you stay secure, compliant, and compatible while you migrate.
Switch to Never-Ending Support (NES) from HeroDevs to immediately mitigate these vulnerabilities.
Severity
ID
Technology
Libraries Affected
Category
Version(s) Affected
Published Date
Medium
Spring
Spring Data REST
Information Exposure
>=3.5.0 <=3.5.12, >= 3.6.0 < 3.6.7, >= 3.7.0, < 3.7.3
Mar 24, 2026
Low
Spring
Spring Cloud Contract
Information Exposure
>=3.1.0 <3.1.10, >=4.0.0 <4.0.5, =4.1.0
Mar 24, 2026
Medium
Spring
Spring Cloud Config
Path Traversal
<3.1.13, >=4.1.0 <4.1.9, >=4.2.0 < 4.2.6, >=4.3.0 <4.3.2, >5.0.0 <5.0.2
Mar 24, 2026
Critical
Spring
Spring Security
Incorrectly Configured Access Control
>=4.0.2 <6.5.9, >=7.0.0 <7.0.4
Mar 20, 2026
High
Spring
Spring Boot
Authorization Bypass
>=3.4.0 <=3.4.14, >=3.5.0 <=3.5.11, >=4.0.0 <=4.0.3
Mar 20, 2026
Low
Spring
Spring Framework
Content Spoofing
>=4.3.0 <=4.3.30, >=5.3.0 <=5.3.46, >=6.1.0 <=6.1.25, >=6.2.0 <=6.2.16, >=7.0.0 <=7.0.5
Mar 20, 2026
Medium
Spring
Spring Framework
Path Traversal
>=4.2.0 <=6.2.16, >=7.0.0 <=7.0.5
Mar 20, 2026
Medium
Next.js
Next.js
Denial of Service
>=9.5.0 <15.5.13, >=16.0.0-beta.0 <16.1.7
Mar 20, 2026
Critical
Apache Tapestry
Apache Tapestry
Remote Code Execution
>=4.0.0, <=4.1.6
Mar 18, 2026
High
Angular
@angular/core
Cross-Site Scripting
>= 22.0.0-next.0, < 22.0.0-next.3, >= 21.0.0-next.0, < 21.2.4, >= 20.0.0-next.0.0.0, < 20.3.18, >= 19.0.0.next.0, < 19.2.20, >= 17.0.0.next.0, <= 18.2.14
Mar 13, 2026
No results found
Please enter a valid Vulnerability ID number or Technology name.
